WorldWideScience

Sample records for information embedding capacity

  1. The Embedding Capacity of Information Flows Under Renewal Traffic

    CERN Document Server

    Marano, Stefano; He, Ting; Tong, Lang

    2011-01-01

    Given two independent point processes and a certain rule for matching points between them, what is the fraction of matched points over infinitely long streams? In many application contexts, e.g., secure networking, a meaningful matching rule is that of a maximum causal delay, and the problem is related to embedding a flow of packets in cover traffic such that no traffic analysis can detect it. We study the best undetectable embedding policy and the corresponding maximum flow rate ---that we call the embedding capacity--- under the assumption that the cover traffic can be modeled as arbitrary renewal processes. We find that computing the embedding capacity requires the inversion of very structured linear systems that, for a broad range of renewal models encountered in practice, admits a fully analytical expression in terms of the renewal function of the processes. Our main theoretical contribution is a simple closed form of such relationship. This result enables us to explore properties of the embedding capaci...

  2. Applying informed coding and embedding to design a robust high-capacity watermark.

    Science.gov (United States)

    Miller, Matt L; Doërr, Gwenaël J; Cox, Ingemar J

    2004-06-01

    We describe a new watermarking system based on the principles of informed coding and informed embedding. This system is capable of embedding 1380 bits of information in images with dimensions 240 x 368 pixels. Experiments on 2000 images indicate the watermarks are robust to significant valumetric distortions, including additive noise, low-pass filtering, changes in contrast, and lossy compression. Our system encodes watermark messages with a modified trellis code in which a given message may be represented by a variety of different signals, with the embedded signal selected according to the cover image. The signal is embedded by an iterative method that seeks to ensure the message will not be confused with other messages, even after addition of noise. Fidelity is improved by the incorporation of perceptual shaping into the embedding process. We show that each of these three components improves performance substantially.

  3. Embedding capacity estimation of reversible watermarking schemes

    Indian Academy of Sciences (India)

    Rishabh Iyer; Rushikesh Borse; Subhasis Chaudhuri

    2014-12-01

    Estimation of the embedding capacity is an important problem specifically in reversible multi-pass watermarking and is required for analysis before any image can be watermarked. In this paper, we propose an efficient method for estimating the embedding capacity of a given cover image under multi-pass embedding, without actually embedding the watermark. We demonstrate this for a class of reversible watermarking schemes which operate on a disjoint group of pixels, specifically for pixel pairs. The proposed algorithm iteratively updates the co-occurrence matrix at every stage to estimate the multi-pass embedding capacity, and is much more efficient vis-a-vis actual watermarking. We also suggest an extremely efficient, pre-computable tree based implementation which is conceptually similar to the cooccurrence based method, but provides the estimates in a single iteration, requiring a complexity akin to that of single pass capacity estimation. We also provide upper bounds on the embedding capacity.We finally evaluate performance of our algorithms on recent watermarking algorithms.

  4. Capacity of DNA Data Embedding Under Substitution Mutations

    CERN Document Server

    Balado, Félix

    2011-01-01

    A number of methods have been proposed over the last decade for encoding information using deoxyribonucleic acid (DNA), giving rise to the emerging area of DNA data embedding. Since a DNA sequence is conceptually equivalent to a sequence of quaternary symbols (bases), DNA data embedding (diversely called DNA watermarking or DNA steganography) can be seen as a digital communications problem where channel errors are tantamount to mutations of DNA bases. Depending on the use of coding or noncoding DNA hosts, which, respectively, denote DNA segments that can or cannot be translated into proteins, DNA data embedding is essentially a problem of communications with or without side information at the encoder. In this paper the Shannon capacity of DNA data embedding is obtained for the case in which DNA sequences are subject to substitution mutations modelled using the Kimura model from molecular evolution studies. Inferences are also drawn with respect to the biological implications of some of the results presented.

  5. Information embedding meets distributed control

    CERN Document Server

    Grover, Pulkit; Sahai, Anant

    2010-01-01

    We consider the problem of information embedding where the encoder modifies a white Gaussian host signal in a power-constrained manner to encode the message, and the decoder recovers both the embedded message and the modified host signal. This extends the recent work of Sumszyk and Steinberg to the continuous-alphabet Gaussian setting. We show that a dirty-paper-coding based strategy achieves the optimal rate for perfect recovery of the modified host and the message. We also provide bounds for the extension wherein the modified host signal is recovered only to within a specified distortion. When specialized to the zero-rate case, our results provide the tightest known lower bounds on the asymptotic costs for the vector version of a famous open problem in distributed control -- the Witsenhausen counterexample. Using this bound, we characterize the asymptotically optimal costs for the vector Witsenhausen problem numerically to within a factor of 1.3 for all problem parameters, improving on the earlier best know...

  6. Results of Some Uplift Capacity Tests on Direct Embedment Anchors

    Science.gov (United States)

    1978-06-01

    should be expected to vary from those of the terrestrial tesis above. The analysis of direct embedment anchor-holding capacity is complicated by the...was conducted north of the Puerto Rico trench in 5,500 m (18,000 ft) in a pelagic clay or "red clay" deposit. Water contents in the upper 1.2 m (4 ft...north of Puerto Rico Trench. S6 - -~ ~-~d- 70. 60 20 60 j - 12 18 5 fluke 16 embedaent - 10 -0 340 6- -20 20,--6 4 - 10- ൟ 0g 30 2 3 4 5 6 7 4i Time

  7. Embedded ubiquitous services on hospital information systems.

    Science.gov (United States)

    Kuroda, Tomohiro; Sasaki, Hiroshi; Suenaga, Takatoshi; Masuda, Yasushi; Yasumuro, Yoshihiro; Hori, Kenta; Ohboshi, Naoki; Takemura, Tadamasa; Chihara, Kunihiro; Yoshihara, Hiroyuki

    2012-11-01

    A Hospital Information Systems (HIS) have turned a hospital into a gigantic computer with huge computational power, huge storage and wired/wireless local area network. On the other hand, a modern medical device, such as echograph, is a computer system with several functional units connected by an internal network named a bus. Therefore, we can embed such a medical device into the HIS by simply replacing the bus with the local area network. This paper designed and developed two embedded systems, a ubiquitous echograph system and a networked digital camera. Evaluations of the developed systems clearly show that the proposed approach, embedding existing clinical systems into HIS, drastically changes productivity in the clinical field. Once a clinical system becomes a pluggable unit for a gigantic computer system, HIS, the combination of multiple embedded systems with application software designed under deep consideration about clinical processes may lead to the emergence of disruptive innovation in the clinical field.

  8. Optical information capacity of silicon

    CERN Document Server

    Dimitropoulos, Dimitris

    2014-01-01

    Modern computing and data storage systems increasingly rely on parallel architectures where processing and storage load is distributed within a cluster of nodes. The necessity for high-bandwidth data links has made optical communication a critical constituent of modern information systems and silicon the leading platform for creating the necessary optical components. While silicon is arguably the most extensively studied material in history, one of its most important attributes, an analysis of its capacity to carry optical information, has not been reported. The calculation of the information capacity of silicon is complicated by nonlinear losses, phenomena that emerge in optical nanowires as a result of the concentration of optical power in a small geometry. Nonlinear losses are absent in silica glass optical fiber and other common communication channels. While nonlinear loss in silicon is well known, noise and fluctuations that arise from it have never been considered. Here we report sources of fluctuations...

  9. High Information Capacity Quantum Imaging

    Science.gov (United States)

    2014-09-19

    the quantum nature of light), and detector reset time. Algorithmic : We provide a method for spatiotemporally-regularized estimation of intensity and...High Information Capacity Quantum Imaging This is the final report for the DARPA InPho program. In reality, we finished this program in early 2013...Army Research Office P.O. Box 12211 Research Triangle Park, NC 27709-2211 Quantum Imaging, Photon Counting, LIDAR REPORT DOCUMENTATION PAGE 11

  10. Estimation of the Embedding Capacity in Pixel-pair based Watermarking Schemes

    CERN Document Server

    Iyer, Rishabh; Shah, Ronak; Chaudhuri, Subhasis

    2011-01-01

    Estimation of the Embedding capacity is an important problem specifically in reversible multi-pass watermarking and is required for analysis before any image can be watermarked. In this paper, we propose an efficient method for estimating the embedding capacity of a given cover image under multi-pass embedding, without actually embedding the watermark. We demonstrate this for a class of reversible watermarking schemes which operate on a disjoint group of pixels, specifically for pixel pairs. The proposed algorithm iteratively updates the co-occurrence matrix at every stage, to estimate the multi-pass embedding capacity, and is much more efficient vis-a-vis actual watermarking. We also suggest an extremely efficient, pre-computable tree based implementation which is conceptually similar to the co-occurrence based method, but provides the estimates in a single iteration, requiring a complexity akin to that of single pass capacity estimation. We also provide bounds on the embedding capacity. We finally show how ...

  11. Information capacity of quantum observable

    CERN Document Server

    Holevo, A S

    2011-01-01

    In this paper we consider the classical capacities of quantum-classical channels corresponding to measurement of observables. Special attention is paid to the case of continuous observables. We give the formulas for unassisted and entanglement-assisted classical capacities $C,C_{ea}$ and consider some explicitly solvable cases which give new examples of entanglement-breaking channels with $C_{ea}>C.$

  12. Self-adjustment of Carrying Capacity of Concrete Embedded with CFRC

    Institute of Scientific and Technical Information of China (English)

    Wu YAO

    2006-01-01

    By heating up the embedded carbon fiber reinforced cement based material (CFRC), the carrying capacity and deformation of concrete member could be adjusted. The relationship between temperature difference and expansion strain of CFRC was demonstrated, and the temperature-deformation-load effect of concrete embedded with CFRC was studied. Heating the CFRC up to different temperatures resulted in different degree of inner pre-stress in concrete. Thus, the load capacity of concrete could be regulated owing to counteracting the pre-stress.

  13. The Newly Embedded Librarian: Pharmacy Information Liaison Service

    Science.gov (United States)

    Martin, Jennifer R.

    2010-01-01

    Embedded librarianship has emerged as one approach to meeting the ever-evolving information needs of our clients. The University of Arizona Health Sciences Library has endeavored to become more proactive by embedding librarians within each of the four colleges it serves. Although the process of establishing visibility, recognition, and developing…

  14. The Newly Embedded Librarian: Pharmacy Information Liaison Service

    Science.gov (United States)

    Martin, Jennifer R.

    2010-01-01

    Embedded librarianship has emerged as one approach to meeting the ever-evolving information needs of our clients. The University of Arizona Health Sciences Library has endeavored to become more proactive by embedding librarians within each of the four colleges it serves. Although the process of establishing visibility, recognition, and developing…

  15. The embedding capacity of 4-dimensional symplectic ellipsoids, I

    CERN Document Server

    McDuff, Dusa

    2009-01-01

    This paper calculates the function $c(a)$ whose value at $a$ is the infimum of the size of a ball that contains a symplectic image of the ellipsoid $E(1,a)$. (Here $a \\ge 1$ is the ratio of the area of the large axis to that of the smaller axis.) The structure of the graph of $c(a)$ is surprisingly rich. The volume constraint implies that $c(a)$ is always greater than or equal to the square root of $a$, and it is not hard to see that this is equality for large $a$. However, for $a$ less than the fourth power of the golden ratio, $c(a)$ is piecewise linear, with graph that alternately lies on a line through the origin and is horizontal. We prove this by showing that there are exceptional curves in blow ups of the complex projective plane whose homology classes are given by the continued fraction expansions of ratios of Fibonacci numbers. We also calculate $c(a)$ for $a \\ge 7$, showing that it coincides with the square root except on a finite number of intervals where it is again piecewise linear. The embedding...

  16. High capacity embedding with indexed data recovery using adjunctive numerical relations in multimedia signal covers

    Science.gov (United States)

    Collins, James C.; Agaian, Sos S.

    2013-05-01

    We introduce a technique for covertly embedding data throughout an audio file using redundant number system decomposition across non-standard digital bit-lines. This bit-line implementation integrates an index recoverable embedded algorithm with an extended bit level representation that achieves a high capacity data channel within an audio multimedia file. It will be shown this new steganography method has minimal aural distortive affects while preserving both first and second order cover statistics, making it less susceptible to most steganalysis attacks. Our research approach involves reviewing the common numerical methods used in common binary-based algorithms. We then describe basic concepts and challenges when attempting to implement complex embedding algorithms that are based on redundant number systems. Finally, we introduce a novel class of numerical based multiple bit-line decomposition systems, which we define as Adjunctive Numerical Representations. The system is primarily described using basic PCM techniques in uncompressed audio files however extended applications for alternate multimedia is addressed. This new embedding system will not only provide the statistical stability required for effective steganography but will also give us an improvement in the embedding capacity in this class of multimedia carrier files. This novelty of our approach is demonstrated by an ability to embed high capacity covert data while simultaneously providing a means for rapid, indexed data recovery.

  17. Embedded Managers in Informal Learning Spaces

    Science.gov (United States)

    Raisin, Victoria; Fennewald, Joseph

    2016-01-01

    Many universities have decided to invest in updating their informal learning spaces. One decision to be made in planning the space is how to staff it. The researchers carried out a qualitative case study to better understand the perspective of learning space managers who work in offices within their assigned space. The research generated six…

  18. Classical information capacity of superdense coding

    CERN Document Server

    Bowen, G H

    2001-01-01

    Classical communication through quantum channels may be enhanced by sharing entanglement. Superdense coding allows the encoding, and transmission, of up to two classical bits of information in a single qubit. In this paper, the maximum classical channel capacity for states that are not maximally entangled is derived. Particular schemes are then shown to attain this capacity, firstly for pairs of qubits, and secondly for pairs of qutrits.

  19. A Novel and High Capacity Audio Steganography Algorithm Based on Adaptive Data Embedding Positions

    Directory of Open Access Journals (Sweden)

    Haider Ismael Shahadi

    2014-03-01

    Full Text Available In this study, a novel and high embedding capacity audio steganography scheme based on Lifting Wavelet Transform (LWT and adaptive embedding positions is proposed. Specifically, the message data is inserted in the imperceptible positions that chosen from the coefficients of detail sub-bands taking advantage of our proposed Weighted Block Matching (WBM. The WBM is preceded by preparing the cover audio in order to select the bits-positions that can possibly be used for embedding from each detail coefficient based on coefficient amplitude then copy the contents of the selected bits-positions and arrange them in blocks of bits. Also, the message data is arranged in blocks of bits after preprocessed and encrypted. The WBM computes the matching between each message block and whole extracted cover blocks to find the similarity between them. This process help to provide optimal locations to hide the message blocks. These locations are considered as a stego-key that is ciphered and hided within the final detail sub-band which is specified for this purpose. The proposed approach attains higher security than other fixed embedding positions approaches because the random positions for the embedded message blocks based on adaptive selection for embedding positions. Experimental results show that the proposed technique is not only has very high embedding capacity (exceed 300 kbps with excellent transparency (above 35 dB for the cover to noise ratio, but also achieve lossless massage retrieved. Comparisons with the related audio steganography algorithms also show that our proposed scheme outperforms all the selected algorithms.

  20. Embedment Effects on the Vertical Bearing Capacity of Offshore Bucket Foundations on Cohesionless Soil

    DEFF Research Database (Denmark)

    Barari, Amin; Ibsen, Lars Bo; Ghalesari, Abbasali Taghavi;

    2016-01-01

    This paper presents the results from a series of physical modeling and three-dimensional finite 9 element (FE) analyses, which examined the uniaxial vertical capacity of suction caissons for 10 offshore wind turbines. The experiments were carried out in quartz sand and involved monotonic 11 appli...... and FE analyses, new expressions for depth factor of shallow foundations have 15 been validated for embedment ratios (aspect ratios) up to unity, calibrating the fitting parameters 16 by employing data from a range of soil profiles....... application of vertical load. It was found that the drained capacity of suction caissons is 12 dependent on embedment ratio. On the other hand, predictions from conventional semi-empirical 13 depth factors were found to somewhat underestimate when applied to rough foundations. On the 14 basis of the tests...

  1. Direct coupling information measure from non-uniform embedding

    CERN Document Server

    Kugiumtzis, Dimitris

    2013-01-01

    A measure to estimate the direct and directional coupling in multivariate time series is proposed. The measure is an extension of a recently published measure of conditional Mutual Information from Mixed Embedding (MIME) for bivariate time series. In the proposed measure of Partial MIME (PMIME), the embedding is on all observed variables, and it is optimized in explaining the response variable. It is shown that PMIME detects correctly direct coupling, and outperforms the (linear) conditional Granger causality and the partial transfer entropy. We demonstrate that PMIME does not rely on significance test and embedding parameters, and the number of observed variables has no effect on its statistical accuracy, it may only slow the computations. The importance of these points is shown in simulations and in an application to epileptic multi-channel scalp EEG.

  2. A Study on the Thermal Effect of the Current-Carrying Capacity of Embedded Underground Cable

    Directory of Open Access Journals (Sweden)

    LI Dewen

    2012-10-01

    Full Text Available The current paper aims to study embedded underground cable and the effect of temperature that surrounds it. Determining the carrying capacity of the cable is important to predict the temperature changesin the embedded pipe. Simulating the temperature field and the laying environment according to the IEC standard enables the calculation of the carrying capacity of the buried region. According to the theoryof heat transfer, the embedded pipe tube model temperature field should be coupled with a numerical model. The domain and boundary conditions of the temperature field should also be determined using the 8.7/15kV YJV 400 cable. In conducting numerical calculation and analysis using the temperature field model, the two-dimensional temperature distribution of the emission control area should be determined. The experimental results show that the simulation isconsistent with the IEC standard. Furthermore, in identifying the cable ampacity, the different seasons and different cable rows should be taken into account using the finite element method. Finally, theappropriate choice of root and circuit numbers of the cable will improve the cable’s the carrying capacity.

  3. A new method for high-capacity information hiding in video robust against temporal desynchronization

    Science.gov (United States)

    Mitekin, Vitaly; Fedoseev, Victor A.

    2015-02-01

    This paper presents a new method for high-capacity information hiding in digital video and algorithms of embedding and extraction of hidden information based on this method. These algorithms do not require temporal synchronization to provide robustness against both malicious and non-malicious frame dropping (temporal desynchronization). At the same time, due to randomized distribution of hidden information bits across the video frames, the proposed method allows to increase the hiding capacity proportionally to the number of frames used for information embedding. The proposed method is also robust against "watermark estimation" attack aimed at estimation of hidden information without knowing the embedding key or non-watermarked video. Presented experimental results demonstrate declared features of this method.

  4. The Embedded Information Acquisition System of Forest Resource

    Directory of Open Access Journals (Sweden)

    Chao Ni

    2012-11-01

    Full Text Available Forest resource is the material basis of forestry production and forestry sustainable development. Mastering the basic status of forest resource provides effective basis for forest resource’s scientific management. Nowadays the concept of “Digital Forestry” is put forward and 3S technology is used in forestry.  Therefore the   embedded system of forest resource information acquisition has been designed which integrated embedded technology with GIS, 3G wireless communication technology and GPS. After analyzing the requirement of forestry resource, the overall structure has been established and the system has been developed by using the advanced demo-board OMAP3530.There are  six functions including system login, data acquisition, data manage, map operation, GPS positioning and navigation, temperature and humidity measuring to enhance working efficiency, reduce power consumption and get real-time data. On the building Qt/Embedded platform, the upper application program interface is designed. Linux system and applications are successful transplanted. Adopting GPS technology, real-time positioning, navigation and latitude and longitude display functions are achieved. At the same time, the collected small class survey data and temperature and humidity data can be saved; the data can be uploaded and downloaded by using 3G module from internet. The embedded system of forest resource information acquisition has been verified in Lianyungang Xinpu district forest of China, which gives a good guide to forestry management.

  5. Embedding

    DEFF Research Database (Denmark)

    Høyrup, Jens

    2016-01-01

    “Embedding” as a technical concept comes from linguistics, more precisely from grammar. The present paper investigates whether it can be applied fruitfully to certain questions that have been investigated by historians (and sometimes philosophers) of mathematics: 1. The construction of numeral sy...... spatial and linguistic embedding and concludes that the spatio-linguistic notion of embedding can be meaningfully applied to the former two discussions, whereas the apparent embedding of older within new theories is rather an ideological mirage....

  6. System for non-disruptive high-capacity indexed data embedding and recovery using multimedia signal covers

    Science.gov (United States)

    Collins, James C.; Agaian, Sos S.

    2011-06-01

    Over the past several years there has been an apparent shift in research focus in the area of digital steganography and steganalysis - a shift from primarily image based methods to a new focus on broader multimedia techniques. More specifically the area of digital audio steganography is of prime interest. We introduce a new high capacity, covert channel data embedding and recovery system for digital audio carrier files using a key based encoding and decoding method. It will be shown that the added information file is interleaved within the carrier file and is fully indexed allowing for segmented extraction and recovery of data at chosen start and stop points in the sampled stream. The original audio quality is not affected by the addition of this covert data. The embedded information can also be secured by a binary key string or cryptographic algorithm and resists statistical analytic detection attempts. We will also describe how this new method can be used for data compression and expansion applications in the transfer and storage of digital multimedia to increase the overall data capacity and security.

  7. Information capacity of genetic regulatory elements

    Science.gov (United States)

    Tkačik, Gašper; Callan, Curtis G., Jr.; Bialek, William

    2008-07-01

    Changes in a cell’s external or internal conditions are usually reflected in the concentrations of the relevant transcription factors. These proteins in turn modulate the expression levels of the genes under their control and sometimes need to perform nontrivial computations that integrate several inputs and affect multiple genes. At the same time, the activities of the regulated genes would fluctuate even if the inputs were held fixed, as a consequence of the intrinsic noise in the system, and such noise must fundamentally limit the reliability of any genetic computation. Here we use information theory to formalize the notion of information transmission in simple genetic regulatory elements in the presence of physically realistic noise sources. The dependence of this “channel capacity” on noise parameters, cooperativity and cost of making signaling molecules is explored systematically. We find that, in the range of parameters probed by recent in vivo measurements, capacities higher than one bit should be achievable. It is of course generally accepted that gene regulatory elements must, in order to function properly, have a capacity of at least one bit. The central point of our analysis is the demonstration that simple physical models of noisy gene transcription, with realistic parameters, can indeed achieve this capacity: it was not self-evident that this should be so. We also demonstrate that capacities significantly greater than one bit are possible, so that transcriptional regulation need not be limited to simple “on-off” components. The question whether real systems actually exploit this richer possibility is beyond the scope of this investigation.

  8. Information capacities of quantum measurement channels

    Science.gov (United States)

    Holevo, A. S.

    2013-03-01

    We study the relation between the unassisted and entanglement-assisted classical capacities C and Cea of entanglement-breaking channels. We argue that the gain of entanglement assistance Cea/C > 1 generically for measurement channels with unsharp observables; in particular for the measurements with pure posterior states the information loss in the entanglement-assisted protocol is zero, resulting in an arbitrarily large gain for very noisy or weak signal channels. This is illustrated by examples of continuous observables corresponding to state tomography in finite dimensions and heterodyne measurement. In contrast, state preparations are characterized by the property of having no gain of entanglement assistance, Cea/C = 1.

  9. STEGANOGRAPHIC METHOD VERIFYING THE INTEGRITY AND AUTHENTICITY OF EMBEDDED INFORMATION

    Directory of Open Access Journals (Sweden)

    Kobozeva A.A.

    2014-12-01

    Full Text Available The paper focuses on the steganographic method that carries out simultaneous effective solution for creation of covert communication channel within the channel for public use, check of the integrity and authenticity of the transmitted additional information. These tasks define the so-called three-pronged task (TT that is of current interest, but today, according to the data available from the open press, has no satisfactory solution. This is connected with the complexity of TT and moreover a covert communication channel itself requires additional guaranteeing the reliability of perception and insensitivity of formed steganomessage against disturbing influences. The digital image stands as a container. The additional embedded information that is the result of pre-primary encoding of confidential information and the subsequent secondary coding using a secret key for authentication is represented as a binary sequence. Developed steganomethod for solving TT, ensures the reliability of perception of formed steganomessage, is resistant to attacks against embedded messages and allows to effectively decode the transmitted information even in the event of a breach of its integrity, that is evidenced by the results of a computational experiment.

  10. An object tracking algorithm with embedded gyro information

    Science.gov (United States)

    Zhang, Yutong; Yan, Ding; Yuan, Yating

    2017-01-01

    The high speed attitude maneuver of Unmanned Aerial Vehicle (UAV) always causes large motion between adjacent frames of the video stream produced from the camera fixed on the UAV body, which will severely disrupt the performance of image object tracking process. To solve this problem, this paper proposes a method that using a gyroscope fixed on the camera to measure the angular velocity of camera, and then the object position's substantial change in the video stream is predicted. We accomplished the object tracking based on template matching. Experimental result shows that the object tracking algorithm's performance is improved in its efficiency and robustness with embedded gyroscope information.

  11. Visual words assignment via information-theoretic manifold embedding.

    Science.gov (United States)

    Deng, Yue; Li, Yipeng; Qian, Yanjun; Ji, Xiangyang; Dai, Qionghai

    2014-10-01

    Codebook-based learning provides a flexible way to extract the contents of an image in a data-driven manner for visual recognition. One central task in such frameworks is codeword assignment, which allocates local image descriptors to the most similar codewords in the dictionary to generate histogram for categorization. Nevertheless, existing assignment approaches, e.g., nearest neighbors strategy (hard assignment) and Gaussian similarity (soft assignment), suffer from two problems: 1) too strong Euclidean assumption and 2) neglecting the label information of the local descriptors. To address the aforementioned two challenges, we propose a graph assignment method with maximal mutual information (GAMI) regularization. GAMI takes the power of manifold structure to better reveal the relationship of massive number of local features by nonlinear graph metric. Meanwhile, the mutual information of descriptor-label pairs is ultimately optimized in the embedding space for the sake of enhancing the discriminant property of the selected codewords. According to such objective, two optimization models, i.e., inexact-GAMI and exact-GAMI, are respectively proposed in this paper. The inexact model can be efficiently solved with a closed-from solution. The stricter exact-GAMI nonparametrically estimates the entropy of descriptor-label pairs in the embedding space and thus leads to a relatively complicated but still trackable optimization. The effectiveness of GAMI models are verified on both the public and our own datasets.

  12. Embedding

    DEFF Research Database (Denmark)

    Høyrup, Jens

    2015-01-01

    to become the starting point not only for theoretical algebra, but for the whole transformation of mathematics from his time onward: the possibility of embedding, that is, of making a symbol or an element of a calculation stand not only for a single number, determined or undetermined, but for a whole...

  13. Information storage capacity of discrete spin systems

    CERN Document Server

    Yoshida, Beni

    2011-01-01

    What is the limit of information storage capacity of discrete spin systems? To answer this question, we study classical error-correcting codes which can be physically realized as the energy ground space of gapped local Hamiltonians. For discrete spin systems on a D-dimensional lattice governed by local frustration-free Hamiltonians, the following bound is known to hold; $kd^{1/D}\\leq O(n)$ where k is the number of encodable logical bits, d is the code distance, and n is the total number of spins in the system. Yet, previously found codes were far below this bound and it remained open whether there exists an error-correcting code which saturates the bound or not. Here, we give a construction of local spin systems which saturate the bound asymptotically with $k \\sim O(L^{D-1})$ and $d \\sim O(L^{D-\\epsilon})$ for an arbitrary small $\\epsilon> 0$ where L is the linear length of the system. Our model borrows an idea from a fractal geometry arising in Sierpinski triangle.

  14. Spatial Information Capacity of Compound Eyes

    NARCIS (Netherlands)

    Snyder, Allan W.; Stavenga, Doekele G.; Laughlin, Simon B.

    1977-01-01

    The capacity of the compound eye to perceive its spatial environment is quantified by determining the number of different pictures that can be reconstructed by its array of retinula cells. We can then decide on the best compromise between an animal's capacity for fine detail and contrast sensitivity

  15. Information Capacity of Energy Harvesting Sensor Nodes

    CERN Document Server

    Rajesh, R

    2010-01-01

    Sensor nodes with energy harvesting sources are gaining popularity due to their ability to improve the network life time and are becoming a preferred choice supporting 'green communication'. We study such a sensor node with an energy harvesting source and compare various architectures by which the harvested energy is used. We find its Shannon capacity when it is transmitting its observations over an AWGN channel and show that the capacity achieving energy management policy is the same as the throughput optimal policy. We also obtain the capacity for the system with energy inefficiencies in storage and an achievable rate when energy conserving sleep-wake modes are supported.

  16. Finite Element Analysis of the Effect on Edge Distance of the Tensile Bearing Capacity of Embedded Hanging Parts

    OpenAIRE

    Meng Xian Hong; Liu Wei

    2016-01-01

    In order to explore the trend of tensile bearing capacity of embedded hanging parts when change the edge distance. Based on the finite element analysis software ABAQUS, the four simulation model was established. The buried depth and strength of concrete remain unchanged, but the edge distance was gradient change. By the load - displacement curve of every model known, the greater the edge distance, the greater the bearing capacity. When the edge distance reaches 1.5 times buried depth, the eff...

  17. Finite Element Analysis of the Effect on Edge Distance of the Tensile Bearing Capacity of Embedded Hanging Parts

    Directory of Open Access Journals (Sweden)

    Meng Xian Hong

    2016-01-01

    Full Text Available In order to explore the trend of tensile bearing capacity of embedded hanging parts when change the edge distance. Based on the finite element analysis software ABAQUS, the four simulation model was established. The buried depth and strength of concrete remain unchanged, but the edge distance was gradient change. By the load - displacement curve of every model known, the greater the edge distance, the greater the bearing capacity. When the edge distance reaches 1.5 times buried depth, the effect of increasing edge distance for improving the bearing capacity will be impaired.

  18. 2009 Capacity Building For Library and Information Centre ...

    African Journals Online (AJOL)

    discussed the features of digitized/virtual library and information centre and the need for capacity building especially in ... education and training and the basic questions to address in capacity building plans and strategies. .... electronic library, virtual reality, digital library, .... information science schools and similar others to.

  19. Information carrying capacity of a cosmological constant

    Science.gov (United States)

    Simidzija, Petar; Martín-Martínez, Eduardo

    2017-01-01

    We analyze the exchange of information in different cosmological backgrounds when sender and receiver are timelike separated and communicate through massless fields (without the exchange of light signals). Remarkably, we show that the dominance of a cosmological constant makes the amount of recoverable information imprinted in the field by the sender extremely resilient: it does not decay in time or with the spatial separation of the sender and receiver, and it actually increases with the rate of expansion of the Universe. This is in stark contrast with the information carried by conventional light signals and with previous results on timelike communication through massless fields in matter-dominated cosmologies.

  20. Imaging system design for improved information capacity

    Science.gov (United States)

    Fales, C. L.; Huck, F. O.; Samms, R. W.

    1984-01-01

    Shannon's theory of information for communication channels is used to assess the performance of line-scan and sensor-array imaging systems and to optimize the design trade-offs involving sensitivity, spatial response, and sampling intervals. Formulations and computational evaluations account for spatial responses typical of line-scan and sensor-array mechanisms, lens diffraction and transmittance shading, defocus blur, and square and hexagonal sampling lattices.

  1. Information storage capacity of incompletely connected associative memories.

    Science.gov (United States)

    Bosch, Holger; Kurfess, Franz J.

    1998-07-01

    In this paper, the memory capacity of incompletely connected associative memories is investigated. First, the capacity is derived for memories with fixed parameters. Optimization of the parameters yields a maximum capacity between 0.53 and 0.69 for hetero-association and half of it for autoassociation improving previously reported results. The maximum capacity grows with increasing connectivity of the memory and requires sparse input and output patterns. Further, parameters can be chosen in such a way that the information content per pattern asymptotically approaches 1 with growing size of the memory.

  2. Absorptive Capacity of Information Technology and Its Conceptual Model

    Institute of Scientific and Technical Information of China (English)

    BI Xinhua; YU Cuiling

    2008-01-01

    In order to examine the problem of how to improve the use of information technology (IT) in enterprises, this paper makes an exploration from the perspective of organizational absorptive capacity. We propose the concept of IT absorptive capacity from an organizational level. A dynamic process model is developed to further analyze IT absorption. IT absorptive capacity of this process is embodied as six forms: identification, adoption, adaptation, acceptance, infusion, and knowledge management. By means of questionnaire surveys of 76 Chinese enterprises, the main factors that favor or disable the capacity of each stage are discovered. Using the method of system dynamics, a conceptual model of IT absorptive capacity is developed to analyze the action mechanism of the factors in detail. The model indicates that the critical factors are embodied in the aspect of management. Furthermore, it demonstrates that IT absorption is a spiral process, during which IT absorptive capacity evolves dynamically and, consequently, promotes IT use.

  3. Dual-Size Silicon Nanocrystal-Embedded SiO(x) Nanocomposite as a High-Capacity Lithium Storage Material.

    Science.gov (United States)

    Park, Eunjun; Yoo, Hyundong; Lee, Jaewoo; Park, Min-Sik; Kim, Young-Jun; Kim, Hansu

    2015-07-28

    SiOx-based materials attracted a great deal of attention as high-capacity Li(+) storage materials for lithium-ion batteries due to their high reversible capacity and good cycle performance. However, these materials still suffer from low initial Coulombic efficiency as well as high production cost, which are associated with the complicated synthesis process. Here, we propose a dual-size Si nanocrystal-embedded SiOx nanocomposite as a high-capacity Li(+) storage material prepared via cost-effective sol-gel reaction of triethoxysilane with commercially available Si nanoparticles. In the proposed nanocomposite, dual-size Si nanocrystals are incorporated into the amorphous SiOx matrix, providing a high capacity (1914 mAh g(-1)) with a notably improved initial efficiency (73.6%) and stable cycle performance over 100 cycles. The highly robust electrochemical and mechanical properties of the dual-size Si nanocrystal-embedded SiOx nanocomposite presented here are mainly attributed to its peculiar nanoarchitecture. This study represents one of the most promising routes for advancing SiOx-based Li(+) storage materials for practical use.

  4. Thermodynamic Rule Determining the Biological DNA Information Capacity

    CERN Document Server

    Widom, A; Srivastava, Y N; Sivasubramanian, S; Valenzi, V I

    2012-01-01

    A rigorous thermodynamic expression is derived for the total biological information capacity per unit length of a DNA molecule. The total information includes the usual four letter coding sequence information plus that excess information coding often erroneously referred to as "junk". We conclude that the currently understood human DNA code is about a hundred megabyte program written on a molecule with about a ten gigabyte memory. By far, most of the programing code is not presently understood.

  5. Information channel capacity in the field theory estimation

    Energy Technology Data Exchange (ETDEWEB)

    Sładkowski, J., E-mail: jan.sladkowski@us.edu.pl [Department of Astrophysics and Cosmology, Institute of Physics, University of Silesia, Uniwersytecka 4, 40-007 Katowice (Poland); Syska, J., E-mail: jacek.syska@us.edu.pl [Department of Field Theory and Particle Physics, Institute of Physics, University of Silesia, Uniwersytecka 4, 40-007 Katowice (Poland)

    2012-12-03

    The construction of the information capacity for the vector position parameter in the Minkowskian space–time is presented. This lays the statistical foundations of the kinematical term of the Lagrangian of the physical action for many field theory models, derived by the extremal physical information method of Frieden and Soffer.

  6. The capacity of black holes to transmit quantum information

    Energy Technology Data Exchange (ETDEWEB)

    Brádler, Kamil [Department of Astronomy and Physics, Saint Mary’s University,Halifax, Nova Scotia, B3H 3C3 (Canada); Adami, Christoph [Department of Physics and Astronomy, Michigan State University,East Lansing, MI 48824 (United States)

    2014-05-21

    We study the properties of the quantum information transmission channel that emerges from the quantum dynamics of particles interacting with a black hole horizon. We calculate the quantum channel capacity in two limiting cases where a single-letter capacity is known to exist: the limit of perfectly reflecting and perfectly absorbing black holes. We find that the perfectly reflecting black hole channel is closely related to the Unruh channel and that its capacity is non-vanishing, allowing for the perfect reconstruction of quantum information outside of the black hole horizon. We also find that the complementary channel (transmitting entanglement behind the horizon) is entanglement-breaking in this case, with vanishing capacity. We then calculate the quantum capacity of the black hole channel in the limit of a perfectly absorbing black hole and find that this capacity vanishes, while the capacity of the complementary channel is non-vanishing instead. Rather than inviting a new crisis for quantum physics, this finding instead is in accordance with the quantum no-cloning theorem, because it guarantees that there are no space-like surfaces that contain both the sender’s quantum state and the receiver’s reconstructed quantum state.

  7. Has the Brain Maximized its Information Storage Capacity?

    CERN Document Server

    Stepanyants, A L

    2003-01-01

    Learning and memory may rely on the ability of neuronal circuits to reorganize by dendritic spine remodeling. We have looked for geometrical parameters of cortical circuits, which maximize information storage capacity associated with this mechanism. In particular, we calculated optimal volume fractions of various neuropil components. The optimal axonal and dendritic volume fractions are not significantly different from anatomical measurements in the mouse and rat neocortex, and the rat hippocampus. This has led us to propose that the maximization of information storage capacity associated with dendritic spine remodeling may have been an important driving force in the evolution of the cortex.

  8. Numerical Analyses of Bearing Capacity of Deep-Embedded Large-Diameter Cylindrical Structure on Soft Ground Against Lateral Loads

    Institute of Scientific and Technical Information of China (English)

    LUAN Mao-tian; FAN Qing-lai

    2006-01-01

    Presented in this paper is a three-dimensional plastic limit analysis method of bearing capacity of the deeply-embedded large-diameter cylindrical structure in the cross-anisotropic soft ground. The most likely failure mechanism is assumed to be of a composite rupture surface which is composed of an individual wedge in the passive zone or two wedges in both active and passive zones near the mudline, depending on the separation or bonding state at the interface between the cylindrical structure and neighboring soils in the active wedge, and a truncated spherical slip surface at the base of the cylinder when the structure tends to overturn around a point located on the symmetry axis of the structure. The cylindrical structure and soil interaction system under consideration is also numerically analyzed by the finite element method by virtue of the general-purpose FEM software ABAQUS, in which the soil is assumed to obey tie Hill's criterion of yield. Both the failure mechanism assumed and the plastic limit analysis predictions are validated by numerical computations based on FEM. For the K0-consolidated ground of clays typically with anisotropic undrained strength property, it is indicated through a parametric study that limit analysis without consideration of anisotropy of soil overestimates the lateral ultimate bearing capacity of a deeply-embedded cylindrical structure in soft ground in a certain condition.

  9. Nonlinear limits to the information capacity of optical fiber communications

    CERN Document Server

    Mitra, P P; Mitra, Partha P.; Stark, Jason B.

    2000-01-01

    The exponential growth in the rate at which information can be communicated through an optical fiber is a key element in the so called information revolution. However, like all exponential growth laws, there are physical limits to be considered. The nonlinear nature of the propagation of light in optical fiber has made these limits difficult to elucidate. Here we obtain basic insights into the limits to the information capacity of an optical fiber arising from these nonlinearities. The key simplification lies in relating the nonlinear channel to a linear channel with multiplicative noise, for which we are able to obtain analytical results. In fundamental distinction to the linear additive noise case, the capacity does not grow indefinitely with increasing signal power, but has a maximal value. The ideas presented here have broader implications for other nonlinear information channels, such as those involved in sensory transduction in neurobiology. These have been often examined using additive noise linear cha...

  10. Disclosing personal health information relating to adults who lack capacity.

    Science.gov (United States)

    Griffith, Richard

    2014-03-01

    The need to share information about patients is vital to effective care and protection, especially where it relates to adults who lack decision-making capacity but it has to be balanced against the right to confidentiality. Like other health professionals, district nurses have a duty to maintain the confidentiality of patient information, and incapable adults have the right to expect their personal health information to be kept private. This right is guaranteed by the common-law duty of confidence, the Data Protection Act 1998 and the NHS Care Record Guarantee and confidentiality policy. This article discusses the district nurse's legal obligations when considering sharing information in relation to an incapable adult

  11. Efficient physical embedding of topologically complex information processing networks in brains and computer circuits.

    Directory of Open Access Journals (Sweden)

    Danielle S Bassett

    2010-04-01

    Full Text Available Nervous systems are information processing networks that evolved by natural selection, whereas very large scale integrated (VLSI computer circuits have evolved by commercially driven technology development. Here we follow historic intuition that all physical information processing systems will share key organizational properties, such as modularity, that generally confer adaptivity of function. It has long been observed that modular VLSI circuits demonstrate an isometric scaling relationship between the number of processing elements and the number of connections, known as Rent's rule, which is related to the dimensionality of the circuit's interconnect topology and its logical capacity. We show that human brain structural networks, and the nervous system of the nematode C. elegans, also obey Rent's rule, and exhibit some degree of hierarchical modularity. We further show that the estimated Rent exponent of human brain networks, derived from MRI data, can explain the allometric scaling relations between gray and white matter volumes across a wide range of mammalian species, again suggesting that these principles of nervous system design are highly conserved. For each of these fractal modular networks, the dimensionality of the interconnect topology was greater than the 2 or 3 Euclidean dimensions of the space in which it was embedded. This relatively high complexity entailed extra cost in physical wiring: although all networks were economically or cost-efficiently wired they did not strictly minimize wiring costs. Artificial and biological information processing systems both may evolve to optimize a trade-off between physical cost and topological complexity, resulting in the emergence of homologous principles of economical, fractal and modular design across many different kinds of nervous and computational networks.

  12. Embedment Effects on the Vertical Bearing Capacity of Offshore Bucket Foundations on Cohesionless Soil

    DEFF Research Database (Denmark)

    Barari, Amin; Ibsen, Lars Bo; Ghalesari, Abbasali Taghavi

    2017-01-01

    This paper presents the results from a series of physical modeling and three-dimensional finite 9 element (FE) analyses, which examined the uniaxial vertical capacity of suction caissons for 10 offshore wind turbines. The experiments were carried out in quartz sand and involved monotonic 11 appli...

  13. Ergodic Capacity of Cognitive Radio under Imperfect Channel State Information

    CERN Document Server

    Rezk, Zouheir

    2012-01-01

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel state information (CSI) of the secondary link, but knows only the statistics and an estimated version of the secondary transmitter-primary receiver (ST-PR) link, is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels (with continuous probability density function) under average and peak transmit-power constraints and with respect to two different interference constraints: an interference outage constraint and a signal-to-interference outage constraint. When applied to Rayleigh fading channels, our results show, for instance, that the interference constraint is harmful at high-power regime in the sense that the capacity does not increase with the power, whereas at low-power regime, it has a marginal impact and no-interference performance corresponding to the ergodic capacity under average or peak transmit power constraint in absence of ...

  14. Increase The Absorptive Capacity Of Light Of The Photocells By Embedded In Bow-tie Antenna

    Energy Technology Data Exchange (ETDEWEB)

    Zhu Chenguang [School of Science, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); Lang Peilin [Key Laboratory of Information Photonics and Optical Communications (BUPT), Ministry of Education, Beijing 100876 (China); Zhang Ru, E-mail: napolles@sohu.com

    2011-02-01

    The application of silicon photocells has been widely used in biological and energy field, how to improve the efficiency of silicon photocells has become the research hot spots. The light absorption efficiency is not ideal, only 10% to 20% of solar energy can be transformed into electricity, the paper embeds metal bow-tie antenna in the crystals of silicon, by the field enhancement of the surface plasma, it highly increase the absorptive capacity of light of the silicon photocells.

  15. Working Memory Capacity and Redundant Information Processing Efficiency

    Directory of Open Access Journals (Sweden)

    Michael John Endres

    2015-05-01

    Full Text Available Working memory capacity (WMC is typically measured by the amount of task-relevant information an individual can keep in mind while resisting distraction or interference from task irrelevant information. The current research investigated the extent to which differences in WMC were associated with performance on a novel redundant memory probes (RMP task that systematically varied the amount of to-be-remembered (targets and to-be-ignored (distractor information. The RMP task was designed to both facilitate and inhibit working memory search processes, as evidenced by differences in accuracy, response time, and Linear Ballistic Accumulator (LBA model estimates of information processing efficiency. Participants (N = 170 completed standard intelligence tests and dual-span WMC tasks, along with the RMP task. As expected, accuracy, response-time, and LBA model results indicated memory search and retrieval processes were facilitated under redundant- target conditions, but also inhibited under mixed target/distractor and redundant-distractor conditions. Repeated measures analyses also indicated that, while individuals classified as high (n = 85 and low (n = 85 WMC did not differ in the magnitude of redundancy effects, groups did differ in the efficiency of memory search and retrieval processes overall. Results suggest that redundant information reliably facilitates and inhibits the efficiency or speed of working memory search, and these effects are independent of more general limits and individual differences in the capacity or space of working memory.

  16. Embedded Information Literacy in the Basic Oral Communication Course: From Conception through Assessment

    Science.gov (United States)

    Weaver, Kari D.; Pier, Penni M.

    2010-01-01

    This article explores the process of embedding information literacy into a basic oral communication course. Discussion includes student performance as an impetus for change, collaborative course design between the oral communication teaching team and instructional librarians, and assessment initiatives. Suggestions for future collaborative work…

  17. Secure information embedding into 1D biomedical signals based on SPIHT.

    Science.gov (United States)

    Rubio, Oscar J; Alesanco, Alvaro; García, José

    2013-08-01

    This paper proposes an encoding system for 1D biomedical signals that allows embedding metadata and provides security and privacy. The design is based on the analysis of requirements for secure and efficient storage, transmission and access to medical tests in e-health environment. This approach uses the 1D SPIHT algorithm to compress 1D biomedical signals with clinical quality, metadata embedding in the compressed domain to avoid extra distortion, digital signature to implement security and attribute-level encryption to support Role-Based Access Control. The implementation has been extensively tested using standard electrocardiogram and electroencephalogram databases (MIT-BIH Arrhythmia, MIT-BIH Compression and SCCN-EEG), demonstrating high embedding capacity (e.g. 3 KB in resting ECGs, 200 KB in stress tests, 30 MB in ambulatory ECGs), short delays (2-3.3s in real-time transmission) and compression of the signal (by ≃3 in real-time transmission, by ≃5 in offline operation) despite of the embedding of security elements and metadata to enable e-health services.

  18. Evaluation of protein immobilization capacity on various carbon nanotube embedded hydrogel biomaterials

    Energy Technology Data Exchange (ETDEWEB)

    Derkus, Burak, E-mail: burakderkus@gmail.com; Emregul, Kaan Cebesoy; Emregul, Emel

    2015-11-01

    This study investigates effective immobilization of proteins, an important procedure in many fields of bioengineering and medicine, using various biomaterials. Gelatin, alginate and chitosan were chosen as polymeric carriers, and applied in both their composites and nanocomposite forms in combination with carbon nanotubes (CNTs). The prepared nano/composite structures were characterized using scanning electron microscopy (SEM), Fourier-transform infrared spectroscopy (FTIR), thermal gravimetric analysis (TG) and contact angle analysis (CA). Electrochemical impedance spectroscopy analysis revealed gelatin composites in general to exhibit better immobilization performance relative to the native gelatin which can be attributed to enhanced film morphologies of the composite structures. Moreover, superior immobilization efficiencies were obtained with the addition of carbon nanotubes, due to their conducting and surface enhancement features, especially in the gelatin–chitosan structures due to the presence of structural active groups. - Highlights: • Various nanocomposite biomaterials were developed for efficient immobilization of proteins. • CNTs enhance the immobilization efficiency owing to their conducting and surface enhancement features. • Gelatin–chitosan–CNTs structure is promising immobilization matrix thanks to its effective CNTs binding capacity.

  19. The Effects of Embedding Information Technologies within ELT on EFL Learners’ Motivation and Interest

    OpenAIRE

    Shaker Al-Mohammadi; Emira Derbel

    2014-01-01

    In today’s globalised world, technologies have been embedded in every aspect of daily activities and discourses. The field of education made no exception and hence technologies have become an integral part of all educational systems worldwide, but with different levels and layers. The presence of information technology in English language teaching has brought about notable changes for teachers and learners alike. Accordingly, this paper investigates the impact of integrating information techn...

  20. Information capacity in the weak-signal approximation

    CERN Document Server

    Kostal, Lubomir

    2010-01-01

    We derive an approximate expression for mutual information in a broad class of discrete-time stationary channels with continuous input, under the constraint of vanishing input amplitude or power. The approximation describes the input by its covariance matrix, while the channel properties are described by the Fisher information matrix. This separation of input and channel properties allows us to analyze the optimality conditions in a convenient way. We show that input correlations in memoryless channels do not affect channel capacity since their effect decreases fast with vanishing input amplitude or power. On the other hand, for channels with memory, properly matching the input covariances to the dependence structure of the noise may lead to almost noiseless information transfer, even for intermediate values of the noise correlations. Since many model systems described in mathematical neuroscience and biophysics operate in the high noise regime and weak-signal conditions, we believe, that the described result...

  1. RMT Assessments of the Market Latent Information Embedded in the Stocks' Raw, Normalized, and Partial Correlations

    Directory of Open Access Journals (Sweden)

    Dror Y. Kenett

    2009-01-01

    Full Text Available We present here assessment of the latent market information embedded in the raw, affinity (normalized, and partial correlations. We compared the Zipf plot, spectrum, and distribution of the eigenvalues for each matrix with the results of the corresponding random matrix. The analysis was performed on stocks belonging to the New York and Tel Aviv Stock Exchange, for the time period of January 2000 to March 2009. Our results show that in comparison to the raw correlations, the affinity matrices highlight the dominant factors of the system, and the partial correlation matrices contain more information. We propose that significant stock market information, which cannot be captured by the raw correlations, is embedded in the affinity and partial correlations. Our results further demonstrate the differences between NY and TA markets.

  2. Embedding strategies for effective use of information from multiple sequence alignments.

    OpenAIRE

    1997-01-01

    We describe a new strategy for utilizing multiple sequence alignment information to detect distant relationships in searches of sequence databases. A single sequence representing a protein family is enriched by replacing conserved regions with position-specific scoring matrices (PSSMs) or consensus residues derived from multiple alignments of family members. In comprehensive tests of these and other family representations, PSSM-embedded queries produced the best results overall when used with...

  3. Engaging the learner: Embedding information literacy skills into a biotechnology degree.

    Science.gov (United States)

    Ward, Helena; Hockey, Julie

    2007-09-01

    One of the challenges of the Biotechnology industry is keeping up to date with the rapid pace of change and that much of the information, which students learn in their undergraduate studies, will be out of date in a few years. It is therefore crucial that Biotechnology students have the skills to access the relevant information for their studies and critically evaluate the vast volume of information and its sources. By developing information literacy skills, which are part of lifelong learning, Biotechnology graduates are better prepared for their careers. Students also need to understand the issues related to the use of information such as social, political, ethical, and legal implications. This paper will outline the embedding of information literacy skills within the Biotechnology degree at the University of South Australia. Examples of specific activities and their link to assessment will be discussed.

  4. Human tool-making capacities reflect increased information-processing capacities: continuity resides in the eyes of the beholder.

    Science.gov (United States)

    Gibson, Kathleen R

    2012-08-01

    Chimpanzee/human technological differences are vast, reflect multiple interacting behavioral processes, and may result from the increased information-processing and hierarchical mental constructional capacities of the human brain. Therefore, advanced social, technical, and communicative capacities probably evolved together in concert with increasing brain size. Interpretations of these evolutionary and species differences as continuities or discontinuities reflect differing scientific perspectives.

  5. Impact and user satisfaction of a clinical information portal embedded in an electronic health record.

    Science.gov (United States)

    Tannery, Nancy H; Epstein, Barbara A; Wessel, Charles B; Yarger, Frances; LaDue, John; Klem, Mary Lou

    2011-01-01

    In 2008, a clinical information tool was developed and embedded in the electronic health record system of an academic medical center. In 2009, the initial information tool, Clinical-e, was superseded by a portal called Clinical Focus, with a single search box enabling a federated search of selected online information resources. To measure the usefulness and impact of Clinical Focus, a survey was used to gather feedback about users' experience with this clinical resource. The survey determined what type of clinicians were using this tool and assessed user satisfaction and perceived impact on patient care decision making. Initial survey results suggest the majority of respondents found Clinical Focus easy to navigate, the content easy to read, and the retrieved information relevant and complete. The majority would recommend Clinical Focus to their colleagues. Results indicate that this tool is a promising area for future development.

  6. The Effects of Embedding Information Technologies within ELT on EFL Learners’ Motivation and Interest

    Directory of Open Access Journals (Sweden)

    Shaker Al-Mohammadi

    2014-01-01

    Full Text Available In today’s globalised world, technologies have been embedded in every aspect of daily activities and discourses. The field of education made no exception and hence technologies have become an integral part of all educational systems worldwide, but with different levels and layers. The presence of information technology in English language teaching has brought about notable changes for teachers and learners alike. Accordingly, this paper investigates the impact of integrating information technologies in ELT on EFL learners’ motivation and interest. Based on an authentic comparative case study, this paper explores the influence of information technology on EFL learners’ perceptions, motivation, and interest in the context of ELT in the Tunisian higher education. The findings of this study suggest that the integration of IT in ELT heavily affects EFL students’ motivation and academic performance and hence EFL instructors should take this variable into consideration.

  7. Information Theoretic Exemplification of the Impact of Transmitter-Receiver Cognition on the Channel Capacity

    CERN Document Server

    Anzabi-Nezhad, Nima S; Kakhki, Mohammad Molavi

    2011-01-01

    In this paper, we study, information theoretically, the impact of transmitter and or receiver cognition on the channel capacity. The cognition can be described by state information, dependent on the channel noise and or input. Specifically, as a new idea, we consider the receiver cognition as a state information dependent on the noise and we derive a capacity theorem based on the Gaussian version of the Cover-Chiang capacity theorem for two-sided state information channel. As intuitively expected, the receiver cognition increases the channel capacity and our theorem shows this increase quantitatively. Also, our capacity theorem includes the famous Costa theorem as its special cases.

  8. Processing of self-related kinematic information embedded in static handwritten characters.

    Science.gov (United States)

    Sawada, Reiko; Doi, Hirokazu; Masataka, Nobuo

    2016-07-01

    Handwritten characters are generated by our own motor actions, and previous studies have shown that the manner in which such characters are perceived and generated is related. However, the temporal course of the neural activation involved in the processing of self-related kinematic information embedded in static handwritten characters remains to be identified. We applied event-related potential (ERP) recording while participants judged whether handwritten characters were self- or non-self-generated. To test the effects of the self-related kinematic characteristics of static handwritten characters, we conducted two experiments in which the styles or familiarity of characters were manipulated. The ERP results indicated differences in brain activation between self- and non-self-written characters for the P250 component (250-350ms after stimulus onset) in right posterior regions and for the late positive component (LPC; 350-500ms after stimulus onset) in anterior midline regions; this was the case even when the handwritten characters were not generated in their usual form or were written for the first time. Therefore, our data indicate that self-information embedded in handwritten characters involves both right-lateralized brain activation associated with bodily self-processing and anterior midline brain activation related to self-referential processing.

  9. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  10. Encryption test of pseudo-aleatory messages embedded on chaotic laser signals: An information theory approach

    Energy Technology Data Exchange (ETDEWEB)

    Rosso, O.A. [Centre for Bioinformatics, Biomarker Discovery and Information-Based Medicine, School of Electrical Engineering and Computer Science, The University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Chaos and Biology Group, Instituto de Calculo, Facultad de Ciencias Exactas y Naturales, Pabellon II, Ciudad Universitaria, 1428 Ciudad Autonoma de Buenos Aires (Argentina)], E-mail: oarosso@fibertel.com.ar; Vicente, R. [Frankfurt Institute for Advanced Studies (FIAS), Max-Von-Laue-Strasse 1, 60438 Frankfurt (Germany); Department Neurophysiology, Max-Planck-Institute for Brain Research, Deutschordenstrasse 46, 60528 Frankfurt (Germany)], E-mail: raulvicente@mpih-frankfurt.mpg.de; Mirasso, C.R. [Instituto de Fisica Interdisciplinar y Sistemas Complejos, Universitat de les Illes Balears, E-07122 Palma de Mallorca (Spain)], E-mail: claudio@ifisc.uib.es

    2008-02-11

    In this Letter, we make use of two information-theory based indicators to measure the goodness of two encryption schemes commonly used within the context of chaotic communications. In particular, we have shown that the computation of the normalized Shannon entropy and the MPR-Statistical Complexity measure [M.T. Martin, A. Plastino, O.A. Rosso, Phys. Lett. A 311 (2003) 126, P.W. Lamberti, M.T. Martin, A. Plastino, O.A. Rosso, Physica A 334 (2004) 119] for different chaotic laser signals can lead to statistically significant criteria to assess the quality of several encryption techniques. The proposed measures allow, in some cases, to detect the presence of a message embedded within a chaotic carrier. They also reveal that the Chaos Modulation scheme is more reliable from the statistical point of view, when compared with the Chaos Shift Keying.

  11. The Integration and Development of the Leisure and Hospitality Information System Module with the Embedded Technology

    Directory of Open Access Journals (Sweden)

    Chih-Yao Lo

    2011-05-01

    Full Text Available The tourism in Miaoli has been in great development recently. The wonderful scenery and other potential conditions have sufficient incentives to attract tourists. Though there is such a huge touristeconomic market, most tourist service providers are unfortunately not able to integrate the information technology and the tourist services effectively. Therefore, we guide the tourism industry “Case CompanyA” to put our research results into practice to help the traditional farm “Case Company B” proceed a overall improvement and build a brand new commercial image. The embedded technology is used to set the leisure and hospitality information system into its existing website to make market segmentation. And the Flash and AJAX technologies are applied to build a Miaoli Virtual Reality Traveling Guide Websiteto make “B” an E-leisure farm with competitive advantages. With the information technology, we expect to offer abundant information of the leisure farm to people. The online journey planning function coupled with the animation design and real images of the journey makes visitors be immediately attracted by the beauty of the scenery, lots of mouth-watering cuisines, local cultural activities, etc. and thus the purpose of tourism development will be achieved.

  12. The information carrying capacity of a cosmological constant

    CERN Document Server

    Simidzija, Petar

    2016-01-01

    We analyze the exchange of information in different cosmological backgrounds when sender and receiver are timelike separated and communicate through massless fields (without the exchange of light-signals). Remarkably, we show that the dominance of a cosmological constant makes the amount of recoverable information imprinted in the field by the sender extremely resilient: it does not decay in time or with the spatial separation of sender and receiver, and it actually increases with the rate of expansion of the Universe. This is in stark contrast with the information carried by conventional light-signals and with previous results on timelike communication through massless fields in matter dominated cosmologies.

  13. Experimental investigations of DNP3 protocol for an information embedded power system

    Energy Technology Data Exchange (ETDEWEB)

    Amanullah, M.T.O.; Kalam, A.; Zayegh, A. [Victoria Univ. of Technology, Melbourne (Australia). School of Electrical Engineering

    2007-07-01

    As technology changes at an exponential rate, interconnected bulk electric systems are becoming integrated with vast networked information systems. Utilities must be flexible to cope with changing requirements and technologies while ensuring uninterrupted power supply and other essential features such as interoperability between devices from different suppliers, free allocation of functions and ease of maintenance. Competent power system monitoring and protection is also vital. The power industry spends billions of dollars to transmit its critical data more efficiently and securely. Wide area based Information Embedded Power System (IEPS-W) will provide a robust power system communication infrastructure in order to effectively monitor power system in a larger geographical area. To achieve such a capable communication platform, power systems use a range of power system communication protocols to transmit critical data through Supervisory Control and Data Acquisition (SCADA) systems. A flexible system is needed so that Remote Terminal Units (RTUs) can record power system measurements and transmit them in real time over a Wide Area Network (WAN) to the control centre. In order to study the performance of the Distributed Network Protocol (DNP3) communication protocol over a WAN, an experimental analysis was performed at the Victorian Network Switching Centre owned by SP AusNet of Australia. The experiment revealed a that high propagation delay exists which could cause the entire power network to be uncontrollable. An efficient IEPS system was therefore developed based on the DNP3 protocol using the OPNET modeller. Preliminary simulations have shown promising results for the enhanced DNP3 protocol. 4 refs., 5 figs.

  14. Generalized Belief Propagation for the Noiseless Capacity and Information Rates of Run-Length Limited Constraints

    CERN Document Server

    Sabato, Giovanni

    2011-01-01

    The performance of the generalized belief propagation algorithm for computing the noiseless capacity and mutual information rates of finite-size two-dimensional and three-dimensional run-length limited constraints is investigated. For each constraint, a method is proposed to choose the basic regions and to construct the region graph. Simulation results for the capacity of different constraints as a function of the size of the channel and mutual information rates of different constraints as a function of signal-to-noise ratio are reported. Convergence to the Shannon capacity is also discussed.

  15. Extrinsic Curvature Embedding Diagrams

    CERN Document Server

    Lu, J L

    2003-01-01

    Embedding diagrams have been used extensively to visualize the properties of curved space in Relativity. We introduce a new kind of embedding diagram based on the {\\it extrinsic} curvature (instead of the intrinsic curvature). Such an extrinsic curvature embedding diagram, when used together with the usual kind of intrinsic curvature embedding diagram, carries the information of how a surface is {\\it embedded} in the higher dimensional curved space. Simple examples are given to illustrate the idea.

  16. An experimental approach to estimation of human information processing capacity for diagnosis tasks in NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ji Tae

    2006-02-15

    The objectives of this research are 1) to determine the human's information processing capacity and 2) to describe the relationship between the information processing capacity and human factors. This research centers on the relationship, as experimentally determined, between an operator's mental workload and information flow during accident diagnosis tasks at nuclear power plants (NPPs). The relationship between the information flow rate and operator's mental workload is investigated experimentally. According to this relationship, the operator's information processing capacity can be established. Once the information processing capacity of a main control room (MCR) operator in a NPP is known, it is possible to apply it 1) to predict the operator's performance, 2) to design diagnosis tasks, and 3) to design human-machine interface. In advanced MCR, an operator's mental activity is more important than his or her physical activity. The mental workload is the portion of the operator's limited capacity that is actually required to perform a particular task. A high mental workload may cause an operator to make a mistake and consequently affect that the safe operation of NPPs. Thus, to predict an operator's performance is very important for the nuclear safety. The information processing capacity is the operator's ability to manage the amount of bits per second when an operator is diagnosing tasks or accidents. We can estimate the information processing capacity using the relationship between the information flow rate and human performance. That is, if the operator's performance decreases rapidly as the information flow rate (bit/sec) is increased, it is possible to determine the operator's information processing capacity. A diagnosis task is one of the most complex and mentally demanding tasks as well as a crucial part in maintaining the safe operation of NPPs. Diagnosis tasks refer to the overall tasks of finding the

  17. On Inferring Image Label Information Using Rank Minimization for Supervised Concept Embedding

    DEFF Research Database (Denmark)

    Bespalov, Dmitriy; Dahl, Anders Lindbjerg; Bai, Bing

    2011-01-01

    Concept-based representation —combined with some classifier (e.g., support vector machine) or regression analysis (e.g., linear regression)—induces a popular approach among image processing community, used to infer image labels. We propose a supervised learning procedure to obtain an embedding...... to a latent concept space with the pre-defined inner product. This learning procedure uses rank minimization of the sought inner product matrix, defined in the original concept space, to find an embedding to a new low dimensional space. The empirical evidence show that the proposed supervised learning method...

  18. The information capacity of the genetic code: Is the natural code optimal?

    Science.gov (United States)

    Kuruoglu, Ercan E; Arndt, Peter F

    2017-04-21

    We envision the molecular evolution process as an information transfer process and provide a quantitative measure for information preservation in terms of the channel capacity according to the channel coding theorem of Shannon. We calculate Information capacities of DNA on the nucleotide (for non-coding DNA) and the amino acid (for coding DNA) level using various substitution models. We extend our results on coding DNA to a discussion about the optimality of the natural codon-amino acid code. We provide the results of an adaptive search algorithm in the code domain and demonstrate the existence of a large number of genetic codes with higher information capacity. Our results support the hypothesis of an ancient extension from a 2-nucleotide codon to the current 3-nucleotide codon code to encode the various amino acids. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Statistical-mechanical analysis of multiuser channel capacity with imperfect channel state information

    Institute of Scientific and Technical Information of China (English)

    Wang Hui-Song; Zeng Gui-Hua

    2008-01-01

    In this paper,the effect of imperfect channel state information at the receiver, which is caused by noise and other interference, on the multi-access channel capacity is analysed through a statistical-mechanical approach. Replica analyses focus on analytically studying how the minimum mean square error (MMSE) channel estimation error appears in a multiuser channel capacity formula. And the relevant mathematical expressions are derived. At the same time,numerical simulation results are demonstrated to validate the Replica analyses. The simulation results show how the system parameters, such as channel estimation error, system load and signal-to-noise ratio, affect the channel capacity.

  20. Using information theory to assess the communicative capacity of circulating microRNA.

    Science.gov (United States)

    Finn, Nnenna A; Searles, Charles D

    2013-10-11

    The discovery of extracellular microRNAs (miRNAs) and their transport modalities (i.e., microparticles, exosomes, proteins and lipoproteins) has sparked theories regarding their role in intercellular communication. Here, we assessed the information transfer capacity of different miRNA transport modalities in human serum by utilizing basic principles of information theory. Zipf Statistics were calculated for each of the miRNA transport modalities identified in human serum. Our analyses revealed that miRNA-mediated information transfer is redundant, as evidenced by negative Zipf's Statistics with magnitudes greater than one. In healthy subjects, the potential communicative capacity of miRNA in complex with circulating proteins was significantly lower than that of miRNA encapsulated in circulating microparticles and exosomes. Moreover, the presence of coronary heart disease significantly lowered the communicative capacity of all circulating miRNA transport modalities. To assess the internal organization of circulating miRNA signals, Shannon's zero- and first-order entropies were calculated. Microparticles (MPs) exhibited the lowest Shannon entropic slope, indicating a relatively high capacity for information transfer. Furthermore, compared to the other miRNA transport modalities, MPs appeared to be the most efficient at transferring miRNA to cultured endothelial cells. Taken together, these findings suggest that although all transport modalities have the capacity for miRNA-based information transfer, MPs may be the simplest and most robust way to achieve miRNA-based signal transduction in sera. This study presents a novel method for analyzing the quantitative capacity of miRNA-mediated information transfer while providing insight into the communicative characteristics of distinct circulating miRNA transport modalities.

  1. Using Information Theory to Assess the Communicative Capacity of Circulating MicroRNA

    Science.gov (United States)

    Finn, Nnenna A.; Searles, Charles D.

    2013-01-01

    The discovery of extracellular microRNAs (miRNAs) and their transport modalities (i.e. microparticles, exosomes, proteins and lipoproteins) has sparked theories regarding their role in intercellular communication. Here, we assessed the information transfer capacity of different miRNA transport modalities in human serum by utilizing basic principles of information theory. Zipf Statistics were calculated for each of the miRNA transport modalities identified in human serum. Our analyses revealed that miRNA-mediated information transfer is redundant, as evidenced by negative Zipf’s Statistics with magnitudes greater than one. In healthy subjects, the potential communicative capacity of miRNA in complex with circulating proteins was significantly lower than that of miRNA encapsulated in circulating microparticles and exosomes. Moreover, the presence of coronary heart disease significantly lowered the communicative capacity of all circulating miRNA transport modalities. To assess the internal organization of circulating miRNA signals, Shannon’s zero- and first-order entropies were calculated. Microparticles (MPs) exhibited the lowest Shannon entropic slope, indicating a relatively high capacity for information transfer. Furthermore, compared to the other miRNA transport modalities, MPs appeared to be the most efficient at transferring miRNA to cultured endothelial cells. Taken together, these findings suggest that although all transport modalities have the capacity for miRNA-based information transfer, MPs may be the simplest and most robust way to achieve miRNA-based signal transduction in sera. This study presents a novel method for analyzing the quantitative capacity of miRNA-mediated information transfer while providing insight into the communicative characteristics of distinct circulating miRNA transport modalities. PMID:23994137

  2. On the capacity of Rician fading channels with full channel state information at low SNR

    KAUST Repository

    Rezki, Zouheir

    2012-06-01

    The capacity of flat Rayleigh fading channels with full channel state information (CSI) at the transmitter and at the receiver at asymptotically low SNR has been recently shown to scale essentially as SNR log (1/SNR). In this paper, we investigate the Rician fading channel capacity with full CSI, and show that the capacity of this channel scales essentially as 1/1+K SNR log (1 /SNR), where K is the Rician factor. This characterization includes perfect CSI at both the transmitter and the receiver or noisy CSI at the transmitter and perfect CSI at the receiver. We also show that one-bit CSI at the transmitter is enough to achieve this asymptotic capacity using an On-Off power control scheme. Our framework may be seen as a generalization of previous works as it captures the Rayleigh fading channel as a special case by letting K goes to zero. © 2012 IEEE.

  3. On the low SNR capacity of MIMO fading channels with imperfect channel state information

    KAUST Repository

    Benkhelifa, Fatma

    2014-05-01

    The capacity of Multiple Input Multiple Output (MIMO) Rayleigh fading channels with full knowledge of channel state information (CSI) at both the transmitter and the receiver (CSI-TR) has been shown recently to scale at low Signal-to-Noise Ratio (SNR) essentially as SNR log(1=SNR), independently of the number of transmit and receive antennas. In this paper, we investigate the ergodic capacity of MIMO Rayleigh fading channel with estimated channel state information at the transmitter (CSI-T) and possibly imperfect channel state information at the receiver (CSI-R). Our framework can be seen as a generalization of previous works as it can capture the perfect CSI-TR as a special case when the estimation error variance goes to zero. In our work, we mainly focus on the low SNR regime and we show that the capacity scales as (1-α) SNR log(1=SNR), where α is the estimation error variance. This characterization shows the loss of performance due to error estimation over the perfect channel state information at both the transmitter and the receiver. As a by-product of our new analysis, we show that our framework can also be extended to characterize the capacity of MIMO Rician fading channels at low SNR with possibly imperfect CSI-T and CSI-R. © 2014 IFIP.

  4. On the low SNR capacity of MIMO fading channels with imperfect channel state information

    KAUST Repository

    Benkhelifa, Fatma

    2014-06-01

    The capacity of multiple-input multiple-output (MIMO) Rayleigh fading channels with full knowledge of channel state information (CSI) at both the transmitter and the receiver (CSI-TR) has been shown recently to scale at low signal-to-noise ratio (SNR) essentially as SNR log(1/SNR), independently of the number of transmit and receive antennas. In this paper, we investigate the ergodic capacity of MIMO Rayleigh fading channel with estimated channel state information at the transmitter (CSI-T) and possibly imperfect channel state information at the receiver (CSI-R). Our framework can be seen as a generalization of previous works as it can capture the perfect CSI-TR as a special case when the estimation error variance goes to zero. In this paper, we mainly focus on the low SNR regime, and we show that the capacity scales as (1-α) SNR log(1/SNR), where α is the estimation error variance. This characterization shows the loss of performance due to error estimation over the perfect channel state information at both the transmitter and the receiver. As a by-product of our new analysis, we show that our framework can be also extended to characterize the capacity of MIMO Rician fading channels at low SNR with possibly imperfect CSI-T and CSI-R. © 1972-2012 IEEE.

  5. 76 FR 71996 - Notice of Submission of Proposed Information Collection to OMB; Capacity Building for Sustainable...

    Science.gov (United States)

    2011-11-21

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOUSING AND... Sustainable Communities Program AGENCY: Office of the Chief Information Officer, HUD ACTION: Notice. SUMMARY... soliciting public comments on the subject proposal. The Capacity Building for Sustainable Communities Program...

  6. How Employees' Perception of Information Technology Application and Their Knowledge Management Capacity Influence Organisational Performance

    Science.gov (United States)

    Kuo, Yen-Ku; Ye, Kung-Don

    2010-01-01

    This study investigates how workers' gender, work experience, designated division, and appointment affect (i) their perception of information technology (IT) within the organisation, (ii) their self-perceived capacity in knowledge management (KM), and (iii) their perception of organisational performance (OP). Furthermore, the study also examines…

  7. Some Fundamental Limits on SAW RFID Tag Information Capacity and Collision Resolution

    Science.gov (United States)

    Barton, Richard J.

    2013-01-01

    In this paper, we apply results from multi-user information theory to study the limits of information capacity and collision resolution for SAW RFID tags. In particular, we derive bounds on the achievable data rate per tag as a function of fundamental parameters such as tag time-bandwidth product, tag signal-to-noise ratio (SNR), and number of tags in the environment. We also discuss the implications of these bounds for tag waveform design and tag interrogation efficiency

  8. On the capacity of multiaccess fading channels with full channel state information at low power regime

    KAUST Repository

    Rezki, Zouheir

    2013-06-01

    We study the throughput capacity region of the Gaussian multiaccess (MAC) fading channel with perfect channel state information (CSI) at the receiver (CSI-R) and at the transmitters (CSI-T), at low power regime. We show that it has a multidimensional rectangle structure and thus is simply characterized by single user capacity points. More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum rate maximizer and that the coordinates of this point coincide with single user capacity bounds. Inspired from this result, we propose an on-off scheme, compute its achievable rate, and provide a necessary condition on the fading channels under which this scheme achieves single user capacity bounds of the MAC channel at asymptotically low power regime. We argue that this necessary condition characterizes a class of fading that encompasses all known wireless channels, where the capacity region of the MAC channel has a simple expression in terms of users\\' average power constraints only. © 2013 IEEE.

  9. Human resource capacity for information management in selected public healthcare facilities in Meru County, Kenya.

    Science.gov (United States)

    Kiilu, Elizabeth Mueke; Okero, Dominic Charles; Muiruri, Lillian; Owuondo, Pacific Akinyi

    2015-01-01

    Reliable health information is essential for decision making in the healthcare system. Information management in Kenya was considered the weakest area under the Health Information System pillar mainly due to inadequate health workers capacity. The study therefore aimed at assessing health workers skills and current training needs for information management in the selected healthcare facilities. Cross-section research design was adopted and both purposive sampling technique and censuses were used to establish the study participants. Analysis was done using SPSS version 20 and results were presented in tables, charts and graphs. It was established that capacity building was usually undertaken through on-job trainings i.e. 85.1% (103) health workers had on-job training on filling of data collection tools and only 10% (13) had received formal classroom training on the same. Further, only 9.1% (11) health workers had received information management training while 90.9% (110) had not received such training. Health workers demonstrated below average skills on information management i.e. only 17.4% (21) could check for data accuracy, only 16.5% (20) could compute trends from bar charts and only 16.5% (20) could transform the data they collected into meaningful information for use. The researcher recommended that healthcare facilities management teams develop a competency based framework for defining the desired skill mix for information management and have a yearly Training Needs Assessment for assessing training needs for information management among the health workers.

  10. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  11. Capacity of cognitive radio under imperfect secondary and cross link channel state information

    KAUST Repository

    Sboui, Lokman

    2011-09-01

    In this paper, we study the ergodic capacity of secondary user channel in a spectrum sharing scenario in which the secondary transmitter is instantaneously aware of estimated versions of the cross link (between the secondary transmitter and the primary receiver) and the secondary link Channel State Information (CSI). The secondary link optimal power profile along with the ergodic capacity are derived for a class of fading channels, under an average power constraint and an instantaneous interference outage constraint. We also show that our framework is rather general as it encompasses several previously studied spectrum sharing settings as special cases. In order to gain some insights on the capacity behavior, numerical results are shown for independent Rayleigh fading channels where it is found for instance, that at low SNR regime, only the secondary channel estimation matters and that the cross link CSI has no effect on the ergodic capacity; whereas at high SNR regime, the capacity is rather driven by the cross link CSI. © 2011 IEEE.

  12. Temperature Effects on Information Capacity and Energy Efficiency of Hodgkin-Huxley Neuron

    CERN Document Server

    Wang, Long-Fei; Liu, Xiao-Zhi; Song, Ya-lei; Yu, Lian-Chun

    2015-01-01

    Recent experimental and theoretical studies show that energy efficiency, which measures the amount of information processed by a neuron with per unit of energy consumption, plays an important role in the evolution of neural systems. Here, we calculated the information rates and energy efficiencies of the Hodgkin-Huxley (HH) neuron model at different temperatures in a noisy environment. We found that both the information rate and energy efficiency are maximized by certain temperatures. Though the information rate and energy efficiency cannot be maximized simultaneously, the neuron holds a high information processing capacity at the temperature corresponding to maximal energy efficiency. Our results support the idea that the energy efficiency is a selective pressure that influences the evolution of nervous systems.

  13. Temperature Effects on Information Capacity and Energy Efficiency of Hodgkin-Huxley Neuron

    Science.gov (United States)

    Wang, Long-Fei; Jia, Fei; Liu, Xiao-Zhi; Song, Ya-Lei; Yu, Lian-Chun

    2015-10-01

    Recent experimental and theoretical studies show that energy efficiency, which measures the amount of information processed by a neuron with per unit of energy consumption, plays an important role in the evolution of neural systems. Here, we calculated the information rates and energy efficiencies of the Hodgkin-Huxley (HH) neuron model at different temperatures in a noisy environment. We found that both the information rate and energy efficiency are maximized by certain temperatures. Though the information rate and energy efficiency cannot be maximized simultaneously, the neuron holds a high information processing capacity at the temperature corresponding to maximal energy efficiency. Our results support the idea that the energy efficiency is a selective pressure that influences the evolution of nervous systems.

  14. Biotechnology Education. Engaging the Learner: Embedding Information Literacy Skills into a Biotechnology Degree

    Science.gov (United States)

    Ward, Helena; Hockey, Julie

    2007-01-01

    One of the challenges of the Biotechnology industry is keeping up to date with the rapid pace of change and that much of the information, which students learn in their undergraduate studies, will be out of date in a few years. It is therefore crucial that Biotechnology students have the skills to access the relevant information for their studies…

  15. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-06-01

    Full Text Available Substantial changes have occurred in the Information Technology (IT sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  16. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  17. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  18. Building capacity for evidence informed decision making in public health: a case study of organizational change.

    Science.gov (United States)

    Peirson, Leslea; Ciliska, Donna; Dobbins, Maureen; Mowat, David

    2012-02-20

    Core competencies for public health in Canada require proficiency in evidence informed decision making (EIDM). However, decision makers often lack access to information, many workers lack knowledge and skills to conduct systematic literature reviews, and public health settings typically lack infrastructure to support EIDM activities. This research was conducted to explore and describe critical factors and dynamics in the early implementation of one public health unit's strategic initiative to develop capacity to make EIDM standard practice. This qualitative case study was conducted in one public health unit in Ontario, Canada between 2008 and 2010. In-depth information was gathered from two sets of semi-structured interviews and focus groups (n = 27) with 70 members of the health unit, and through a review of 137 documents. Thematic analysis was used to code the key informant and document data. The critical factors and dynamics for building EIDM capacity at an organizational level included: clear vision and strong leadership, workforce and skills development, ability to access research (library services), fiscal investments, acquisition and development of technological resources, a knowledge management strategy, effective communication, a receptive organizational culture, and a focus on change management. With leadership, planning, commitment and substantial investments, a public health department has made significant progress, within the first two years of a 10-year initiative, towards achieving its goal of becoming an evidence informed decision making organization.

  19. Action-embedded transformational leadership in self-managing global information systems development teams

    NARCIS (Netherlands)

    Eseryel, U. Yeliz; Eseryel, Deniz

    While software development teams are becoming more and more distributed around the globe, most software development methodologies used by global teams prescribe self-managing teams. Transformational leadership is the key to successful information systems development and use for competitive

  20. High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion

    Directory of Open Access Journals (Sweden)

    Fei Wang

    2014-01-01

    Full Text Available Being reversible, the watermarking information embedded in audio signals can be extracted while the original audio data can achieve lossless recovery. Currently, the few reversible audio watermarking algorithms are confronted with following problems: relatively low SNR (signal-to-noise of embedded audio; a large amount of auxiliary embedded location information; and the absence of accurate capacity control capability. In this paper, we present a novel reversible audio watermarking scheme based on improved prediction error expansion and histogram shifting. First, we use differential evolution algorithm to optimize prediction coefficients and then apply prediction error expansion to output stego data. Second, in order to reduce location map bits length, we introduced histogram shifting scheme. Meanwhile, the prediction error modification threshold according to a given embedding capacity can be computed by our proposed scheme. Experiments show that this algorithm improves the SNR of embedded audio signals and embedding capacity, drastically reduces location map bits length, and enhances capacity control capability.

  1. High capacity reversible watermarking for audio by histogram shifting and predicted error expansion.

    Science.gov (United States)

    Wang, Fei; Xie, Zhaoxin; Chen, Zuo

    2014-01-01

    Being reversible, the watermarking information embedded in audio signals can be extracted while the original audio data can achieve lossless recovery. Currently, the few reversible audio watermarking algorithms are confronted with following problems: relatively low SNR (signal-to-noise) of embedded audio; a large amount of auxiliary embedded location information; and the absence of accurate capacity control capability. In this paper, we present a novel reversible audio watermarking scheme based on improved prediction error expansion and histogram shifting. First, we use differential evolution algorithm to optimize prediction coefficients and then apply prediction error expansion to output stego data. Second, in order to reduce location map bits length, we introduced histogram shifting scheme. Meanwhile, the prediction error modification threshold according to a given embedding capacity can be computed by our proposed scheme. Experiments show that this algorithm improves the SNR of embedded audio signals and embedding capacity, drastically reduces location map bits length, and enhances capacity control capability.

  2. Politics of change: the discourses that inform organizational change and their capacity to silence.

    Science.gov (United States)

    McMillan, Kim

    2016-09-01

    Changes in healthcare organizations are inevitable and occurring at unprecedented rates. Such changes greatly impact nurses and their work, yet these experiences are rarely explored. Organizational change discourses remain grounded in perspectives that explore and explain systems, often not the people within them. Change processes in healthcare organizations informed by such organizational discourses validate only certain perspectives and forms of knowledge. This fosters exclusionary practices, limiting the capacity of certain individuals or groups of individuals to effectively contribute to change discourses and processes. The reliance on mainstream organizational discourses in healthcare organizations has left little room for the exploration of diverse perspectives on the subject of organizational change, particularly those of nurses. Michel Foucault's work challenges dominant discourse and suggest that strong reliance's on specific discourses effectively disqualify certain forms of knowledge. Foucault's writings on disqualified knowledge and parrhesia (truth telling and frank speech) facilitate the critical exploration of discourses that inform change in healthcare organizations and nurses capacities to contribute to organizational discourses. This paper explores the capacity of nurses to speak their truths within rapidly and continuously changing healthcare organizations when such changes are often driven by discourses not derived from nursing knowledge or experience.

  3. Capacity as a Fundamental Metric for Mechanism Design in the Information Economy

    CERN Document Server

    Singh, Sudhir Kumar

    2007-01-01

    The auction theory literature has so far focused mostly on the design of mechanisms that takes the revenue or the efficiency as a yardstick. However, scenarios where the {\\it capacity}, which we define as \\textit{``the number of bidders the auctioneer wants to have a positive probability of getting the item''}, is a fundamental concern are ubiquitous in the information economy. For instance, in sponsored search auctions (SSA's) or in online ad-exchanges, the true value of an ad-slot for an advertiser is inherently derived from the conversion-rate, which in turn depends on whether the advertiser actually obtained the ad-slot or not; thus, unless the capacity of the underlying auction is large, key parameters, such as true valuations and advertiser-specific conversion rates, will remain unknown or uncertain leading to inherent inefficiencies in the system. In general, the same holds true for all information goods/digital goods. We initiate a study of mechanisms, which take capacity as a yardstick, in addition t...

  4. Channel Capacity Bounds in the Presence of Quantized Channel State Information

    Directory of Open Access Journals (Sweden)

    Makki Behrooz

    2010-01-01

    Full Text Available The goal of this paper is to investigate the effect of channel side information on increasing the achievable rates of continuous power-limited non-Gaussian channels. We focus on the case where (1 there is imperfect channel quality information available to the transmitter and the receiver and (2 while the channel gain is continuously varying, there are few cross-region changes, and the noise characteristics remain in each detection region for a long time. The results are presented for two scenarios, namely, reliable and unreliable region detection. Considering short- and long-term power constraints, the capacity bounds are found for log-normal and two different Nakagami-based channel distributions, and for both Max-Lloyd and equal probability quantization approaches. Then, the optimal gain partitioning approach, maximizing the achievable rates, is determined. Finally, general equations for the channel capacity bounds and optimal channel partitioning in the case of unreliable region detection are presented. Interestingly, the results show that, for high SNR's, it is possible to determine a power-independent optimal gain partitioning approach maximizing the capacity lower bound which, in both scenarios, is identical for both short- and long-term power constraints.

  5. Innovative Leadership by School Principals: Embedding Information Communication and Technology in Kuwaiti Schools

    Science.gov (United States)

    Al Sharija, Mohammed; Watters, James J.

    2012-01-01

    Kuwait is an oil rich country planning for a future that is not dependent on exploiting natural resources. A major policy initiative has been the introduction of Information Communication and Technology (ICT) to schools. However, contextual issues and teacher capabilities in the use of ICT have limited the success of this initiative. The study…

  6. Embedding Information Literacy in a First-Year Business Undergraduate Course

    Science.gov (United States)

    Price, Robin; Becker, Karen; Clark, Lynette; Collins, Sue

    2011-01-01

    This article reports on a project to embed information literacy skills development in a first-year undergraduate business course at an Australian university. In accordance with prior research suggesting that first-year students are over-confident about their skills, the project used an optional online quiz to allow students to pre-test their…

  7. The Exponentially Embedded Family of Distributions for Effective Data Representation, Information Extraction, and Decision Making

    Science.gov (United States)

    2013-03-01

    unlimited. This is equivalent to Gram-Schmidt orthogonalization for Gaussian PDFs (see Figure 2). Pt (true PDF) Pr(t; Ho) -~- · Prr (best...approximation) additional information of T2 Figure 2: Best Approximation For one sensor we construct and for two sensors we construct Prr = Pryi ,7]2

  8. Information Literacy for First-Year Students: An Embedded Curriculum Approach

    Science.gov (United States)

    Andrews, T.; Patil, R.

    2007-01-01

    The ability to access, evaluate and synthesise high-quality research material is the backbone of critical thinking in academic and professional contexts for Engineers and Industrial Designers. This is the premise upon which teaching and library staff developed Information Literacy (IL) components in Engineering & Industrial Design Practice--a…

  9. Implementing Student Information Systems in High Schools: An Embedded Single Case Study

    Science.gov (United States)

    Rhodes-O'Neill, Tamyra LaShawn

    2014-01-01

    As new technologies are developed for teaching and learning, they hold the potential to transform education but have yet to be fully integrated into K-12 classrooms in the United States. The purpose of this study was to explore how a student information system was implemented in 2 urban public high schools and how stakeholders perceived that…

  10. Embedding Web-Based Statistical Translation Models in Cross-Language Information Retrieval

    NARCIS (Netherlands)

    Kraaij, W.; Nie, J.Y.; Simard, M.

    2003-01-01

    Although more and more language pairs are covered by machine translation (MT) services, there are still many pairs that lack translation resources. Cross-language information retrieval (CUR) is an application that needs translation functionality of a relatively low level of sophistication, since

  11. Embedding Web-Based Statistical Translation Models in Cross-Language Information Retrieval

    NARCIS (Netherlands)

    Kraaij, W.; Nie, J.Y.; Simard, M.

    2003-01-01

    Although more and more language pairs are covered by machine translation (MT) services, there are still many pairs that lack translation resources. Cross-language information retrieval (CUR) is an application that needs translation functionality of a relatively low level of sophistication, since cur

  12. Embedding Term Similarity and Inverse Document Frequency into a Logical Model of Information Retrieval.

    Science.gov (United States)

    Losada, David E.; Barreiro, Alvaro

    2003-01-01

    Proposes an approach to incorporate term similarity and inverse document frequency into a logical model of information retrieval. Highlights include document representation and matching; incorporating term similarity into the measure of distance; new algorithms for implementation; inverse document frequency; and logical versus classical models of…

  13. Action-embedded transformational leadership in self-managing global information systems development teams

    NARCIS (Netherlands)

    Eseryel, U. Yeliz; Eseryel, Deniz

    2013-01-01

    While software development teams are becoming more and more distributed around the globe, most software development methodologies used by global teams prescribe self-managing teams. Transformational leadership is the key to successful information systems development and use for competitive advantage

  14. Embedded Hardware

    CERN Document Server

    Ganssle, Jack G; Eady, Fred; Edwards, Lewin; Katz, David J; Gentile, Rick

    2007-01-01

    The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!. Circuit design using microcontrollers is both a science and an art. This book covers it all. It details all of the essential theory and facts to help an engineer design a robust embedded system. Processors, memory, and the hot topic of interconnects (I/O) are completely covered. Our authors bring a wealth of experience and ideas; thi

  15. LSP 156, Low Power Embedded Analytics: FY15 Line Supported Information, Computation, and Exploitation Program

    Science.gov (United States)

    2015-12-04

    200 TB, Source : National Center for Biotechnology Information (NCBI) - Size: 541 TB, Source : Common Crawl Foundation - http://commoncrawl.org...programmable gate -array (FPGA) is at the heart of the architecture. It performs three tasks: a) Control non-volatile memory (NVM) storage such as...Document similarity search c. Key-value store caching d. Graph traversal e. PageRank f. Friends-of-friends B. Interface with open- source software

  16. Measuring the Student Group Capacity for Obtaining Geometric Information in the van Hiele Developmental Thought Process:A Fuzzy Approach

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    The student group possibilistic uncertainty in the van Hiele process of geometric reasoning is considered as the student group capacity for obtaining geometric information. Hence, the student group capacity for obtaining geometric information can be measured by the total possibilistic uncertainty T(r) of an ordered possibility distribution. The capacities of three student groups are found by calculating the total possibilistic uncertainties of these groups. These capacity values set an expectation of future group performance. Future research indications of how the total possibilistic uncertainty may be applied to other models of learning and development will help to establish it as a viable measure in educational psychology.

  17. Embedding QR codes in tumor board presentations, enhancing educational content for oncology information management.

    Science.gov (United States)

    Siderits, Richard; Yates, Stacy; Rodriguez, Arelis; Lee, Tina; Rimmer, Cheryl; Roche, Mark

    2011-01-01

    Quick Response (QR) Codes are standard in supply management and seen with increasing frequency in advertisements. They are now present regularly in healthcare informatics and education. These 2-dimensional square bar codes, originally designed by the Toyota car company, are free of license and have a published international standard. The codes can be generated by free online software and the resulting images incorporated into presentations. The images can be scanned by "smart" phones and tablets using either the iOS or Android platforms, which link the device with the information represented by the QR code (uniform resource locator or URL, online video, text, v-calendar entries, short message service [SMS] and formatted text). Once linked to the device, the information can be viewed at any time after the original presentation, saved in the device or to a Web-based "cloud" repository, printed, or shared with others via email or Bluetooth file transfer. This paper describes how we use QR codes in our tumor board presentations, discusses the benefits, the different QR codes from Web links and how QR codes facilitate the distribution of educational content.

  18. Ergodic Capacity of Cognitive Radio Under Imperfect Channel-State Information

    KAUST Repository

    Rezki, Zouheir

    2012-09-08

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel-state information (CSI) of the secondary link but knows only the statistics and an estimated version of the secondary transmitter-primary receiver link is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels [with a continuous probability density function (pdf)] under the average and peak transmit power constraints and with respect to the following two different interference constraints: 1) an interference outage constraint and 2) a signal-to-interference outage constraint. When applied to Rayleigh fading channels, our results show, for example, that the interference constraint is harmful at the high-power regime, because the capacity does not increase with the power, whereas at the low-power regime, it has a marginal impact and no-interference performance, which corresponds to the ergodic capacity under average or peak transmit power constraint in the absence of the primary user, may be achieved. © 2012 IEEE.

  19. Challenges in balancing the amount of solution information in requirement specifications for embedded products

    DEFF Research Database (Denmark)

    Savolainen, Juha; Hauksdóttir, Dagný; Mannion, Mike

    2013-01-01

    having solution information in requirements is sensible and when it should be avoided. In this research challenge paper, we advocate that researchers should identify different contexts and corresponding criteria that practitioners can use to evaluate when requirements specifications may include design......Requirements are traditionally viewed as being free of the details of an envisioned solution and specified using purely problem domain entities. Preventing premature design in the requirements permits the available design space not to be restricted too early which might inhibit innovative designs....... In practice, on many industrial projects, separating the problem and solution domain entities can be difficult, and arguably there are benefits for not doing so. Many customers feel more confident describing their requirements, often as the difference between the existing products and their needs, some...

  20. Application Research on the Embedded Information Services Based on JavaScript%基于JS的嵌入式信息服务应用研究

    Institute of Scientific and Technical Information of China (English)

    王建涛; 董珍时

    2011-01-01

    嵌入式信息服务是泛在信息服务的重要形式。本文分析了嵌入式信息服务的嵌入性、易用性、广泛适应性、灵活性、泛在性等特点。以ODP网站为例,分析了基于JS的嵌入式信息服务架构和关键技术实现。这对图书馆界广泛开展嵌入式信息服务有着重要的示范和借鉴作用。%The embedded information service is an important form of ubiquitous information service.This paper analyzes the imbedibility,usability,widespread compatibility,flexibility and ubiquity characteristics of embedded information service.Taking ODP website as an example,it analyzes the embedded information service construction and the key technologies realization based on JS which have the important demonstration and reference functions for library to carry out embedded information service.

  1. Spatial resolution, signal-to-noise and information capacity of linear imaging systems

    CERN Document Server

    Gureyev, Timur

    2015-01-01

    A simple model for image formation in linear shift-invariant systems is considered, in which both the detected signal and the noise variance are almost constant over distances comparable with the width of the point-spread function of the system. It is shown that within the constraints of this model, the square of the signal-to-noise ratio is always proportional to the "volume" of the spatial resolution unit. The ratio of these two quantities divided by the incident density of the imaging particles (e.g. photons) represents a dimensionless invariant of the imaging system, which was previously termed the intrinsic imaging quality. This invariant is related to the notion of information capacity of imaging and communication systems as previously considered by Shannon, Gabor and others. It is demonstrated that the information capacity expressed in bits cannot exceed the total number of imaging particles utilised in the system. These results are then applied to a simple generic model of quantitative imaging and ana...

  2. The data embedding method

    Energy Technology Data Exchange (ETDEWEB)

    Sandford, M.T. II; Bradley, J.N.; Handel, T.G.

    1996-06-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.

  3. Data embedding method

    Science.gov (United States)

    Sandford, Maxwell T., II; Bradley, Jonathan N.; Handel, Theodore G.

    1996-01-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in MicrosoftTM bitmap (BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed `steganography.' Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or `lossy' compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is derived from the original host data by an analysis algorithm.

  4. Embedded systems handbook

    CERN Document Server

    Zurawski, Richard

    2005-01-01

    Embedded systems are nearly ubiquitous, and books on individual topics or components of embedded systems are equally abundant. Unfortunately, for those designers who thirst for knowledge of the big picture of embedded systems there is not a drop to drink. Until now. The Embedded Systems Handbook is an oasis of information, offering a mix of basic and advanced topics, new solutions and technologies arising from the most recent research efforts, and emerging trends to help you stay current in this ever-changing field.With preeminent contributors from leading industrial and academic institutions

  5. Embedded Leverage

    DEFF Research Database (Denmark)

    Frazzini, Andrea; Heje Pedersen, Lasse

    Many financial instruments are designed with embedded leverage such as options and leveraged exchange traded funds (ETFs). Embedded leverage alleviates investors’ leverage constraints and, therefore, we hypothesize that embedded leverage lowers required returns. Consistent with this hypothesis, we...... find that asset classes with embedded leverage offer low risk-adjusted returns and, in the cross-section, higher embedded leverage is associated with lower returns. A portfolio which is long low-embedded-leverage securities and short high-embedded-leverage securities earns large abnormal returns......, with t-statistics of 8.6 for equity options, 6.3 for index options, and 2.5 for ETFs. We provide extensive robustness tests and discuss the broader implications of embedded leverage for financial economics....

  6. Shaping Collective Functions in Privatized Agricultural Knowledge and Information Systems: The Positioning and Embedding of a Network Broker in the Dutch Dairy Sector

    NARCIS (Netherlands)

    Klerkx, L.W.A.; Leeuwis, C.

    2009-01-01

    This paper examines new organizational arrangements that have emerged in the context of a privatized extension system. It investigates the positioning and embedding of a network broker aimed at enhancing interaction in the privatized agricultural knowledge and information system (AKIS), to assess wh

  7. The Ministry of Industry and Information Technology Spokesman: Local Government to be Rewarded for Eliminating Backward Production Capacity

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ On January 27th,the Ministry of Industry and Information Technology spokesman Zhu Hongren revealed that the state will provide financial incentives to local governments who eliminate backward production capacity actively.

  8. Hazard, Vulnerability and Capacity Mapping for Landslides Risk Analysis using Geographic Information System (GIS)

    Science.gov (United States)

    Sari, D. A. P.; Innaqa, S.; Safrilah

    2017-06-01

    This research analyzed the levels of disaster risk in the Citeureup sub-District, Bogor Regency, West Java, based on its potential hazard, vulnerability and capacity, using map to represent the results, then Miles and Huberman analytical techniques was used to analyze the qualitative interviews. The analysis conducted in this study is based on the concept of disaster risk by Wisner. The result shows that the Citeureup sub-District has medium-low risk of landslides. Of the 14 villages, three villages have a moderate risk level, namely Hambalang, Tajur, and Tangkil, or 49.58% of the total land area. Eleven villages have a low level of risk, namely Pasir Mukti, Sanja, Tarikolot, Gunung Sari, Puspasari, East Karang Asem, Citeureup, Leuwinutug, Sukahati, West Karang Asem West and Puspanegara, or 48.68% of the total land area, for high-risk areas only around 1.74%, which is part of Hambalang village. The analysis using Geographic Information System (GIS) prove that areas with a high risk potential does not necessarily have a high level of risk. The capacity of the community plays an important role to minimize the risk of a region. Disaster risk reduction strategy is done by creating a safe condition, which intensified the movement of disaster risk reduction.

  9. On the capacity of cognitive radio under limited channel state information

    KAUST Repository

    Rezki, Zouheir

    2010-09-01

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel state information (CSI) of the secondary link, but knows only the statistics of the secondary transmitter-primary receiver link, is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels (with continuous probability density function) under average and peak transmit-power constraints and with respect to two different interference constraints: an interference outage constraint and a signal-to-interference (SI) outage constraint. When applied to Rayleigh fading channels, our results show that the interference constraint is harmful at high-power regime, whereas at lowpower regime, it has a marginal impact and no-interference performance may be achieved. © 2010 IEEE.

  10. An Extended Framework for Measuring the Information Capacity of the Human Motor System

    CERN Document Server

    Roos, Teemu

    2011-01-01

    Fitts' law is a fundamental tool in understanding the capacity of the human motor system. It measures information throughput in terms of the tradeoff between the speed and accuracy of motor responses. Although immensely popular, the paradigm in which Fitts' law is the principal keystone is confined to relatively simple responses in strictly prescribed stimulus-response conditions. Our goal is to generalize the framework into completely unconstrained movement. The proposed new metric is based on a subject's ability to accurately reproduce a learned movement pattern. It can accommodate recorded movement of any duration and composition, and involving contributions of any part of the body. We demonstrate the proposed method by analyzing publicly available motion capture data. Possible applications include human-computer interaction, sports science, and clinical diagnosis.

  11. On the capacity of cognitive radio under limited channel state information over fading channels

    KAUST Repository

    Rezki, Zouheir

    2011-06-01

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel state information (CSI) of the secondary link, but knows only the statistics and an estimated version of the secondary transmitter-primary receiver (ST-PR) link, is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels (with continuous probability density function) under average and peak transmit-power constraints and with respect to two different interference constraints: an interference outage constraint and a signal-to-interference (SI) outage constraint. When applied to Rayleigh fading channels, our results show, for instance, that the interference constraint is harmful at high-power regime, whereas at low-power regime, it has a marginal impact and no-interference performance may be achieved. © 2011 IEEE.

  12. On the secrecy capacity of the broadcast wiretap channel with imperfect channel state information

    KAUST Repository

    Hyadi, Amal

    2014-12-01

    In this paper, we consider secure broadcasting over fast fading channels. Assuming imperfect main channel state information (CSI) at the transmitter, we first provide an upper and a lower bounds on the ergodic secrecy capacity when a common message is broadcasted to multiple legitimate receivers in the presence of one eavesdropper. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link. Then, we present an expression for the achievable secrecy sum-rate when each legitimate receiver is interested in an independent message. The special cases of high SNR, perfect and no-main CSI are also analyzed. Numerical results are presented to illustrate the obtained results for the case of independent but not necessarily identically distributed Rayleigh fading channels.

  13. On Distributed Embedded Systems

    Directory of Open Access Journals (Sweden)

    Arvindra Sehmi

    2013-01-01

    Full Text Available Thinking of distributed embedded systems (DES—let alone the more general area of embedded computing—as a unified topic is difficult. Nevertheless, it is a vastly important topic and potentially represents a revolution in information technology (IT. DES is driven by the increasing capabilities and ever-declining costs of computing and communications devices, resulting in networked systems of embedded computers whose functional components are nearly invisible to end users. Systems have the potential to alter radically the way in which people interact with their environment by linking a range of devices and sensors that will allow information to be collected, shared, and processed in unprecedented ways.

  14. Leadership in strategic information (LSI building skilled public health capacity in Ethiopia

    Directory of Open Access Journals (Sweden)

    Mitike Getnet

    2011-08-01

    Full Text Available Abstract Background In many developing countries, including Ethiopia, few have the skills to use data for effective decision making in public health. To address this need, the U.S. Centers for Disease Control and Prevention (CDC, in collaboration with two local Ethiopian organizations, developed a year long Leadership in Strategic Information (LSI course to train government employees working in HIV to use data from strategic information sources. A process evaluation of the LSI course examined the impact of the training on trainees' skills and the strengths and weaknesses of the course. The evaluation consisted of surveys and focus groups. Findings Trainees' skill sets increased in descriptive and analytic epidemiology, surveillance, and monitoring and evaluation (M and E. Data from the evaluation indicated that the course structure and the M and E module required revision in order to improve outcomes. Additionally, the first cohort had a high attrition rate. Overall, trainees and key stakeholders viewed LSI as important in building skilled capacity in public health in Ethiopia. Conclusion The evaluation provided constructive insight in modifying the course to improve retention and better address trainees' learning needs. Subsequent course attrition rates decreased as a result of changes made based on evaluation findings.

  15. Scaling the Information Load of Occupations: Preliminary Findings of the Fit between Individual Capacities and Environmental Demands

    Science.gov (United States)

    Haase, Richard F.; Ferreira, Joaquim Armando G. A.; Santos, Eduardo J. R.; Aguayo, Gina M.; Fallon, Melissa M.

    2008-01-01

    Person-Environment (P-E) fit models provide a conceptually powerful way to think about career development, vocational choice, and occupational success. The work reported here focuses on yet another pair of P-E criteria: self-reported individual capacity for information processing (the ability to tolerate information overload from a variety of…

  16. Advance demand information and a restricted production capacity : On the optimality of order base-stock policies

    NARCIS (Netherlands)

    Wijngaard, Jacob; Karaesmen, Fikri

    2007-01-01

    This paper considers the optimality of order aggregation in a single-item production/inventory problem with advance demand information and a restricted production capacity. The advance demand information is modeled by introducing a positive customer order lead time. The paper proves, when customer o

  17. From drought to deluge: how information overload saturated absorption capacity in a disrupted health sector.

    Science.gov (United States)

    Beesley, Mark; Cometto, Giorgio; Pavignani, Enrico

    2011-11-01

    Provision of technical assistance is a common form of support to health sectors emerging from prolonged conflicts. But what actions signal that the Ministry of Health (MoH) is, or is not, actively analysing and digesting the output of this assistance? Where are the boundaries between doing with and doing for? This article presents a qualitative description of an early post-conflict policy process in southern Sudan, which represented an opportunity to test these boundaries. The methodology of provision of technical assistance to the MoH in the formulation of a human resource plan is reviewed. Initial objectives are compared with the results accomplished. Shortcomings are discussed and recommendations for technical assistance programmes in similar contexts are provided. Between October 2005 and May 2006, World Health Organization advisers supported the MoH in conducting a human resources assessment to lay the grounds for a human resources development plan. The study employed three consultants, ten data collectors and entailed questionnaires, field visits, interviews and a review of literature. The survey shed new important evidence on the human resources situation in southern Sudan, both in quantitative and qualitative terms, and formulated specific recommendations. The formulation of the human resources plan, however, took another direction, apparently unrelated to the findings of the survey. Various factors contributed to the scope and methodology of the survey being inappropriate to the reality of southern Sudan. In the presence of systemic capacity gaps, including uncertain governance and precarious management systems, the benefit of one-off comprehensive surveys is likely to be negligible. Inaction is not always rooted in the lack of information, as too often assumed; this case study exposes the limits of a rationalistic approach to policy formulation and planning in the field of human resources for health. An alternative approach that entails incremental steps

  18. On the capacity of multiple access and broadcast fading Channels with full channel state information at low power regime

    KAUST Repository

    Rezki, Zouheir

    2013-07-01

    We study the throughput capacity region of the Gaussian multi-access (MAC) fading channel with perfect channel state information (CSI) at the receiver and at the transmitters (CSI-TR), at low power regime. We show that it has a multidimensional rectangle structure and thus is simply characterized by single user capacity points. More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum-rate maximizer and that the coordinates of this point coincide with single user capacity bounds. Using the duality of Gaussian MAC and broadcast channels (BC), we provide a simple characterization of the BC capacity region at low power regime. © 2013 IEEE.

  19. A tool to increase information-processing capacity for consumer water meter data

    Directory of Open Access Journals (Sweden)

    Heinz E. Jacobs

    2012-02-01

    increased the information processing capacity for water meter data.

  20. The Ministry of Industry and Information Technology Issued Detail Breakdown on the Tasks to Eliminate 2009 Backward Production Capacity

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ In order to implement the spirit of "The Announcement from the State Council about Issuing the 2009 Work Plan on Energy-Saving and Emission-Reduction" and the adjustment and revitalization plan for key industries, and further improve the work to eliminate backward production capacity, the Ministry of Industry and Information Technology issued a notice on the detail breakdown and implementation of tasks to eliminate 2009 backward production capacity on November 25, 2009.

  1. Embedded engineering education

    CERN Document Server

    Kaštelan, Ivan; Temerinac, Miodrag; Barak, Moshe; Sruk, Vlado

    2016-01-01

    This book focuses on the outcome of the European research project “FP7-ICT-2011-8 / 317882: Embedded Engineering Learning Platform” E2LP. Additionally, some experiences and researches outside this project have been included. This book provides information about the achieved results of the E2LP project as well as some broader views about the embedded engineering education. It captures project results and applications, methodologies, and evaluations. It leads to the history of computer architectures, brings a touch of the future in education tools and provides a valuable resource for anyone interested in embedded engineering education concepts, experiences and material. The book contents 12 original contributions and will open a broader discussion about the necessary knowledge and appropriate learning methods for the new profile of embedded engineers. As a result, the proposed Embedded Computer Engineering Learning Platform will help to educate a sufficient number of future engineers in Europe, capable of d...

  2. Pseudoalteromonas spp. Serve as Initial Bacterial Attractants in Mesocosms of Coastal Waters but Have Subsequent Antifouling Capacity in Mesocosms and when Embedded in Paint

    DEFF Research Database (Denmark)

    Bernbom, Nete; Ng, Yin; Møller, Stefan

    2013-01-01

    The purpose of the present study was to determine if the monoculture antifouling effect of several pigmented pseudoalteromonads was retained in in vitro mesocosm systems using natural coastal seawater and when the bacteria were embedded in paint used on surfaces submerged in coastal waters....... Pseudoalteromonas piscicida survived on a steel surface and retained antifouling activity for at least 53 days in sterile seawater, whereas P. tunicata survived and had antifouling activity for only 1 week. However, during the first week, all Pseudoalteromonas strains facilitated rather than prevented bacterial...... attachment when used to coat stainless steel surfaces and submerged in mesocosms with natural seawater. The bacterial density on surfaces coated with sterile growth medium was 105 cells/cm2 after 7 days, whereas counts on surfaces precoated with Pseudoalteromonas were significantly higher, at 106 to 108...

  3. On the capacity of multiple access and broadcast fading channels with full channel state information at low SNR

    KAUST Repository

    Rezki, Zouheir

    2014-01-01

    We study the throughput capacity region of the Gaussian multi-access (MAC) fading channel with perfect channel state information (CSI) at the receiver and at the transmitters, at low power regime. We show that it has a multidimensional rectangle structure and thus is simply characterized by single user capacity points.More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum rate maximizer and that the coordinates of this point coincide with single user capacity bounds. Inspired from this result, we propose an on-off scheme, compute its achievable rate, and show that this scheme achieves single user capacity bounds of the MAC channel for a wide class of fading channels at asymptotically low power regime. We argue that this class of fading encompasses all known wireless channels for which the capacity region of the MAC channel has even a simpler expression in terms of users\\' average power constraints only. Using the duality of Gaussian MAC and broadcast channels (BC), we deduce a simple characterization of the BC capacity region at low power regime and show that for a class of fading channels (including Rayleigh fading), time-sharing is asymptotically optimal. © 2014 IEEE.

  4. Improving recruitment to a study of telehealth management for long-term conditions in primary care: two embedded, randomised controlled trials of optimised patient information materials.

    Science.gov (United States)

    Man, Mei-See; Rick, Jo; Bower, Peter

    2015-07-19

    Patient understanding of study information is fundamental to gaining informed consent to take part in a randomised controlled trial. In order to meet the requirements of research ethics committees, patient information materials can be long and need to communicate complex messages. There is concern that standard approaches to providing patient information may deter potential participants from taking part in trials. The Systematic Techniques for Assisting Recruitment to Trials (MRC-START) research programme aims to test interventions to improve trial recruitment. The aim of this study was to investigate the effect on recruitment of optimised patient information materials (with improved readability and ease of comprehension) compared with standard materials. The study was embedded within two primary care trials involving patients with long-term conditions. The Healthlines Study involves two linked trials evaluating a telehealth intervention in patients with depression (Healthlines Depression) or raised cardiovascular disease risk (Healthlines CVD). We conducted two trials of a recruitment intervention, embedded within the Healthlines host trials. Patients identified as potentially eligible in each of the Healthlines trials were randomised to receive either the original patient information materials or optimised versions of these materials. Primary outcomes were the proportion of participants randomised (Healthlines Depression) and the proportion expressing interest in taking part (Healthlines CVD). In Healthlines Depression (n = 1364), 6.3% of patients receiving the optimised patient information materials were randomised into the study compared to 4.0% in those receiving standard materials (OR = 1.63, 95% CI = 1.00 to 2.67). In Healthlines CVD (n = 671) 24.0% of those receiving optimised patient information materials responded positively to the invitation to participate, compared to 21.9% in those receiving standard materials (OR = 1.12, 95% CI = 0.78 to 1

  5. On the capacity of nakagami-m fading Channels with full channel state information at low SNR

    KAUST Repository

    Rezki, Zouheir

    2012-06-01

    The capacity of flat Rayleigh fading channels with full channel state information (CSI) at the transmitter and at the receiver at asymptotically low SNR has been recently shown to scale essentially as SNR log(1/SNR)}. In this paper, we investigate the Nakagami-m fading channel capacity with full CSI, and show that the capacity of this channel scales essentially as m/ Omega SNR log(1/SNR), where m is the Nakagami-m fading parameter and where Ω is the channel mean-square. We also show that one-bit CSI at the transmitter is enough to achieve this asymptotic capacity using an On-Off power control scheme. Our framework may be seen as a generalization of previous works as it captures the Rayleigh fading channel as a special case by taking m=1. © 2012 IEEE.

  6. On the low SNR capacity of maximum ratio combining over rician fading channels with full channel state information

    KAUST Repository

    Benkhelifa, Fatma

    2013-04-01

    In this letter, we study the ergodic capacity of a maximum ratio combining (MRC) Rician fading channel with full channel state information (CSI) at the transmitter and at the receiver. We focus on the low Signal-to-Noise Ratio (SNR) regime and we show that the capacity scales as L ΩK+L SNRx log(1SNR), where Ω is the expected channel gain per branch, K is the Rician fading factor, and L is the number of diversity branches. We show that one-bit CSI feedback at the transmitter is enough to achieve this capacity using an on-off power control scheme. Our framework can be seen as a generalization of recently established results regarding the fading-channels capacity characterization in the low-SNR regime. © 2012 IEEE.

  7. Embedded systems handbook networked embedded systems

    CERN Document Server

    Zurawski, Richard

    2009-01-01

    Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area

  8. Carleson embeddings

    Directory of Open Access Journals (Sweden)

    Helmut J. Heiming

    1996-01-01

    Full Text Available In this paper we discuss several operator ideal properties for so called Carleson embeddings of tent spaces into specific L q(μ-spaces, where μ is a Carleson measure on the complex unit disc. Characterizing absolutely q-summing, absolutely continuous and q-integral Carleson embeddings in terms of the underlying measure is our main topic. The presented results extend and integrate results especially known for composition operators on Hardy spaces as well as embedding theorems for function spaces of similar kind.

  9. Native American Women Leaders' Use of Information and Communication Technologies (ICTs) for Work-Life Balance (WLB) and Capacity Building

    Science.gov (United States)

    Jensen, Crystal C.

    2013-01-01

    Native American women's leadership, information communication technologies (ICTs), work-life balance (WLB) and human capacity building (HCB) are grounded in social justice issues due to their long history of overall cultural decimation, inequitable access to technology, monetary resources, and social power (agency), and influence. Currently, there…

  10. Capacity Building: Data- and Research-Informed Development of Schools and Teaching Practices in Denmark and Norway

    Science.gov (United States)

    Qvortrup, Lars

    2016-01-01

    Based on experiences from a number of large scale data- and research-informed school development projects in Denmark and Norway, led by the author, three hypotheses are discussed: that an effective way of linking research and practice is achieved (1) using a capacity building approach, that is, to collaborate in the practical school context…

  11. A Social Partnership Model to Promote Educators' Development in Mauritius through Formal and Informal Capacity-Building Initiatives

    Science.gov (United States)

    Santally, Mohammad Issack; Cooshna-Naik, Dorothy; Conruyt, Noel; Wing, Caroline Koa

    2015-01-01

    This paper describes a social partnership model based on the living lab concept to promote the professional development of educators through formal and informal capacity-building initiatives. The aim is to have a broader impact on society through community outreach educational initiatives. A Living Lab is an environment for user-centered…

  12. Native American Women Leaders' Use of Information and Communication Technologies (ICTs) for Work-Life Balance (WLB) and Capacity Building

    Science.gov (United States)

    Jensen, Crystal C.

    2013-01-01

    Native American women's leadership, information communication technologies (ICTs), work-life balance (WLB) and human capacity building (HCB) are grounded in social justice issues due to their long history of overall cultural decimation, inequitable access to technology, monetary resources, and social power (agency), and influence. Currently, there…

  13. 76 FR 4994 - Agency Information Collection: Activity Under OMB Review; Report of Traffic and Capacity...

    Science.gov (United States)

    2011-01-27

    ... consolidation. Traffic Forecasting The FAA uses traffic, operational and capacity data as important safety... and others of the effect major changes or innovations are having on the air transportation...

  14. 76 FR 39153 - Agency Information Collection; Activity Under OMB Review; Report of Traffic and Capacity...

    Science.gov (United States)

    2011-07-05

    .... Traffic Forecasting The FAA uses traffic, operational and capacity data as important safety indicators and... and others of the effect major changes or innovations are having on the air transportation...

  15. Enhancing the Capacity of Community Organizations to Evaluate HIV/AIDS Information Outreach: A Pilot Experiment in Expert Consultation

    Science.gov (United States)

    Dancy-Scott, Nicole; Williams-Livingston, Arletha; Plumer, Andrew; Dutcher, Gale A.; Siegel, Elliot R.

    2017-01-01

    The National Library of Medicine’s AIDS Community Information Outreach Program (ACIOP) supports and enables access to health information on the Internet by community-based organizations. A technical assistance (TA) model was developed to enhance the capacity of ACIOP awardees to plan, evaluate, and report the results of their funded projects. This consisted of individual Consultation offered by an experienced evaluator to advise on the suitability of proposed project plans and objectives, improve measurement analytics, assist in problem resolution and outcomes reporting, and identify other improvement possibilities. Group webinars and a moderated blog for the exchange of project-specific information were also offered. Structured data collections in the form of reports, online surveys, and key informant telephone interviews provided qualitative feedback on project progress, satisfaction with the TA, and the perceived impact of the interventions on evaluation capacity building. The Model was implemented in the 2013 funding cycle with seven organizations, and the level of reported satisfaction was uniformly high. One-on-one TA was requested by four awardee organizations, and was determined to have made a meaningful difference with three. Participation in the webinars was mandatory and high overall; and was deemed to be a useful means for delivering evaluation information. In subsequent funding cycles, submission of a Logic Model will be required of awardees as a new model intervention in the expectation that it will produce stronger proposals, and enable the evaluation consultant to identify earlier intervention opportunities leading to project improvements and evaluation capacity enhancements.

  16. Improving Nigerian health policymakers' capacity to access and utilize policy relevant evidence: outcome of information and communication technology training workshop.

    Science.gov (United States)

    Uneke, Chigozie Jesse; Ezeoha, Abel Ebeh; Uro-Chukwu, Henry; Ezeonu, Chinonyelum Thecla; Ogbu, Ogbonnaya; Onwe, Friday; Edoga, Chima

    2015-01-01

    Information and communication technology (ICT) tools are known to facilitate communication and processing of information and sharing of knowledge by electronic means. In Nigeria, the lack of adequate capacity on the use of ICT by health sector policymakers constitutes a major impediment to the uptake of research evidence into the policymaking process. The objective of this study was to improve the knowledge and capacity of policymakers to access and utilize policy relevant evidence. A modified "before and after" intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point likert scale according to the degree of adequacy; 1 = grossly inadequate, 4 = very adequate was employed. This study was conducted in Ebonyi State, south-eastern Nigeria and the participants were career health policy makers. A two-day intensive ICT training workshop was organized for policymakers who had 52 participants in attendance. Topics covered included: (i). intersectoral partnership/collaboration; (ii). Engaging ICT in evidence-informed policy making; use of ICT for evidence synthesis; (iv) capacity development on the use of computer, internet and other ICT. The pre-workshop mean of knowledge and capacity for use of ICT ranged from 2.19-3.05, while the post-workshop mean ranged from 2.67-3.67 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 8.3%-39.1%. Findings of this study suggest that policymakers' ICT competence relevant to evidence-informed policymaking can be enhanced through training workshop.

  17. On the Capacity of Memoryless Finite-State Multiple-Access Channels with Asymmetric State Information at the Encoders

    CERN Document Server

    Como, Giacomo

    2010-01-01

    A single-letter characterization is provided for the capacity region of finite-state multiple-access channels, when the channel state process is an independent and identically distributed sequence, the transmitters have access to partial (quantized) state information, and complete channel state information is available at the receiver. The partial channel state information is assumed to be asymmetric at the encoders. As a main contribution, a tight converse coding theorem is presented. The difficulties associated with the case when the channel state has memory are discussed and connections to decentralized stochastic control theory are presented.

  18. An Information Technology Framework for the Development of an Embedded Computer System for the Remote and Non-Destructive Study of Sensitive Archaeology Sites

    Directory of Open Access Journals (Sweden)

    Iliya Georgiev

    2017-04-01

    Full Text Available The paper proposes an information technology framework for the development of an embedded remote system for non-destructive observation and study of sensitive archaeological sites. The overall concept and motivation are described. The general hardware layout and software configuration are presented. The paper concentrates on the implementation of the following informational technology components: (a a geographically unique identification scheme supporting a global key space for a key-value store; (b a common method for octree modeling for spatial geometrical models of the archaeological artifacts, and abstract object representation in the global key space; (c a broadcast of the archaeological information as an Extensible Markup Language (XML stream over the Web for worldwide availability; and (d a set of testing methods increasing the fault tolerance of the system. This framework can serve as a foundation for the development of a complete system for remote archaeological exploration of enclosed archaeological sites like buried churches, tombs, and caves. An archaeological site is opened once upon discovery, the embedded computer system is installed inside upon a robotic platform, equipped with sensors, cameras, and actuators, and the intact site is sealed again. Archaeological research is conducted on a multimedia data stream which is sent remotely from the system and conforms to necessary standards for digital archaeology.

  19. Effective capacity of Nakagami-m fading channels with full channel state information in the low power regime

    KAUST Repository

    Benkhelifa, Fatma

    2013-09-01

    The effective capacity have been introduced by Wu and Neji as a link-layer model supporting statistical delay QoS requirements. In this paper, we propose to study the effective capacity of a Nakagami-m fading channel with full channel state information (CSI) at both the transmitter and at the receiver. We focus on the low Signal-to-Noise Ratio (SNR) regime. We show that the effective capacity for any arbitrary but finite statistically delay Quality of Service (QoS) exponent θ, scales essentially as S NRlog(1/SNR) exactly as the ergodic capacity, independently of any QoS constraint. We also characterize the minimum energy required for reliable communication, and the wideband slope to show that our results are in agreement with results established recently by Gursoy et al. We also propose an on-off power control scheme that achieves the capacity asymptotically using only one bit CSI feedback at the transmitter. Finally, some numerical results are presented to show the accuracy of our asymptotic results. © 2013 IEEE.

  20. P-sets and the Identification-recovery of F-outer Embedding Information%P-集合与F-外嵌入信息辨识-发现

    Institute of Scientific and Technical Information of China (English)

    于秀清

    2011-01-01

    利用外P-集合XF,给出信息(x)的F-外嵌入信息(x)F与F-外嵌入信息依赖概念,给出F-外嵌入信息存在性定理、F-外嵌入信息依赖性定理.给出F-外嵌入系数ρF与F-外嵌入度ηF概念,并利用这些概念,给出F-外嵌入信息关系定理与F-外嵌入辨识定理.利用这些概念与结果,给出F-外嵌入信息在信息系统中的应用.%By using outer P-sets XF, the concepts of F-outer embedding information (x)F and F-outer embedding information dependence, F-outer embedding coefficient and F-outer embedding degree to information(x) were proposed. Moreover, based on these concepts, existing theorems, dependence theorems and identification theorems about F-outer embedding information were presented. The application of F-outer embedding information in information system was disCUSSed.

  1. Non-equilibrium Information Envelopes and the Capacity-Delay-Error-Tradeoff of Source Coding

    CERN Document Server

    Lübben, Ralf

    2011-01-01

    This paper develops an envelope-based approach to establish a link between information and queueing theory. Unlike classical, equilibrium information theory, information envelopes focus on the dynamics of sources and coders, using functions of time that bound the number of bits generated. In the limit the information envelopes converge to the average behavior and recover the entropy of a source, respectively, the average codeword length of a coder. In contrast, on short time scales and for sources with memory it is shown that large deviations from known equilibrium results occur with non-negligible probability. These can cause significant network delays. Compared to well-known traffic models from queueing theory, information envelopes consider the functioning of information sources and coders, avoiding a priori assumptions, such as exponential traffic, or empirical, trace-based traffic models. Using results from the stochastic network calculus, the envelopes yield a characterization of the operating points of...

  2. Shannon information capacity of time reversal wideband multiple-input multiple-output system based on correlated statistical channels

    Science.gov (United States)

    Yu, Yang; Bing-Zhong, Wang; Shuai, Ding

    2016-05-01

    Utilizing channel reciprocity, time reversal (TR) technique increases the signal-to-noise ratio (SNR) at the receiver with very low transmitter complexity in complex multipath environment. Present research works about TR multiple-input multiple-output (MIMO) communication all focus on the system implementation and network building. The aim of this work is to analyze the influence of antenna coupling on the capacity of wideband TR MIMO system, which is a realistic question in designing a practical communication system. It turns out that antenna coupling stabilizes the capacity in a small variation range with statistical wideband channel response. Meanwhile, antenna coupling only causes a slight detriment to the channel capacity in a wideband TR MIMO system. Comparatively, uncorrelated stochastic channels without coupling exhibit a wider range of random capacity distribution which greatly depends on the statistical channel. The conclusions drawn from information difference entropy theory provide a guideline for designing better high-performance wideband TR MIMO communication systems. Project supported by the National Natural Science Foundation of China (Grant Nos. 61331007, 61361166008, and 61401065) and the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20120185130001).

  3. Identifying organizational capacities and incentives for clinical data-sharing: the case of a regional perinatal information system.

    Science.gov (United States)

    Korst, Lisa M; Signer, Jordana M K; Aydin, Carolyn E; Fink, Arlene

    2008-01-01

    The development of regional data-sharing among healthcare organizations is viewed as an important step in the development of health information technology (HIT), but little is known about this complex task. This is a case study of a regional perinatal data system that involved four hospitals, together responsible for over 10,000 births annually. Using standard qualitative methods, we chronicled project milestones, and identified 31 "critical incidents" that delayed or prevented their achievement. We then used these critical incidents to articulate six organizational capacity domains associated with the achievement of project milestones, and a seventh domain consisting of organizational incentives. Finally, we analyzed the relationship of milestone achievement to the presence of these capacities and incentives. This data center case suggests four requirements for sharing data across organizations: 1) a readiness assessment; 2) a perceived mandate; 3) a formal governance structure; and 4) a third party IT component.

  4. 76 FR 56780 - Notice of Proposed Information Collection: Comment Request; Capacity Building for Sustainable...

    Science.gov (United States)

    2011-09-14

    ... Sustainable Communities Program: Notice of Funding Availability AGENCY: Office Sustainable Housing and...-800-877-8339). FOR FURTHER INFORMATION CONTACT: Thaddeus Wincek, Office of Sustainable Housing and... amended. Dated: September 9, 2011. Shelley Poticha, Director, Office of Sustainable Housing and...

  5. Integrated Information Support System (IISS). Volume 5. Common Data Model Subsystem. Part 47. Embedded SQL User’s Manual

    Science.gov (United States)

    1990-09-30

    Responsible for providing software information services for the Common Data Model and IDEFIX integration methodology. ONTEK Responsible for defining and...contains a Conceptual Schema IDEFIX model used as an example throughout this manual. APPENDIX D, SAMPLE COBOL PROGRAMS This appendix consists of COBOL... IDEFIX is the extended version of IDEF1. Integrated Information Support System - (IISS) A test computing environment used to investigate, demonstrate and

  6. Analysis on Universoity Library ’s Practice in Embedded Information Service%高校图书馆嵌入式信息服务的实践分析

    Institute of Scientific and Technical Information of China (English)

    张伟红

    2014-01-01

    嵌入式信息服务已成为图书馆界的研究热点之一。阐述了陕西中医学院图书馆嵌入式服务的实践概况,分析了嵌入式服务实践中存在的问题,参照国内外嵌入式服务案例,构建出适合我国高校图书馆嵌入式服务的实践模式,包括设置嵌入式馆员、构建协调与评估机制、建立交流平台以及采用嵌入式服务方式等。%Embedded information service has become one of the research hotspots in library world. This paper expounds the practical situation of embedded service in the library of Shannxi College of Traditional Chinese Medicine, analyzes some problems existing in the practice of embedded service, and with the reference to the embedded service cases in China and foreign countries, constructs a practical model of embedded service that is suitable for university libraries in China, including setting the embedded librarians, constructing the coordination and evaluation mechanism, establishing the communication platform, and adopting the embedded service mode, etc.

  7. Leveraging the Power of State Longitudinal Data Systems: Building Capacity to Turn Data into Useful Information

    Science.gov (United States)

    Data Quality Campaign, 2011

    2011-01-01

    Faced with the need to create a competitive workforce and improve the quality of our education system, states are pursuing policy agendas to better prepare students for postsecondary education and careers. To inform these agendas, statewide longitudinal data systems (SLDSs) have become an invaluable asset and serve as a tool to help states answer…

  8. Second Sourcing vs. Sole Sourcing with Capacity Investment and Asymmetric Information

    OpenAIRE

    Cuihong Li; Laurens G. Debo

    2009-01-01

    We study the decision of a manufacturer (the buyer), expecting new sourcing opportunities in the future, in selecting between sole- and second-sourcing strategies for a noncommodity component. In a sole-sourcing strategy, the buyer commits to sourcing from a single supplier (the incumbent) over the entire horizon. In a second-sourcing strategy, the buyer keeps the option open to source from a new supplier (the entrant) in the future. Supplier costs are private information, and the incumbent's...

  9. Resurs-P" Satellite Hyperspectral Data: Preliminary Evaluation of Information Capacities

    Science.gov (United States)

    Zelentsov, Viacheslav; Sokolov, Boris; Grigorieva, Olga; Mochalov, Viktor; Potryasaev, Semen; Shumeiko, Viktor

    2016-08-01

    Satellite-based hyperspectral sensors provide spectroscopic information in relatively narrow contiguous spectral bands over a large area, and this property can be useful for a lot of practical tasks. "Resurs-P" hyperspectral equipment provides a new class of Earth observation data to improve Earth surface observability. The main features of this equipment are considered and the results of new hyperspectral data applications to solve problems vineyards and forest analysis and also depths measurements are given in the article.

  10. Microbiomorphic analysis as part of micromorphological investigations: composition, diagnostics and informative capacity for paleoenvironmental reconstructions

    OpenAIRE

    GOLYEVA A.A.

    2016-01-01

    Microbiomorphic analysis is a detailed study of microscopic particles of biogenic nature (plant detritus, phytoliths, shells of diatoms, spicules of sponges, pollen, etc.). Each of such particles characterizes environmental conditions at the time of its formation and, therefore, provides useful information for palaeoenvironmental reconstructions. The Early Pleistocene deposits were studied in Armenia at the sites, where tools of ancient hominids (Early Acheulian) were found. The genesis of th...

  11. Clicking to Learn: A Case Study of Embedding Radio-Frequency Based Clickers in an Introductory Management Information Systems Course

    Science.gov (United States)

    Nelson, Matthew L.; Hauck, Roslin V.

    2008-01-01

    The challenges associated with teaching a core introductory management information systems (MIS) course are well known (large class sizes serving a majority of non-MIS majors, sustaining student interests, encouraging class participation, etc.). This study offers a mechanism towards managing these challenges through the use of a simple and…

  12. HIV Strategic Information in Non-European Union Countries in the World Health Organization European Region: Capacity Development Needs

    Science.gov (United States)

    2017-01-01

    Background Capacity building of the national HIV strategic information system is a core component of the response to the HIV epidemic as it enables understanding of the evolving nature of the epidemic, which is critical for program planning and identification of the gaps and deficiencies in HIV programs. Objective The study aims to describe the results of the assessment of the needs for further development of capacities in HIV strategic information systems in the non-European Union (EU) countries in the World Health Organization European Region (EUR). Methods Self-administered questionnaires were distributed to national AIDS programs. The first questionnaire was sent to all countries (N=18) to find out, among other issues, the priority level for strengthening a range of HIV surveillance areas and their key gaps and weaknesses. The second questionnaire was sent to 15 countries to more specifically determine capacities for the analysis of the HIV care cascade. Results Responses to the first questionnaire were received from 10 countries, whereas 13 countries responded to the second questionnaire. Areas that were most frequently marked as being of high to moderate priority for strengthening were national electronic patient monitoring systems, evaluation of HIV interventions and impact analysis, implementation science, and data analysis. Key weaknesseses were lack of electronic reporting of HIV cases, problems with timeliness and completeness of reporting in HIV cases, under-estimates of the reported number of HIV-related deaths, and limited CD4 count testing at the time of HIV diagnosis. Migrant populations, internally displaced persons, and refugees were most commonly mentioned as groups not covered by surveillance, followed by clients of sex workers and men who have sex with men. The majority of countries reported that they were able to provide the number of people diagnosed with HIV who know their HIV status, which is important for the analysis of cross

  13. An embedded checklist in the Anesthesia Information Management System improves pre-anaesthetic induction setup: a randomised controlled trial in a simulation setting.

    Science.gov (United States)

    Wetmore, Douglas; Goldberg, Andrew; Gandhi, Nishant; Spivack, John; McCormick, Patrick; DeMaria, Samuel

    2016-10-01

    Anaesthesiologists work in a high stress, high consequence environment in which missed steps in preparation may lead to medical errors and potential patient harm. The pre-anaesthetic induction period has been identified as a time in which medical errors can occur. The Anesthesia Patient Safety Foundation has developed a Pre-Anesthetic Induction Patient Safety (PIPS) checklist. We conducted this study to test the effectiveness of this checklist, when embedded in our institutional Anesthesia Information Management System (AIMS), on resident performance in a simulated environment. Using a randomised, controlled, observer-blinded design, we compared performance of anaesthesiology residents in a simulated operating room under production pressure using a checklist in completing a thorough pre-anaesthetic induction evaluation and setup with that of residents with no checklist. The checklist was embedded in the simulated operating room's electronic medical record. Data for 38 anaesthesiology residents shows a statistically significant difference in performance in pre-anaesthetic setup and evaluation as scored by blinded raters (maximum score 22 points), with the checklist group performing better by 7.8 points (p<0.01). The effects of gender and year of residency on total score were not significant. Simulation duration (time to anaesthetic agent administration) was increased significantly by the use of the checklist. Required use of a pre-induction checklist improves anaesthesiology resident performance in a simulated environment. The PIPS checklist as an integrated part of a departmental AIMS warrant further investigation as a quality measure. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  14. Scheduling Semiconductor Multihead Testers Using Metaheuristic Techniques Embedded with Lot-Specific and Configuration-Specific Information

    Directory of Open Access Journals (Sweden)

    Yi-Feng Hung

    2013-01-01

    Full Text Available In the semiconductor back-end manufacturing, the device test central processing unit (CPU is most costly and is typically the bottleneck machine at the test plant. A multihead tester contains a CPU and several test heads, each of which can be connected to a handler that processes one lot of the same device. The residence time of a lot is closely related to the product mix on test heads, which increases the complexity of this problem. It is critical for the test scheduling problem to reduce CPU's idle time and to increase tester utilization. In this paper, a multihead tester scheduling problem is formulated as an identical parallel machine scheduling problem with the objective of minimizing makespan. A heuristic grouping method is developed to obtain a good initial solution in a short time. Three metaheuristic techniques, using lot-specific and configuration-specific information, are proposed to receive a near-optimum and are compared to traditional approaches. Computational experiments show that a tabu search with lot-specific information outperforms all other competing approaches.

  15. Implications of capacity expansion under uncertainty and value of information: The near-term energy planning of Japan

    Energy Technology Data Exchange (ETDEWEB)

    Krukanont, Pongsak [Energy Economics Laboratory, Department of Socio-Environmental Energy Science, Graduate School of Energy Science, Kyoto University, Yoshida-honmachi, Sakyo-ku, Kyoto 606-8501 (Japan); Tezuka, Tetsuo [Energy Economics Laboratory, Department of Socio-Environmental Energy Science, Graduate School of Energy Science, Kyoto University, Yoshida-honmachi, Sakyo-ku, Kyoto 606-8501 (Japan)]. E-mail: tezuka@energy.kyoto-u.ac.jp

    2007-10-15

    In this paper, we present the near-term analysis of capacity expansion under various uncertainties from the viewpoints of the decision-making process on the optimal allocation of investment and the value of information. An optimization model based on two-stage stochastic programming was developed using real data to describe the Japanese energy system as a case study. Different uncertainty parameters were taken into consideration by a disaggregate analysis of a bottom-up energy modeling approach, including end-use energy demands, plant operating availability and carbon tax rate. Four policy regimes represented as energy planning or policy options were also studied, covering business as usual, renewable energy target, carbon taxation and nuclear phase-out regimes. In addition, we investigated the role of various energy technologies and the behavior of the value of information with respect to the probability function of the worst-case scenario. This value of information provides decision makers with a quantitative analysis for the cost to obtain perfect information about the future. The developed model could be regarded as an applicable tool for decision support to provide a better understanding in energy planning and policy analyses.

  16. Strengthening capacity for local evidence to inform local responders to HIV in a remote Solomon Island health service

    Directory of Open Access Journals (Sweden)

    David MacLaren

    2015-04-01

    Full Text Available Background: Documenting specific knowledge and attitudes about HIV in the culturally diverse nation of Solomon Islands is essential to inform locally targeted public health responses. As part of a large capacity-strengthening project at Atoifi Adventist Hospital in East Kwaio, Solomon Islands, researchers, using a ‘learn-by-doing’ process, worked with participants in public health research methods. Methods: Overall, 43 people attended research capacity building workshops in 2011; eight joined the HIV study group. A cross-sectional survey including semi-structured interviews on HIV was conducted by the group. In February 2014, a hospital administrator was interviewed about how the 2011 study informed local HIV responses. Results: Of the 53 survey participants, 64% self-assessed as having little or no HIV knowledge, but 90% knew HIV could be transmitted between men and women during sex. Less than 50% knew HIV could be transmitted between two men having sex, 45% thought HIV could be transmitted by mosquitoes and 55% agreed condoms help protect from HIV. Most participants reported negative attitudes towards people with HIV. Three years later the health administrator reported ad hoc responses to HIV because of low HIV prevalence, increasing noncommunicable diseases, staff turnover and resource shortages. Discussion: This HIV study was used to strengthen research skills in local health professionals and community members in Solomon Islands. It showed that community members require accurate information about HIV transmission and that entrenched stigma is an issue. Although results provided local evidence for local response, ongoing health system challenges and little local HIV transmission meant HIV services remain rudimentary.

  17. RELATION BETWEEN ORGANIZATIONAL - AND INFORMATION RESILIENCE: A WAY FOR IMPROVEMENT OF SYSTEM CAPACITY

    Directory of Open Access Journals (Sweden)

    Slavko Arsovski

    2010-09-01

    Full Text Available In today's business conditions, organizations worldwide operate with the transactions executed and communications received immediately after they are initiated. Tolerance in every aspect is shrinking and many organizations are outsourcing dependable. Disruption in business has widened, it includes traditional natural disaster and any event that disturbs this fast-paced operational flow - from an acquisition or organization growth to a new government regulation or to a scheduled system upgrade. This resulted in a new business paradigm organizational resilience. Impact of Information Systems (IS on organizational resilience is through: (1 higher level of knowledge and transparency of business processes, (2 higher level of flexibility, agility and sustainability of organization, (3 enhancement of key competiveness forces, (4 enhancements of awareness about business risks and vulnerability of organizations, (5 enhancement of speed of organization recovery, (6 enhancement of organizational culture and awareness about resilience and (7 supporting the organization sustainability. Each possible impact of IS varies and depends upon two sides and their relations: (1 characteristics of IS which is related to ICT characteristics and (2 characteristics of organization. Because that, authors contribution in this paper is to make clear different approaches to IS - and organizational resilience and establish the model for simulation of this impact. This model is evaluated on an example and presented as a case study.

  18. Embedded foveation image coding.

    Science.gov (United States)

    Wang, Z; Bovik, A C

    2001-01-01

    The human visual system (HVS) is highly space-variant in sampling, coding, processing, and understanding. The spatial resolution of the HVS is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. By taking advantage of this fact, it is possible to remove considerable high-frequency information redundancy from the peripheral regions and still reconstruct a perceptually good quality image. Great success has been obtained previously by a class of embedded wavelet image coding algorithms, such as the embedded zerotree wavelet (EZW) and the set partitioning in hierarchical trees (SPIHT) algorithms. Embedded wavelet coding not only provides very good compression performance, but also has the property that the bitstream can be truncated at any point and still be decoded to recreate a reasonably good quality image. In this paper, we propose an embedded foveation image coding (EFIC) algorithm, which orders the encoded bitstream to optimize foveated visual quality at arbitrary bit-rates. A foveation-based image quality metric, namely, foveated wavelet image quality index (FWQI), plays an important role in the EFIC system. We also developed a modified SPIHT algorithm to improve the coding efficiency. Experiments show that EFIC integrates foveation filtering with foveated image coding and demonstrates very good coding performance and scalability in terms of foveated image quality measurement.

  19. Essays in energy policy and planning modeling under uncertainty: Value of information, optimistic biases, and simulation of capacity markets

    Science.gov (United States)

    Hu, Ming-Che

    Optimization and simulation are popular operations research and systems analysis tools for energy policy modeling. This dissertation addresses three important questions concerning the use of these tools for energy market (and electricity market) modeling and planning under uncertainty. (1) What is the value of information and cost of disregarding different sources of uncertainty for the U.S. energy economy? (2) Could model-based calculations of the performance (social welfare) of competitive and oligopolistic market equilibria be optimistically biased due to uncertainties in objective function coefficients? (3) How do alternative sloped demand curves perform in the PJM capacity market under economic and weather uncertainty? How does curve adjustment and cost dynamics affect the capacity market outcomes? To address the first question, two-stage stochastic optimization is utilized in the U.S. national MARKAL energy model; then the value of information and cost of ignoring uncertainty are estimated for three uncertainties: carbon cap policy, load growth and natural gas prices. When an uncertainty is important, then explicitly considering those risks when making investments will result in better performance in expectation (positive expected cost of ignoring uncertainty). Furthermore, eliminating the uncertainty would improve strategies even further, meaning that improved forecasts of future conditions are valuable ( i.e., a positive expected value of information). Also, the value of policy coordination shows the difference between a strategy developed under the incorrect assumption of no carbon cap and a strategy correctly anticipating imposition of such a cap. For the second question, game theory models are formulated and the existence of optimistic (positive) biases in market equilibria (both competitive and oligopoly markets) are proved, in that calculated social welfare and producer profits will, in expectation, exceed the values that will actually be received

  20. Informational Capacity of the Financial Statements of Brazilian Banks: An Analysis from the Perspective of Liquidity Risk

    Directory of Open Access Journals (Sweden)

    Orleans Silva Martins

    2012-12-01

    Full Text Available This study aims to analyze the financial statements of Brazilian banks, from the perspective of liquidity risk by exploring whether the Statements of Cash Flows and Notes to these companies meet the requirements concerning the dissemination of liquidity risk demands by IFRS 7 and the principles of the Basel Committee. Additionally, we investigated whether the coefficients of box cover these companies, calculated from the DFC, show some respect to compliance with those requirements. For that, was raised a theoretical framework about liquidity and liquidity risk, and the role of DFC and Notes before the disclosure of information relating to liquidity. Accordingly, an exploratory study was conducted with the 28 companies that comprise the Banks segment of the BM&F Bovespa, through its financial statements for the year 2009. The main results indicate a low capacity of these informative statements about the situation and liquidity risk, given that only 60.71% of the requirements contained in the standards were met. Still, we conclude that the mere fact that it has good cash coverage ratios is not a necessary condition to be among the companies that meet the disclosure requirements of the situation and liquidity risk, or vice versa. Thus, even when companies have good liquidity indicators, the information required by the IASB and the BCBS has not been disclosed in its financial statements.

  1. Building capacity for in-situ phenological observation data to support integrated biodiversity information at local to national scales

    Science.gov (United States)

    Weltzin, J. F.

    2016-12-01

    Earth observations from a variety of platforms and across a range of scales are required to support research, natural resource management, and policy- and decision-making in a changing world. Integrated earth observation data provides multi-faceted information critical to decision support, vulnerability and change detection, risk assessments, early warning and modeling, simulation and forecasting in the natural resource societal benefit area. The USA National Phenology Network (USA-NPN; www.usanpn.org) is a national-scale science and monitoring initiative focused on phenology - the study of seasonal life-cycle events such as leafing, flowering, reproduction, and migration - as a tool to understand the response of biodiversity to environmental variation and change. USA-NPN provides a hierarchical, national monitoring framework that enables other organizations to leverage the capacity of the Network for their own applications - minimizing investment and duplication of effort - while promoting interoperability and sustainability. Over the last decade, the network has focused on the development of a centralized database for in-situ (ground based) observations of plants and animals, now with 8 M records for the period 1954-present. More recently, we have developed a workflow for the production and validation of spatially gridded phenology products based on models that couple the organismal data with climatological and meteorological data at daily time-steps and relatively fine spatial resolutions ( 2.5 km to 4 km). These gridded data are now ripe for integration with other modeled or earth observation gridded data, e.g., indices of drought impact or land surface reflectance. This greatly broadens capacity to scale organismal observational data to landscapes and regions, and enables novel investigations of biophysical interactions at unprecedented scales, e.g., continental-scale migrations. Sustainability emerges from identification of stakeholder needs, segmentation of

  2. Role of information in preparing men for transrectal ultrasound guided prostate biopsy: a qualitative study embedded in the ProtecT trial.

    Science.gov (United States)

    Wade, Julia; Rosario, Derek J; Howson, Joanne; Avery, Kerry N L; Salter, C Elizabeth; Goodwin, M Louise; Blazeby, Jane M; Lane, J Athene; Metcalfe, Chris; Neal, David E; Hamdy, Freddie C; Donovan, Jenny L

    2015-02-28

    The histological diagnosis of prostate cancer requires a prostate needle biopsy. Little is known about the relationship between information provided to prepare men for transrectal ultrasound guided biopsy (TRUS-Bx) and how men experience biopsy. The objectives were a) to understand men's experiences of biopsy as compared to their expectations; and b) to propose current evidence-based information for men undergoing TRUS-Bx. Between February 2006 and May 2008, 1,147 men undergoing a standardised 10-core transrectal ultrasound guided biopsy protocol under antibiotic cover following a PSA 3.0-19.9 ng/ml in the Prostate Testing for Cancer and Treatment (ProtecT) trial, completed questionnaires about biopsy symptoms. In this embedded qualitative study, in-depth interviews were undertaken with 85 men (mean age 63.6 yrs, mean PSA 4.5 ng/ml) to explore men's experiences of prostate biopsy and how the experience might be improved. Interview data were analysed thematically using qualitative research methods. Findings from the qualitative study were used to guide selection of key findings from the questionnaire study in developing a patient information leaflet preparing men for biopsy. Although most men tolerated TRUS-Bx, a quarter reported problematic side-effects and anxiety. Side effects were perceived as problematic and anxiety arose most commonly when experiences deviated from information provided. Men who were unprepared for elements of TRUS-Bx procedure or its sequelae responded by contacting health professionals for reassurance and voiced frustration that pre-biopsy information had understated the possible severity or duration of pain/discomfort and bleeding. Findings from questionnaire and interview data were combined to propose a comprehensive, evidence-based patient information leaflet for TRUS-Bx. Men reported anxiety associated with TRUS-Bx or its side-effects most commonly if they felt inadequately prepared for the procedure. Data from this qualitative study and

  3. The Contribution of Information Acquisition and Management Capacity to Administrators' Decision-Making Effectiveness in Tertiary Institutions in South-Western Nigeria

    Science.gov (United States)

    Fabunmi, Martins; Erwat, Eseza Akiror

    2008-01-01

    This study investigated through empirical methods the extent to which information acquisition and information management capacity of administrators in tertiary institutions in South-Western Nigeria contributed to their decision-making effectiveness. It adopted the ex post facto survey research design, using the random sampling technique to select…

  4. Embedded Processor Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Embedded Processor Laboratory provides the means to design, develop, fabricate, and test embedded computers for missile guidance electronics systems in support...

  5. Evidence-informed capacity building for setting health priorities in low- and middle-income countries: A framework and recommendations for further research [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Ryan Li

    2017-03-01

    Full Text Available Priority-setting in health is risky and challenging, particularly in resource-constrained settings. It is not simply a narrow technical exercise, and involves the mobilisation of a wide range of capacities among stakeholders – not only the technical capacity to “do” research in economic evaluations. Using the Individuals, Nodes, Networks and Environment (INNE framework, we identify those stakeholders, whose capacity needs will vary along the evidence-to-policy continuum. Policymakers and healthcare managers require the capacity to commission and use relevant evidence (including evidence of clinical and cost-effectiveness, and of social values; academics need to understand and respond to decision-makers’ needs to produce relevant research. The health system at all levels will need institutional capacity building to incentivise routine generation and use of evidence. Knowledge brokers, including priority-setting agencies (such as England’s National Institute for Health and Care Excellence, and Health Interventions and Technology Assessment Program, Thailand and the media can play an important role in facilitating engagement and knowledge transfer between the various actors. Especially at the outset but at every step, it is critical that patients and the public understand that trade-offs are inherent in priority-setting, and careful efforts should be made to engage them, and to hear their views throughout the process. There is thus no single approach to capacity building; rather a spectrum of activities that recognises the roles and skills of all stakeholders. A range of methods, including formal and informal training, networking and engagement, and support through collaboration on projects, should be flexibly employed (and tailored to specific needs of each country to support institutionalisation of evidence-informed priority-setting. Finally, capacity building should be a two-way process; those who build capacity should also attend to

  6. Conceptualizing Embedded Configuration

    DEFF Research Database (Denmark)

    Oddsson, Gudmundur Valur; Hvam, Lars; Lysgaard, Ole

    2006-01-01

    and services. The general idea can be named embedded configuration. In this article we intend to conceptualize embedded configuration, what it is and is not. The difference between embedded configuration, sales configuration and embedded software is explained. We will look at what is needed to make embedded...... configuration systems. That will include requirements to product modelling techniques. An example with consumer electronics will illuminate the elements of embedded configuration in settings that most can relate to. The question of where embedded configuration would be relevant is discussed, and the current...

  7. The Ministry of Industry and Information Technology Laid out Objectives and Tasks on Eliminating Backward Production Capacity for 18 Industries

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ In order to implement the plan and requirements set forth by the State Council to further strengthen the work of eliminating backward production capacity,and assign and implement the tasks in 2010,the working conference of the national industrial system on eliminating backward production capacity was held in Beijing on May 27th and 28th,2010.

  8. Effect of Functional Capacity Evaluation information on the judgment of physicians about physical work ability in the context of disability claims

    NARCIS (Netherlands)

    Wind, H.; Gouttebarge, V.; Kuijer, P.P.F.M.; Sluiter, J.K.; Frings-Dresen, M.H.W.

    2009-01-01

    Purpose To test whether Functional Capacity Evaluation (FCE) information lead insurance physicians (IPs) to change their judgment about the physical work ability of claimants with musculoskeletal disorders (MSDs). Methods Twenty-seven IPs scored twice the physical work ability of two claimants for

  9. Evaluation Capacity-Building of Internet Information Credibility%互联网信息可信性评价能力培养

    Institute of Scientific and Technical Information of China (English)

    虞俊杰

    2012-01-01

    日益丰富的互联网学术信息资源作为图书馆文献资源的有益补充,已成为用户信息资源获取的重要渠道。面对互联网庞杂无序的信息资源,图书馆用户信息评价能力的缺失为正确、合理、有效地利用互联网信息带来了障碍。用户互联网可信性评价能力可分为信息检索能力、信息认知能力和信息判断能力。图书馆应从提高用户信息检索能力、分析互联网用户的知识分享动机、掌握常用的互联网信息外部特征分析途径等方面,培养用户的信息可信性评价能力。%As the useful supplement to library literature resources, increasingly rich intemet academic information resources become the important channel of users accessing to information resources. Facing the chaotic information resources an internet, libraries are lack of the evaluation capacity of credibility users,it brings the barrier for the correct, reasonable and effective utilization of the intemet information. The evaluation capacity of the intemet information credibility of users could be divided into the information retrieval ability, the information cognitive ability and the information judgment ability. Libraries should bring up the evaluation capacity of the information credibility of users from following aspects: improving user's information retrieval capabilities, analyzing the knowledge sharing motivation of intemet users, mastering common analytical approaches of external characteristics of internet information.

  10. Strengthening national capacities for researching on Social Determinants of Health (SDH) towards informing and addressing health inequities in Tanzania

    OpenAIRE

    Mtenga, Sally; Masanja, Irene M; Mamdani, Masuma

    2016-01-01

    Background Tanzania’s socio-economic development is challenged by sharp inequities between and within urban and rural areas, and among different socio-economic groups. This paper discusses the importance of strengthening SDH research, knowledge, relevant capacities and responsive systems towards addressing health inequities in Tanzania. Methods Based on a conceptual framework for building SDH research capacity, a mapping of existing research systems was undertaken between February and June 20...

  11. Unsteady Flame Embedding

    KAUST Repository

    El-Asrag, Hossam A.

    2011-01-01

    Direct simulation of all the length and time scales relevant to practical combustion processes is computationally prohibitive. When combustion processes are driven by reaction and transport phenomena occurring at the unresolved scales of a numerical simulation, one must introduce a dynamic subgrid model that accounts for the multiscale nature of the problem using information available on a resolvable grid. Here, we discuss a model that captures unsteady flow-flame interactions- including extinction, re-ignition, and history effects-via embedded simulations at the subgrid level. The model efficiently accounts for subgrid flame structure and incorporates detailed chemistry and transport, allowing more accurate prediction of the stretch effect and the heat release. In this chapter we first review the work done in the past thirty years to develop the flame embedding concept. Next we present a formulation for the same concept that is compatible with Large Eddy Simulation in the flamelet regimes. The unsteady flame embedding approach (UFE) treats the flame as an ensemble of locally one-dimensional flames, similar to the flamelet approach. However, a set of elemental one-dimensional flames is used to describe the turbulent flame structure directly at the subgrid level. The calculations employ a one-dimensional unsteady flame model that incorporates unsteady strain rate, curvature, and mixture boundary conditions imposed by the resolved scales. The model is used for closure of the subgrid terms in the context of large eddy simulation. Direct numerical simulation (DNS) data from a flame-vortex interaction problem is used for comparison. © Springer Science+Business Media B.V. 2011.

  12. Hybrid manifold embedding.

    Science.gov (United States)

    Liu, Yang; Liu, Yan; Chan, Keith C C; Hua, Kien A

    2014-12-01

    In this brief, we present a novel supervised manifold learning framework dubbed hybrid manifold embedding (HyME). Unlike most of the existing supervised manifold learning algorithms that give linear explicit mapping functions, the HyME aims to provide a more general nonlinear explicit mapping function by performing a two-layer learning procedure. In the first layer, a new clustering strategy called geodesic clustering is proposed to divide the original data set into several subsets with minimum nonlinearity. In the second layer, a supervised dimensionality reduction scheme called locally conjugate discriminant projection is performed on each subset for maximizing the discriminant information and minimizing the dimension redundancy simultaneously in the reduced low-dimensional space. By integrating these two layers in a unified mapping function, a supervised manifold embedding framework is established to describe both global and local manifold structure as well as to preserve the discriminative ability in the learned subspace. Experiments on various data sets validate the effectiveness of the proposed method.

  13. High Capacity data hiding using LSB Steganography and Encryption

    Directory of Open Access Journals (Sweden)

    Shamim Ahmed Laskar

    2013-01-01

    Full Text Available The network provides a method of communication to distribute information to the masses. With the growthof data communication over computer network, the security of information has become a major issue.Steganography and cryptography are two different data hiding techniques. Steganography hides messagesinside some other digital media. Cryptography, on the other hand obscures the content of the message. Wepropose a high capacity data embedding approach by the combination of Steganography andcryptography. In the process a message is first encrypted using transposition cipher method and then theencrypted message is embedded inside an image using LSB insertion method. The combination of these twomethods will enhance the security of the data embedded. This combinational methodology will satisfy therequirements such as capacity, security and robustness for secure data transmission over an open channel.A comparative analysis is made to demonstrate the effectiveness of the proposed method by computingMean square error (MSE and Peak Signal to Noise Ratio (PSNR. We analyzed the data hiding techniqueusing the image performance parameters like Entropy, Mean and Standard Deviation. The stego imagesare tested by transmitting them and the embedded data are successfully extracted by the receiver. The mainobjective in this paper is to provide resistance against visual and statistical attacks as well as highcapacity.

  14. Watermark Embedding and Detection

    CERN Document Server

    Zhong, Jidong

    2006-01-01

    The embedder and the detector (or decoder) are the two most important components of the digital watermarking systems. Thus in this work, we discuss how to design a better embedder and detector (or decoder). I first give a summary of the prospective applications of watermarking technology and major watermarking schemes in the literature. My review on the literature closely centers upon how the side information is exploited at both embedders and detectors. In Chapter 3, I explore the optimum detector or decoder according to a particular probability distribution of the host signals. We found that the performance of both multiplicative and additive spread spectrum schemes depends on the shape parameter of the host signals. For spread spectrum schemes, the performance of the detector or the decoder is reduced by the host interference. Thus I present a new host-interference rejection technique for the multiplicative spread spectrum schemes. Its embedding rule is tailored to the optimum detection or decoding rule. T...

  15. Embedded fiber-optic sensing for accurate internal monitoring of cell state in advanced battery management systems part 1: Cell embedding method and performance

    Science.gov (United States)

    Raghavan, Ajay; Kiesel, Peter; Sommer, Lars Wilko; Schwartz, Julian; Lochbaum, Alexander; Hegyi, Alex; Schuh, Andreas; Arakaki, Kyle; Saha, Bhaskar; Ganguli, Anurag; Kim, Kyung Ho; Kim, ChaeAh; Hah, Hoe Jin; Kim, SeokKoo; Hwang, Gyu-Ok; Chung, Geun-Chang; Choi, Bokkyu; Alamgir, Mohamed

    2017-02-01

    A key challenge hindering the mass adoption of Lithium-ion and other next-gen chemistries in advanced battery applications such as hybrid/electric vehicles (xEVs) has been management of their functional performance for more effective battery utilization and control over their life. Contemporary battery management systems (BMS) reliant on monitoring external parameters such as voltage and current to ensure safe battery operation with the required performance usually result in overdesign and inefficient use of capacity. More informative embedded sensors are desirable for internal cell state monitoring, which could provide accurate state-of-charge (SOC) and state-of-health (SOH) estimates and early failure indicators. Here we present a promising new embedded sensing option developed by our team for cell monitoring, fiber-optic sensors. High-performance large-format pouch cells with embedded fiber-optic sensors were fabricated. The first of this two-part paper focuses on the embedding method details and performance of these cells. The seal integrity, capacity retention, cycle life, compatibility with existing module designs, and mass-volume cost estimates indicate their suitability for xEV and other advanced battery applications. The second part of the paper focuses on the internal strain and temperature signals obtained from these sensors under various conditions and their utility for high-accuracy cell state estimation algorithms.

  16. Crop advisors as climate information brokers: Building the capacity of US farmers to adapt to climate change

    Directory of Open Access Journals (Sweden)

    Maria Carmen Lemos

    2014-01-01

    Full Text Available This paper examines the role of crop advisors as brokers of climate information to support US corn farmers to adapt to climatic change. It uses quantitative data collected from a broad survey of crop advisors in the US Corn Belt to examine the factors that shape advisors’ use of (and willingness to provide climate information to their clients. Building upon a general model of climate information usability we argue that advisors’ willingness to provide climate advice to farmers is influenced by three main factors: their information seeking habits and behavior, their experience with innovation in the past, and how climate information interplays with other kinds of information that they provide—especially agronomic advice. We find that advisors’ willingness to provide climate related information depends both on factors at the individual and organizational level and on the type of advice they provide. First, at the individual and organizational levels, advisors who work in supportive organizations and who collaborate with other advisors are more likely to provide climate information. Second, advisors are more likely to provide climate information if it does not interfere with their main profit making business (e.g. provision of agronomic advice. Third, there is a significant positive relationship between trust in a greater number or sources of information and use of climate information. Fourth, the way advisors perceive short- and long-term risk also influences their willingness to provide climate information; the more concerned they are about long-term climate-related risks to farming, the more likely they are to provide (or want to provide advice based on climate information. Differently from other empirical work in the literature, our analytical model suggests that neither negative experiences with climate information in the past nor the high level of uncertainty characteristic of climate information appear to influence advisors

  17. Aedes Taeniorhynchus Vectorial Capacity Informs A Pre-Emptive Assessment Of West Nile Virus Establishment In Galápagos

    OpenAIRE

    Gillian Eastwood; Goodman, Simon J.; Cunningham, Andrew A.; Kramer, Laura D.

    2013-01-01

    Increased connectivity with the mainland has led to the arrival of many invasive species to the Galápagos Islands, including novel pathogens, threatening the archipelago's unique fauna. Here we consider the potential role of the mosquito Aedes taeniorhynchus in maintaining the flavivirus West Nile virus [WNV] should it reach the islands. We report on three components of vectorial capacity - vector competency, distributional abundance and host-feeding. In contrast to USA strains, Galápagos A. ...

  18. Enhancing the Capacity of Policy-Makers to Develop Evidence-Informed Policy Brief on Infectious Diseases of Poverty in Nigeria

    Directory of Open Access Journals (Sweden)

    Chigozie Jesse Uneke

    2015-09-01

    Full Text Available Background The lack of effective use of research evidence in policy-making is a major challenge in most low- and middle-income countries (LMICs. There is need to package research data into effective policy tools that will help policy-makers to make evidence-informed policy regarding infectious diseases of poverty (IDP. The objective of this study was to assess the usefulness of training workshops and mentoring to enhance the capacity of Nigerian health policy-makers to develop evidence-informed policy brief on the control of IDP. Methods A modified “before and after” intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point Likert scale according to the degree of adequacy; 1 = “grossly inadequate,” 4 = “very adequate” was employed. The main parameter measured was participants’ perceptions of their own knowledge/understanding. This study was conducted at subnational level and the participants were the career health policy-makers drawn from Ebonyi State in the South-Eastern Nigeria. A oneday evidence-to-policy workshop was organized to enhance the participants’ capacity to develop evidence-informed policy brief on IDP in Ebonyi State. Topics covered included collaborative initiative; preparation and use of policy briefs; policy dialogue; ethics in health policy-making; and health policy and politics. Results The preworkshop mean of knowledge and capacity ranged from 2.49-3.03, while the postworkshop mean ranged from 3.42–3.78 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 20.10%–45%. Participants were divided into 3 IDP mentorship groups (malaria, schistosomiasis, lymphatic filariasis [LF] and were mentored to identify potential policy options/recommendations for control of the diseases for the policy briefs. These policy options were subjected to research

  19. Research on the miniaturization of embedded Linux system

    Science.gov (United States)

    Wang, Ya-Jun

    2013-07-01

    In order to apply Linux into embedded system, the realization of system miniaturization is a basic request, in which way we can put an entire Linux system into a small-capacity memory card. This dissertation provides a thorough analysis over the miniaturization of Linux system in following aspects: configuring Linux kernel, setting up embedded C function library, using miniature Shell, establishing embedded file system, etc.

  20. Design of cigarette making machine informational platform based on embedded Linux%嵌入式Linux的卷烟机信息化平台设计

    Institute of Scientific and Technical Information of China (English)

    徐晓龙; 樊柄麟

    2016-01-01

    传统卷烟机通过各类总线连接工控机MLP和控制检测系统,从而实现了设备内部通信和人机交互。文章提出嵌入式Linux操作系统的解决方案:对外加入B/S架构,保留原有的工控机MLP的C/S架构,建立WebServer,支持互联网的接入;对内统计生产数据,建立嵌入式数据库,最终实现信息平台设计。%The traditional cigarette making machine is connected with the industrial control computer MLP and the control detection system through various kinds of bus, so as to realize the internal communication and human computer interaction. In this paper a solution based on embedded Linux operating system is proposed, in which, B/S architecture is added for the outside access, the Web Server is build to support Internet access while the original C/S architecture of industrial control computer MLP is retained; at the inside, the cigarette making machine's informatization platform is implemented by building an embedded database for production data statistics.

  1. Exploration and Practice on Embedding Professional Knowledge in Information Retrieval Class%专业知识嵌入信息检索课教学的探索与实践

    Institute of Scientific and Technical Information of China (English)

    张国臣

    2012-01-01

    With professional knowledge embedded, the information retrieval class could be tightly combined with students' special- ized course, and gradually inspires students' interests in both professional knowledge and information retrieval class. The author prac- tices embedding professional key words in information retrieval class. By analyzing the feedback questionniar, the author concludes the virtues and defects of the method, and puts forword some suggestions.%介绍将专业知识嵌入信息检索课教学中的方式,指出这种教学模式可将信息检索教学内容与学生专业课知识相结合,激发学生学习专业知识的兴趣;根据问卷调查反馈结果,分析专业知识嵌入信息检索课教学的优点及问题,提出完善措施。

  2. An Assessment of National Maternal and Child Health Policy-Makers’ Knowledge and Capacity for Evidence-Informed Policy-Making in Nigeria

    Science.gov (United States)

    Uneke, Chigozie Jesse; Sombie, Issiaka; Keita, Namoudou; Lokossou, Virgil; Johnson, Ermel; Ongolo-Zogo, Pierre

    2017-01-01

    Background: There is increasing interest globally in the use of more rigorous processes to ensure that maternal, newborn, and child health (MNCH) care recommendations are informed by the best available research evidence use. The purpose of this study was to engage Nigerian MNCH policy-makers and other stakeholders to consider issues around research to policy and practice interface and to assess their existing knowledge and capacity on the use of research evidence for policy-making and practice. Methods: The study design is a cross-sectional evaluation of MNCH stakeholders’ knowledge as it pertains different dimensions of research to practice. This was undertaken during a national MNCH stakeholders’ engagement event convened under the auspices of the West African Health Organization (WAHO) and the Federal Ministry of Health (FMoH) in Abuja, Nigeria. A questionnaire was administered to participants, which was designed to assess participants’ knowledge, capacity and organizational process of generation, synthesis and utilization of research evidence in policy-making regarding MNCH. Results: A total of 40 participants signed the informed consent form and completed the questionnaire. The mean ratings (MNRs) of participants’ knowledge of electronic databases and capacity to identify and obtain relevant research evidence from electronic databases ranged from 3.62-3.68 on the scale of 5. The MNRs of participants’ level of understanding of a policy brief, a policy dialogue and the role of researchers in policy-making ranged from 3.50-3.86. The MNRs of participants’ level of understanding of evidence in policy-making context, types and sources of evidence, capacity to identify, select, adapt, and transform relevant evidence into policy ranged from 3.63-4.08. The MNRs of the participants’ organization’s capacity to cover their geographical areas of operation were generally low ranging from 3.32-3.38 in terms of manpower, logistics, facilities, and external

  3. Pro Linux Embedded Systems

    CERN Document Server

    Sally, Gene

    2010-01-01

    Today, Linux is included with nearly every embedded platform. Embedded developers can take a more modern route and spend more time tuning Linux and taking advantage of open source code to build more robust, feature-rich applications. While Gene Sally does not neglect porting Linux to new hardware, modern embedded hardware is more sophisticated than ever: most systems include the capabilities found on desktop systems. This book is written from the perspective of a user employing technologies and techniques typically reserved for desktop systems. * Modern guide for developing embedded Linux syst

  4. Embedding beyond electrostatics

    DEFF Research Database (Denmark)

    Nåbo, Lina J.; Olsen, Jógvan Magnus Haugaard; Holmgaard List, Nanna;

    2016-01-01

    We study excited states of cholesterol in solution and show that, in this specific case, solute wave-function confinement is the main effect of the solvent. This is rationalized on the basis of the polarizable density embedding scheme, which in addition to polarizable embedding includes non-electrostatic...... repulsion that effectively confines the solute wave function to its cavity. We illustrate how the inclusion of non-electrostatic repulsion results in a successful identification of the intense π → π∗ transition, which was not possible using an embedding method that only includes electrostatics....... This underlines the importance of non-electrostatic repulsion in quantum-mechanical embedding-based methods....

  5. INFORMATIONAL COMMUNICATION BETWEEN THE PARTICIPANTS OF A CONSTRUCTION PROJECT AS AN ADDITIONAL FACTOR IN EVALUATING THE ORGANIZATIONAL AND TECHNOLOGICAL CAPACITY

    Directory of Open Access Journals (Sweden)

    Lapidus Azariy Abramovich

    2016-06-01

    Full Text Available The current trends of dynamic implementation of new materials, equipment and organizational and technological solutions in the construction lead to increase of information volume. Although the great amount of information flows isn’t fixed in the final variant of design documentation or doesn’t reach the construction site as instructions. This problem is most pressing for major construction projects. The main reason for such a loss of information is inefficiency of data management. The article discusses the influence of the interaction between the participants of a construction project on the effectiveness of the use of information flows within the construction project. The article also indicates the justification of such influence for organizational and technological building project evaluation, which is formed on the basis of information flows. The basic components of the information flow and conditions of effective transfer to final recipient are given. The concept of the role of a participant of building project is introduced as social component of information flow transfer is.

  6. Corrosion Monitors for Embedded Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Robinson, Alex L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pfeifer, Kent B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Casias, Adrian L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Howell, Stephen W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sorensen, Neil R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Missert, Nancy A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-05-01

    We have developed and characterized novel in-situ corrosion sensors to monitor and quantify the corrosive potential and history of localized environments. Embedded corrosion sensors can provide information to aid health assessments of internal electrical components including connectors, microelectronics, wires, and other susceptible parts. When combined with other data (e.g. temperature and humidity), theory, and computational simulation, the reliability of monitored systems can be predicted with higher fidelity.

  7. Embedded multiprocessors scheduling and synchronization

    CERN Document Server

    Sriram, Sundararajan

    2009-01-01

    Techniques for Optimizing Multiprocessor Implementations of Signal Processing ApplicationsAn indispensable component of the information age, signal processing is embedded in a variety of consumer devices, including cell phones and digital television, as well as in communication infrastructure, such as media servers and cellular base stations. Multiple programmable processors, along with custom hardware running in parallel, are needed to achieve the computation throughput required of such applications. Reviews important research in key areas related to the multiprocessor implementation of multi

  8. 嵌入云信息平台双向中继物理层数据传输协议%Bidirectional Relay Physical Layer Data Transmission Protocol Embedded Cloud Information Platform

    Institute of Scientific and Technical Information of China (English)

    唐型基; 潘齐欣; 李怀颖

    2015-01-01

    In the design of embedded cloud information platform, data scheduling and task allocation ability need to design the physical layer data transmission protocol optimization information platform. Relay physical layer data transmission pro-tocol of traditional protocol using UDP protocol to build cloud information platform, produce a lot of flow accumulation, re-sulting in physical layer of jam. This paper presents a load of embedded cloud information platform physical layer data transmission protocol design algorithm based on equilibrium of two-way relay. The construction of network model of embed-ded cloud information platform, information platform for data compression, through two-way relay physical layer data trans-mission, control function defined physical layer data transmission, the realization of physical layer protocol of data transmis-sion of construction, realize the data dynamic allocation. The experimental results show that, using this algorithm, it can ef-fectively improve the data transmission efficiency, and reduce the data transmission delay of message transmission, the opti-mization deployment is obtained.%在嵌入式云信息平台设计中,需要设计物理层数据传输协议优化信息平台的数据调度和任务分配能力.传统的协议采用UDP协议构建云信息平台的中继物理层数据传输协议,产生大量的流量累积,导致物理层拥堵.提出一种基于双向中继负载均衡的嵌入式云信息平台物理层数据传输协议设计算法.构建嵌入式云信息平台的网络模型,对信息平台数据进行压缩处理,通过双向中继物理层数据传输,定义物理层数据传输的调控函数,实现对数据传输的物理层协议构建,实现数据动态分配.实验结果表明,采用该算法,能有效提高数据的传输效率,降低数据传输延时,优化信息传输部署.

  9. Development and Application of a High Capacity Medical Information Card%大容量医疗信息卡的研究与应用

    Institute of Scientific and Technical Information of China (English)

    刘晓荣; 刘振全; 朱洪平; 陈国良; 张鹭鹭; 刘建; 皇甫明放; 齐亮

    2011-01-01

    Objective To implement collection, analysis, using, transmitting, storage and management of information of mass casualties in diversified military mission, make prompt classification and automatic management of the information, and promote the ability and informationized level of military health service. Methods taking advantage of modernization information technology, a new high capacity medical information card was developed, combined with radio-frequency identification and mobile storage technology. Results The high capacity medical information card could meet the demand of collection, analysis, using, transmitting, storage and management of information of mass casualties in diversified military mission. Conclusion High capacity medical information card can improve the abilitry of classification for mass casualties in diversified military mission in a large extent, and guarantee the continuity of the information transmission, which is important to improve the level of informationization of military health administration. [Chinese Medical Equipment Journal,2011,32(12): 1-2,5]%目的:实现多样化军事行动批量伤员伤情与救治信息的快速采集、处理、利用、传输、存储和管理,实现对批量伤员的快速分类、对伤员信息的自动化管理,提升军队卫勤保障能力及信息化水平.方法:利用现代信息技术,将RFID技术和移动存储技术融为一体,开发研制大容量医疗信息卡.结果:大容量医疗信息卡能够满足多样化军事行动批量伤员伤情与救治信息的快速采集、处理、利用、传输、存储和管理的需求.结论:大容量医疗信息卡可大大提高多样化军事行动批量伤员伤情与救治信息采集、处理、利用、传输、存储和管理速率,实现了伤员信息的智能化管理,保证了信息传输的时效性和连续性,对提升军队卫勤保障能力及信息化水平具有重要作用.

  10. 我国信息服务业服务能力的计量分析%Econometric Analysis of the Service Capacity of China's Information Services Industry

    Institute of Scientific and Technical Information of China (English)

    郭韧

    2013-01-01

    The information service industry is an important foundation of modern economic development .The service ca-pacity of information service industry is important to ensure the rapid development of other industries .The definition of the service capacity of the information service industry is given .Many factors which affect the information service industry ’ s service capabilities are analyzed .Using quantile regression analysis , the influence degree of different factors are analyzed at different development levels of information service industry .Strategies to improve the information service industry ’ s serv-ice capabilities according to different levels of development are also given .%信息服务业是现代经济发展的重要基础,信息服务业的服务能力是其他行业快速发展的重要保证。通过对信息服务业服务能力的界定,分析影响信息服务业的服务能力的诸多因素;运用分位数回归的方法,分析在不同的信息服务业发展水平下各影响因素对信息服务业的服务能力的影响程度,提出在不同的发展水平下提高信息服务业的服务能力的策略。

  11. Genetic and conservation of Araucaria angustifolia: III DNA extraction protocol and informative capacity of RAPD markers for the analysis of genetic diversity in natural population

    OpenAIRE

    2004-01-01

    This study was aimed at adapting a DNA extraction protocol by Araucaria angustifolia leaves, and testing the informative capacity of RAPD markers for genetics diversity analysis in natural populations of this species. The extraction method was standardized by eight tested protocols and it was possible to obtain good quality DNA for RAPD reactions. The OD260/OD280 ratio ranged from 1.7 to 2.0 in 80% of the samples, indicating that they had a low level of protein contamination. The RAPD markers...

  12. STEGO TRANSFORMATION OF SPATIAL DOMAIN OF COVER IMAGE ROBUST AGAINST ATTACKS ON EMBEDDED MESSAGE

    Directory of Open Access Journals (Sweden)

    Kobozeva A.

    2014-04-01

    Full Text Available One of the main requirements to steganografic algorithm to be developed is robustness against disturbing influences, that is, to attacks against the embedded message. It was shown that guaranteeing the stego algorithm robustness does not depend on whether the additional information is embedded into the spatial or transformation domain of the cover image. Given the existing advantages of the spatial domain of the cover image in organization of embedding and extracting processes, a sufficient condition for ensuring robustness of such stego transformation was obtained in this work. It was shown that the amount of brightness correction related to the pixels of the cover image block is similar to the amount of correction related to the maximum singular value of the corresponding matrix of the block in case of embedding additional data that ensures robustness against attacks on the embedded message. Recommendations were obtained for selecting the size of the cover image block used in stego transformation as one of the parameters determining the calculation error of stego message. Given the inversely correspondence between the stego capacity of the stego channel being organized and the size of the cover image block, l=8 value was recommended.

  13. Design and implementation of smart power consumption information acquisition system for smart grid based on embedded LINUX%基于嵌入式 LINUX 的智能用电采集系统设计与实现

    Institute of Scientific and Technical Information of China (English)

    王彩红; 崔勇; 张庆辉; 金广锋

    2016-01-01

    This paper studies that the embedded LINUX , MANET technology and information processing technology will be used in power users of electricity network technology sectors , and develops the smart power consumption infor-mation acquisition system .The project development is completed through embedded LINUX system built on the ARM platform , GPRS technology applied in the information collection system , the complex communication ( power line car-rier and wireless communications ) in information collection system and the application of theoretical and experimental MANET research .The operation result shows that the system has the advantages of run stability , easy operation , real-time, fast communication speed , easy of installation and so on .%研究将嵌入式LINUX和自组网技术、信息处理技术应用于用户用电环节,开发智能用电信息采集系统。通过嵌入式LINUX系统在ARM平台上的构建,GPRS技术、复合通信方式(低压电力载波和无线通信)在智能用电信息采集系统中的应用以及自组网理论和实现研究,完成了项目的研制。运行结果表明,该系统具有运行稳定、操作方便、实时性好、通信速度快、易于安装等优点。

  14. Covert channel capacity analysis based on information entropy%基于信息熵的隐通道能力分析

    Institute of Scientific and Technical Information of China (English)

    陈立; 鞠时光; 周从华; 房芳; 张翼

    2009-01-01

    This paper presented a method based on information entropy to analyze the capacity of covert channels. Built upon noninterference, the method was firstly used to calculate the covert channel capacity, then to analyze the factors that had an impact on this quantity. Finally gave an example of the capacity calculation for covert channels in a multilevel secure database.%给出了一种基于信息熵的隐通道能力分析方法.该方法首先利用无干扰分析法分析隐通道,得到系统状态转换分布特性,然后引入信息熵,进而推导出隐通道能力表达公式.该方法能较好地对隐通道能力进行定量分析,不仅可以对隐通道能力的大小进行计算,还可以分析隐通道能力的影响因素.最后,给出了存在于多级安全数据库中的一种隐通道,并用该方法分析计算了该隐通道的能力.

  15. Strengthening institutional and organizational capacity for social health protection of the informal sector in lesser-developed countries: a study of policy barriers and opportunities in Cambodia.

    Science.gov (United States)

    Annear, Peter Leslie; Ahmed, Shakil; Ros, Chhun Eang; Ir, Por

    2013-11-01

    Reaching out to the poor and the informal sector is a major challenge for achieving universal coverage in lesser-developed countries. In Cambodia, extensive coverage by health equity funds for the poor has created the opportunity to consolidate various non-government health financing schemes under the government's proposed social health protection structure. This paper identifies the main policy and operational challenges to strengthening existing arrangements for the poor and the informal sector, and considers policy options to address these barriers. Conducted in conjunction with the Cambodian Ministry of Health in 2011-12, the study reviewed policy documents and collected qualitative data through 18 semi-structured key informant interviews with government, non-government and donor officials. Data were analysed using the Organizational Assessment for Improving and Strengthening Health Financing conceptual framework. We found that a significant shortfall related to institutional, organisational and health financing issues resulted in fragmentation and constrained the implementation of social health protection schemes, including health equity funds, community-based health insurance, vouchers and others. Key documents proposed the establishment of a national structure for the unification of the informal-sector schemes but left unresolved issues related to structure, institutional capacity and the third-party status of the national agency. This study adds to the evidence base on appropriate and effective institutional and organizational arrangements for social health protection in the informal sector in developing countries. Among the key lessons are: the need to expand the fiscal space for health care; a commitment to equity; specific measures to protect the poor; building national capacity for administration of universal coverage; and working within the specific national context.

  16. Pullout capacity of batter pile in sand.

    Science.gov (United States)

    Nazir, Ashraf; Nasr, Ahmed

    2013-03-01

    Many offshore structures are subjected to overturning moments due to wind load, wave pressure, and ship impacts. Also most of retaining walls are subjected to horizontal forces and bending moments, these forces are due to earth pressure. For foundations in such structures, usually a combination of vertical and batter piles is used. Little information is available in the literature about estimating the capacity of piles under uplift. In cases where these supporting piles are not vertical, the behavior under axial pullout is not well established. In order to delineate the significant variables affecting the ultimate uplift shaft resistance of batter pile in dry sand, a testing program comprising 62 pullout tests was conducted. The tests are conducted on model steel pile installed in loose, medium, and dense sand to an embedded depth ratio, L/d, vary from 7.5 to 30 and with various batter angles of 0°, 10°, 20°, and 30°. Results indicate that the pullout capacity of a batter pile constructed in dense and/or medium density sand increases with the increase of batter angle attains maximum value and then decreases, the maximum value of Pα occurs at batter angle approximately equal to 20°, and it is about 21-31% more than the vertical pile capacity, while the pullout capacity for batter pile that constructed in loose sand decreases with the increase of pile inclination. The results also indicated that the circular pile is more resistant to pullout forces than the square and rectangular pile shape. The rough model piles tested is experienced 18-75% increase in capacity compared with the smooth model piles. The suggested relations for the pullout capacity of batter pile regarding the vertical pile capacity are well predicted.

  17. Pullout capacity of batter pile in sand

    Directory of Open Access Journals (Sweden)

    Ashraf Nazir

    2013-03-01

    Full Text Available Many offshore structures are subjected to overturning moments due to wind load, wave pressure, and ship impacts. Also most of retaining walls are subjected to horizontal forces and bending moments, these forces are due to earth pressure. For foundations in such structures, usually a combination of vertical and batter piles is used. Little information is available in the literature about estimating the capacity of piles under uplift. In cases where these supporting piles are not vertical, the behavior under axial pullout is not well established. In order to delineate the significant variables affecting the ultimate uplift shaft resistance of batter pile in dry sand, a testing program comprising 62 pullout tests was conducted. The tests are conducted on model steel pile installed in loose, medium, and dense sand to an embedded depth ratio, L/d, vary from 7.5 to 30 and with various batter angles of 0°, 10°, 20°, and 30°. Results indicate that the pullout capacity of a batter pile constructed in dense and/or medium density sand increases with the increase of batter angle attains maximum value and then decreases, the maximum value of Pα occurs at batter angle approximately equal to 20°, and it is about 21–31% more than the vertical pile capacity, while the pullout capacity for batter pile that constructed in loose sand decreases with the increase of pile inclination. The results also indicated that the circular pile is more resistant to pullout forces than the square and rectangular pile shape. The rough model piles tested is experienced 18–75% increase in capacity compared with the smooth model piles. The suggested relations for the pullout capacity of batter pile regarding the vertical pile capacity are well predicted.

  18. Station Capacity

    DEFF Research Database (Denmark)

    Landex, Alex

    2011-01-01

    Stations are often limiting the capacity of railway networks. This is due to extra need of tracks when trains stand still, trains turning around, and conflicting train routes. Although stations are often the capacity bottlenecks, most capacity analysis methods focus on open line capacity. Therefore......, this paper presents methods to analyze station capacity. Four methods to analyze station capacity are developed. The first method is an adapted UIC 406 capacity method that can be used to analyze switch zones and platform tracks at stations that are not too complex. The second method examines the need...... the probability of conflicts and the minimum headway times into account. The last method analyzes how optimal platform tracks are used by examining the arrival and departure pattern of the trains. The developed methods can either be used separately to analyze specific characteristics of the capacity of a station...

  19. Co-emergence of multi-scale cortical activities of irregular firing, oscillations and avalanches achieves cost-efficient information capacity

    Science.gov (United States)

    Zhou, Hai-Jun; Zhou, Changsong

    2017-01-01

    The brain is highly energy consuming, therefore is under strong selective pressure to achieve cost-efficiency in both cortical connectivities and activities. However, cost-efficiency as a design principle for cortical activities has been rarely studied. Especially it is not clear how cost-efficiency is related to ubiquitously observed multi-scale properties: irregular firing, oscillations and neuronal avalanches. Here we demonstrate that these prominent properties can be simultaneously observed in a generic, biologically plausible neural circuit model that captures excitation-inhibition balance and realistic dynamics of synaptic conductance. Their co-emergence achieves minimal energy cost as well as maximal energy efficiency on information capacity, when neuronal firing are coordinated and shaped by moderate synchrony to reduce otherwise redundant spikes, and the dynamical clusterings are maintained in the form of neuronal avalanches. Such cost-efficient neural dynamics can be employed as a foundation for further efficient information processing under energy constraint. PMID:28192429

  20. Public and private maternal health service capacity and patient flows in Southern Tanzania: using a geographic information system to link hospital and national census data.

    Science.gov (United States)

    Tabatabai, Patrik; Henke, Stefanie; Sušac, Katharina; Kisanga, Oberlin M E; Baumgarten, Inge; Kynast-Wolf, Gisela; Ramroth, Heribert; Marx, Michael

    2014-01-01

    Strategies to improve maternal health in low-income countries are increasingly embracing partnership approaches between public and private stakeholders in health. In Tanzania, such partnerships are a declared policy goal. However, implementation remains challenging as unfamiliarity between partners and insufficient recognition of private health providers prevail. This hinders cooperation and reflects the need to improve the evidence base of private sector contribution. To map and analyse the capacities of public and private hospitals to provide maternal health care in southern Tanzania and the population reached with these services. A hospital questionnaire was applied in all 16 hospitals (public n=10; private faith-based n=6) in 12 districts of southern Tanzania. Areas of inquiry included selected maternal health service indicators (human resources, maternity/delivery beds), provider-fees for obstetric services and patient turnover (antenatal care, births). Spatial information was linked to the 2002 Population Census dataset and a geographic information system to map patient flows and socio-geographic characteristics of service recipients. The contribution of faith-based organizations (FBOs) to hospital maternal health services is substantial. FBO hospitals are primarily located in rural areas and their patient composition places a higher emphasis on rural populations. Also, maternal health service capacity was more favourable in FBO hospitals. We approximated that 19.9% of deliveries in the study area were performed in hospitals and that the proportion of c-sections was 2.7%. Mapping of patient flows demonstrated that women often travelled far to seek hospital care and where catchment areas of public and FBO hospitals overlap. We conclude that the important contribution of FBOs to maternal health services and capacity as well as their emphasis on serving rural populations makes them promising partners in health programming. Inclusive partnerships could increase

  1. Public and private maternal health service capacity and patient flows in southern Tanzania: using a geographic information system to link hospital and national census data

    Directory of Open Access Journals (Sweden)

    Patrik Tabatabai

    2014-01-01

    Full Text Available Background: Strategies to improve maternal health in low-income countries are increasingly embracing partnership approaches between public and private stakeholders in health. In Tanzania, such partnerships are a declared policy goal. However, implementation remains challenging as unfamiliarity between partners and insufficient recognition of private health providers prevail. This hinders cooperation and reflects the need to improve the evidence base of private sector contribution. Objective: To map and analyse the capacities of public and private hospitals to provide maternal health care in southern Tanzania and the population reached with these services. Design: A hospital questionnaire was applied in all 16 hospitals (public n=10; private faith-based n=6 in 12 districts of southern Tanzania. Areas of inquiry included selected maternal health service indicators (human resources, maternity/delivery beds, provider-fees for obstetric services and patient turnover (antenatal care, births. Spatial information was linked to the 2002 Population Census dataset and a geographic information system to map patient flows and socio-geographic characteristics of service recipients. Results: The contribution of faith-based organizations (FBOs to hospital maternal health services is substantial. FBO hospitals are primarily located in rural areas and their patient composition places a higher emphasis on rural populations. Also, maternal health service capacity was more favourable in FBO hospitals. We approximated that 19.9% of deliveries in the study area were performed in hospitals and that the proportion of c-sections was 2.7%. Mapping of patient flows demonstrated that women often travelled far to seek hospital care and where catchment areas of public and FBO hospitals overlap. Conclusions: We conclude that the important contribution of FBOs to maternal health services and capacity as well as their emphasis on serving rural populations makes them promising

  2. Public and private maternal health service capacity and patient flows in southern Tanzania: using a geographic information system to link hospital and national census data

    Science.gov (United States)

    Tabatabai, Patrik; Henke, Stefanie; Sušac, Katharina; Kisanga, Oberlin M. E.; Baumgarten, Inge; Kynast-Wolf, Gisela; Ramroth, Heribert; Marx, Michael

    2014-01-01

    Background Strategies to improve maternal health in low-income countries are increasingly embracing partnership approaches between public and private stakeholders in health. In Tanzania, such partnerships are a declared policy goal. However, implementation remains challenging as unfamiliarity between partners and insufficient recognition of private health providers prevail. This hinders cooperation and reflects the need to improve the evidence base of private sector contribution. Objective To map and analyse the capacities of public and private hospitals to provide maternal health care in southern Tanzania and the population reached with these services. Design A hospital questionnaire was applied in all 16 hospitals (public n=10; private faith-based n=6) in 12 districts of southern Tanzania. Areas of inquiry included selected maternal health service indicators (human resources, maternity/delivery beds), provider-fees for obstetric services and patient turnover (antenatal care, births). Spatial information was linked to the 2002 Population Census dataset and a geographic information system to map patient flows and socio-geographic characteristics of service recipients. Results The contribution of faith-based organizations (FBOs) to hospital maternal health services is substantial. FBO hospitals are primarily located in rural areas and their patient composition places a higher emphasis on rural populations. Also, maternal health service capacity was more favourable in FBO hospitals. We approximated that 19.9% of deliveries in the study area were performed in hospitals and that the proportion of c-sections was 2.7%. Mapping of patient flows demonstrated that women often travelled far to seek hospital care and where catchment areas of public and FBO hospitals overlap. Conclusions We conclude that the important contribution of FBOs to maternal health services and capacity as well as their emphasis on serving rural populations makes them promising partners in health

  3. Embedded Fragments Registry (EFR)

    Data.gov (United States)

    Department of Veterans Affairs — In 2009, the Department of Defense estimated that approximately 40,000 service members who served in OEF/OIF may have embedded fragment wounds as the result of small...

  4. Electronics for embedded systems

    CERN Document Server

    Bindal, Ahmet

    2017-01-01

    This book provides semester-length coverage of electronics for embedded systems, covering most common analog and digital circuit-related issues encountered while designing embedded system hardware. It is written for students and young professionals who have basic circuit theory background and want to learn more about passive circuits, diode and bipolar transistor circuits, the state-of-the-art CMOS logic family and its interface with older logic families such as TTL, sensors and sensor physics, operational amplifier circuits to condition sensor signals, data converters and various circuits used in electro-mechanical device control in embedded systems. The book also provides numerous hardware design examples by integrating the topics learned in earlier chapters. The last chapter extensively reviews the combinational and sequential logic design principles to be able to design the digital part of embedded system hardware.

  5. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very...... specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention...... and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generation. Describes tools and programming models for multicore embedded systems Emphasizes throughout performance per watt scalability Discusses realistic limits of software parallelization Enables...

  6. Station Capacity

    DEFF Research Database (Denmark)

    Landex, Alex

    2011-01-01

    Stations are often limiting the capacity of railway networks. This is due to extra need of tracks when trains stand still, trains turning around, and conflicting train routes. Although stations are often the capacity bottlenecks, most capacity analysis methods focus on open line capacity. Therefore......, this paper presents methods to analyze station capacity. Four methods to analyze station capacity are developed. The first method is an adapted UIC 406 capacity method that can be used to analyze switch zones and platform tracks at stations that are not too complex. The second method examines the need...... for platform tracks and the probability that arriving trains will not get a platform track immediately at arrival. The third method is a scalable method that analyzes the conflicts in the switch zone(s). In its simplest stage, the method just analyzes the track layout while the more advanced stages also take...

  7. Embedded Data Representations.

    Science.gov (United States)

    Willett, Wesley; Jansen, Yvonne; Dragicevic, Pierre

    2017-01-01

    We introduce embedded data representations, the use of visual and physical representations of data that are deeply integrated with the physical spaces, objects, and entities to which the data refers. Technologies like lightweight wireless displays, mixed reality hardware, and autonomous vehicles are making it increasingly easier to display data in-context. While researchers and artists have already begun to create embedded data representations, the benefits, trade-offs, and even the language necessary to describe and compare these approaches remain unexplored. In this paper, we formalize the notion of physical data referents - the real-world entities and spaces to which data corresponds - and examine the relationship between referents and the visual and physical representations of their data. We differentiate situated representations, which display data in proximity to data referents, and embedded representations, which display data so that it spatially coincides with data referents. Drawing on examples from visualization, ubiquitous computing, and art, we explore the role of spatial indirection, scale, and interaction for embedded representations. We also examine the tradeoffs between non-situated, situated, and embedded data displays, including both visualizations and physicalizations. Based on our observations, we identify a variety of design challenges for embedded data representation, and suggest opportunities for future research and applications.

  8. The development of entrepreneurial capacity and business activity of students of educational establishments using information and communication technologies

    Directory of Open Access Journals (Sweden)

    L. A. Danchenok

    2016-01-01

    Full Text Available The article is devoted to problems of organizational and methodical process modeling of the entrepreneurial potential and business activity of students of educational institutions through the use of Smart-technologies. It is noted that the successful implementation of enterprise and business projects are the basis of economic development of society, with the main factor for the development of entrepreneurship in the country in the long term is to develop the entrepreneurial mindset of young people. Entrepreneurial younger generation reserve created for the period of study, will provide the subsequent decades of business operation, incomenot only to the owner, but also the composition of personnel of the company and, in general, the country. The specifics of perception of the new generation of knowledge, learning and the formation of professional skills is that their effectiveness depends, sometimes completely determined by the degree of use of information and communication technologies, not only in the preparation and implementation of knowledge by the learners, but also in the work themselves teachers. Therefore, an effective and modern instrument for achieving the development goals of the business potential and business students to provide such forms of work with students, which would stimulate their interest in entrepreneurship through the active use of information technologies. The organizational and methodological training model and a set of measures aimed at developing the entrepreneurial potential and business activity of the young generation. To a large extent the elements of our model successfully implemented in REU them. GV Plekhanov at the Faculty of “Marketing Business School and Entrepreneurship”, to carry out training business technologies in relevant areas of knowledge for the information society and the modern state of the economy – business intelligence, innovation and creative business, crisis and risk management

  9. Early experience with formalin-fixed paraffin-embedded (FFPE) based commercial clinical genomic profiling of gliomas-robust and informative with caveats.

    Science.gov (United States)

    Movassaghi, Masoud; Shabihkhani, Maryam; Hojat, Seyed A; Williams, Ryan R; Chung, Lawrance K; Im, Kyuseok; Lucey, Gregory M; Wei, Bowen; Mareninov, Sergey; Wang, Michael W; Ng, Denise W; Tashjian, Randy S; Magaki, Shino; Perez-Rosendahl, Mari; Yang, Isaac; Khanlou, Negar; Vinters, Harry V; Liau, Linda M; Nghiemphu, Phioanh L; Lai, Albert; Cloughesy, Timothy F; Yong, William H

    2017-08-01

    Commercial targeted genomic profiling with next generation sequencing using formalin-fixed paraffin embedded (FFPE) tissue has recently entered into clinical use for diagnosis and for the guiding of therapy. However, there is limited independent data regarding the accuracy or robustness of commercial genomic profiling in gliomas. As part of patient care, FFPE samples of gliomas from 71 patients were submitted for targeted genomic profiling to one commonly used commercial vendor, Foundation Medicine. Genomic alterations were determined for the following grades or groups of gliomas; Grade I/II, Grade III, primary glioblastomas (GBMs), recurrent primary GBMs, and secondary GBMs. In addition, FFPE samples from the same patients were independently assessed with conventional methods such as immunohistochemistry (IHC), Quantitative real-time PCR (qRT-PCR), or Fluorescence in situ hybridization (FISH) for three genetic alterations: IDH1 mutations, EGFR amplification, and EGFRvIII expression. A total of 100 altered genes were detected by the aforementioned targeted genomic profiling assay. The number of different genomic alterations was significantly different between the five groups of gliomas and consistent with the literature. CDKN2A/B, TP53, and TERT were the most common genomic alterations seen in primary GBMs, whereas IDH1, TP53, and PIK3CA were the most common in secondary GBMs. Targeted genomic profiling demonstrated 92.3%-100% concordance with conventional methods. The targeted genomic profiling report provided an average of 5.5 drugs, and listed an average of 8.4 clinical trials for the 71 glioma patients studied but only a third of the trials were appropriate for glioma patients. In this limited comparison study, this commercial next generation sequencing based-targeted genomic profiling showed a high concordance rate with conventional methods for the 3 genetic alterations and identified mutations expected for the type of glioma. While it may not be feasible to

  10. Node Embedding via Word Embedding for Network Community Discovery

    CERN Document Server

    Ding, Weicong; Ishwar, Prakash

    2016-01-01

    Neural node embeddings have recently emerged as a powerful representation for supervised learning tasks involving graph-structured data. We leverage this recent advance to develop a novel algorithm for unsupervised community discovery in graphs. Through extensive experimental studies on simulated and real-world data, we demonstrate that the proposed approach consistently improves over the current state-of-the-art. Specifically, our approach empirically attains the information-theoretic limits for community recovery under the benchmark Stochastic Block Models for graph generation and exhibits better stability and accuracy over both Spectral Clustering and Acyclic Belief Propagation in the community recovery limits.

  11. Embedded Systems Design: Optimization Challenges

    DEFF Research Database (Denmark)

    Pop, Paul

    2005-01-01

    Summary form only given. Embedded systems are everywhere: from alarm clocks to PDAs, from mobile phones to cars, almost all the devices we use are controlled by embedded systems. Over 99% of the microprocessors produced today are used in embedded systems, and recently the number of embedded systems...

  12. EMBEDDING FLOWS AND SMOOTH CONJUGACY

    Institute of Scientific and Technical Information of China (English)

    ZHANGMEIRONG; LIWEIGU

    1997-01-01

    The authors use the functional equation for embedding vector fields to study smooth embedding flows of one-dimensional diffeomorphisms. The existence and uniqueness for smooth embedding flows and vector fields are proved. As an application of embedding flows, some classification results about local and giobal diffeomorphisms under smooth conjugacy are given.

  13. Reversible and Embedded Watermarking of Medical Images for Telemedicine

    Directory of Open Access Journals (Sweden)

    Chung-Yen Su

    2015-08-01

    Full Text Available In this paper, we propose a new reversible watermarking of medical images for the applications in telemedicine. By using a bit-stream insertion scheme, the patient’s information can be treated as a watermark and can be embedded into the bit-stream of a cover image for remote transmission. The proposed method simplifies the design of traditional image coding after a reversible watermarking. Experimental results show that the compression ratio can be achieved up to 3.025. The watermarking capacity can be obtained over 0.75 bpp for some common images. In addition, the watermark can be extracted exactly and the cover image can be reconstructed either in a lossless way or a lossy way. The obtained results also show the improvement with respect to previous works.

  14. Geothermal Plant Capacity Factors

    Energy Technology Data Exchange (ETDEWEB)

    Greg Mines; Jay Nathwani; Christopher Richard; Hillary Hanson; Rachel Wood

    2015-01-01

    The capacity factors recently provided by the Energy Information Administration (EIA) indicated this plant performance metric had declined for geothermal power plants since 2008. Though capacity factor is a term commonly used by geothermal stakeholders to express the ability of a plant to produce power, it is a term frequently misunderstood and in some instances incorrectly used. In this paper we discuss how this capacity factor is defined and utilized by the EIA, including discussion on the information that the EIA requests from operations in their 923 and 860 forms that are submitted both monthly and annually by geothermal operators. A discussion is also provided regarding the entities utilizing the information in the EIA reports, and how those entities can misinterpret the data being supplied by the operators. The intent of the paper is to inform the facility operators as the importance of the accuracy of the data that they provide, and the implications of not providing the correct information.

  15. Carrying Capacity

    DEFF Research Database (Denmark)

    Schroll, Henning; Andersen, Jan; Kjærgård, Bente

    2012-01-01

    A spatial planning act was introduced inIndonesia 1992 and renewed in 2008. It emphasised the planning role of decentralised authorities. The spatial planning act covers both spatial and environmental issues. It defines the concept of carrying capacity and includes definitions of supportive...... carrying capacity (SCC) and assimilative carrying capacity (ACC). The act mandates that the latter two aspects must be taken into consideration in the local spatial plans. The present study aimed at developing a background for a national guideline for carrying capacity in Indonesian provinces and districts...... standard or governmental political objective exists. In most cases it was possible to select a set of indicators, including thresholds that are workable in a carrying capacity planning at the local administrative levels. Not all relevant sectors at the decentralized level were included. Indicators of SCC...

  16. Smart multicore embedded systems

    CERN Document Server

    Bertels, Koen; Karlsson, Sven; Pacull, François

    2014-01-01

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very often they are forced to rewrite sequential programs into parallel software, taking into account all the low level features and peculiarities of the underlying platforms. Readers will benefit from these authors’ approach, which takes into account both the application requirements and the platform specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generati...

  17. Embedded data representations

    DEFF Research Database (Denmark)

    Willett, Wesley; Jansen, Yvonne; Dragicevic, Pierre

    2017-01-01

    We introduce embedded data representations, the use of visual and physical representations of data that are deeply integrated with the physical spaces, objects, and entities to which the data refers. Technologies like lightweight wireless displays, mixed reality hardware, and autonomous vehicles...... are making it increasingly easier to display data in-context. While researchers and artists have already begun to create embedded data representations, the benefits, trade-offs, and even the language necessary to describe and compare these approaches remain unexplored. In this paper, we formalize the notion...... of physical data referents – the real-world entities and spaces to which data corresponds – and examine the relationship between referents and the visual and physical representations of their data. We differentiate situated representations, which display data in proximity to data referents, and embedded...

  18. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Steinmann, Casper; Ruud, Kenneth

    2015-01-01

    We present a new QM/QM/MM-based model for calculating molecular properties and excited states of solute-solvent systems. We denote this new approach the polarizable density embedding (PDE) model and it represents an extension of our previously developed polarizable embedding (PE) strategy. The PDE...... model is a focused computational approach in which a core region of the system studied is represented by a quantum-chemical method, whereas the environment is divided into two other regions: an inner and an outer region. Molecules belonging to the inner region are described by their exact densities...

  19. Embedding online information resources in Virtual Learning Environments: some implications for lecturers and librarians of the move towards delivering teaching in the online environment

    Directory of Open Access Journals (Sweden)

    Margaret Markland

    2003-01-01

    Full Text Available A small study of the use of online information resources by new Virtual Learning Environment users in a UK University provided insights into the strategies used by lecturers to select those resources, and into some of the difficulties they encountered when using online materials in their teaching. Skills training emerged as an issue for both teachers and learners, and some interesting observations were made on the working relationships of lecturing staff and librarians. The study concludes that the need for 'new alliances' frequently raised in current literature is indeed very apparent, but that to be most effective such co-operation may need to be at individual as well as at group level..

  20. Post-upgrade testing on a radiotherapy oncology information system with an embedded record and verify system following the IAEA Human Health Report No. 7 recommendations.

    Science.gov (United States)

    Nyathi, Thulani; Colyer, Christopher; Bhardwaj, Anup Kumar; Rijken, James; Morton, Jason

    2016-06-01

    Record and verify (R&V) systems have proven that their application in radiotherapy clinics leads to a significant reduction in mis-treatments of patients. The purpose of this technical note is to share our experience of acceptance testing, commissioning and setting up a quality assurance programme for the MOSAIQ® oncology information system and R&V system after upgrading from software version 2.41 to 2.6 in a multi-vendor, multi-site environment. Testing was guided primarily by the IAEA Human Report No. 7 recommendations, but complemented by other departmental workflow specific tests. To the best of our knowledge, this is the first time successful implementation of the IAEA Human Health Report Series No. 7 recommendations have been reported in the literature. Copyright © 2016 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  1. Weaving versus blending: a quantitative assessment of the information carrying capacities of two alternative methods for conveying multivariate data with color.

    Science.gov (United States)

    Hagh-Shenas, Haleh; Kim, Sunghee; Interrante, Victoria; Healey, Christopher

    2007-01-01

    In many applications, it is important to understand the individual values of, and relationships between, multiple related scalar variables defined across a common domain. Several approaches have been proposed for representing data in these situations. In this paper we focus on strategies for the visualization of multivariate data that rely on color mixing. In particular, through a series of controlled observer experiments, we seek to establish a fundamental understanding of the information-carrying capacities of two alternative methods for encoding multivariate information using color: color blending and color weaving. We begin with a baseline experiment in which we assess participants' abilities to accurately read numerical data encoded in six different basic color scales defined in the L*a*b* color space. We then assess participants' abilities to read combinations of 2, 3, 4 and 6 different data values represented in a common region of the domain, encoded using either color blending or color weaving. In color blending a single mixed color is formed via linear combination of the individual values in L*a*b* space, and in color weaving the original individual colors are displayed side-by-side in a high frequency texture that fills the region. A third experiment was conducted to clarify some of the trends regarding the color contrast and its effect on the magnitude of the error that was observed in the second experiment. The results indicate that when the component colors are represented side-by-side in a high frequency texture, most participants' abilities to infer the values of individual components are significantly improved, relative to when the colors are blended. Participants' performance was significantly better with color weaving particularly when more than 2 colors were used, and even when the individual colors subtended only 3 minutes of visual angle in the texture. However, the information-carrying capacity of the color weaving approach has its limits. We

  2. Using information communication technologies to increase the institutional capacity of local health organisations in Africa: a case study of the Kenya Civil Society Portal for Health.

    Science.gov (United States)

    Juma, Charles; Sundsmo, Aaron; Maket, Boniface; Powell, Richard; Aluoch, Gilbert

    2015-01-01

    Achieving the healthcare components of the United Nations' Millennium Development Goals is significantly premised on effective service delivery by civil society organisations (CSOs). However, many CSOs across Africalack the necessary capacity to perform this role robustly. This paper reports on an evaluation of the use, and perceived impact, of aknowledge management tool upon institutional strengthening among CSOs working in Kenya's health sector. Three methods were used: analytics data; user satisfaction surveys; and a furtherkey informant survey. Satisfaction with the portal was consistently high, with 99% finding the quality and relevance of the content very good or good for institutional strengthening standards, governance, and planning and resource mobilisation. Critical facilitators to the success of knowledge management for CSO institutional strengthening were identified as people/culture (developed resources and organisational narratives) and technology (easily accessible, enabling information exchange, tools/resources available, access to consultants/partners). Critical barriers were identified as people/culture (database limitations, materials limitations, and lack of active users), and process (limited access, limited interactions, and limited approval process). This pilot study demonstrated the perceived utility of a web-based knowledge management portal among developing nations' CSOs, with widespread satisfaction across multiple domains, which increased over time. Providing increased opportunities for collective mutual learning, promoting a culture of data use for decision making, and encouraging all health organisations to be learning institutions should be a priority for those interested in promoting sustainable long-term solutions for Africa.

  3. Embedded computer vision

    CERN Document Server

    Kisacanin, Branislav

    2008-01-01

    Brings together experiences from researchers in the field of embedded computer vision, from both academic and industrial research centers, and covers a broad range of challenges and trade-offs brought about by this paradigm shift. This title offers emphasis on tackling important problems for society, safety, security, health, and mobility.

  4. Embedded-monolith armor

    Science.gov (United States)

    McElfresh, Michael W.; Groves, Scott E; Moffet, Mitchell L.; Martin, Louis P.

    2016-07-19

    A lightweight armor system utilizing a face section having a multiplicity of monoliths embedded in a matrix supported on low density foam. The face section is supported with a strong stiff backing plate. The backing plate is mounted on a spall plate.

  5. Robust Multivariable Estimation of the Relevant Information Coming from a Wheel Speed Sensor and an Accelerometer Embedded in a Car under Performance Tests

    Directory of Open Access Journals (Sweden)

    Wilmar Hernandez

    2005-11-01

    Full Text Available In the present paper, in order to estimate the response of both a wheel speedsensor and an accelerometer placed in a car under performance tests, robust and optimalmultivariable estimation techniques are used. In this case, the disturbances and noisescorrupting the relevant information coming from the sensors’ outputs are so dangerous thattheir negative influence on the electrical systems impoverish the general performance of thecar. In short, the solution to this problem is a safety related problem that deserves our fullattention. Therefore, in order to diminish the negative effects of the disturbances and noiseson the car’s electrical and electromechanical systems, an optimum observer is used. Theexperimental results show a satisfactory improvement in the signal-to-noise ratio of therelevant signals and demonstrate the importance of the fusion of several intelligent sensordesign techniques when designing the intelligent sensors that today’s cars need.

  6. 基于嵌入式技术的消防车信息采集与传输装置%Information collection and transmission devices of fire engines based on embedded technology

    Institute of Scientific and Technical Information of China (English)

    杨树峰; 姜学赟; 马青波; 王军

    2013-01-01

    Utilizing embedded WEB technology, the information collection and transmission devices of fire engines was designed based on LPC1769 microprocessor, and the device' s remote control and data query capabilities were realized. The developing concept and design method were introduced. The hardware design plan was put forward in points of minimized system design, engine basic information collection system design, and network communication module design. Software design including data process flow, remote communication mechanism, and dynamic page were introduced. The device can collect and store information such as fire-board equipment, vehicle chassis, GPS positioning data and meteorological information, and communicate with monitoring center by 3G network.%应用嵌入式WEB技术,设计了基于LPC1769微处理器的消防车载信息采集与传输装置,实现装置的远程控制和数据查询功能.介绍该装置的研制理念和设计方法.从最小系统设计、车辆基本信息采集系统设计、网络通信模块设计等方面给出了硬件设计方案.介绍数据处理流程、远程通信机制、动态页面等软件设计.研制后的装置可实时采集并存储消防车载装备器材、车辆底盘、车辆上装、GPS定位数据和气象等信息,并通过3G无线网络实现与监控中心远程通信.

  7. Carrying Capacity

    DEFF Research Database (Denmark)

    Schroll, Henning; Andersen, Jan; Kjærgård, Bente

    2012-01-01

    A spatial planning act was introduced inIndonesia 1992 and renewed in 2008. It emphasised the planning role of decentralised authorities. The spatial planning act covers both spatial and environmental issues. It defines the concept of carrying capacity and includes definitions of supportive...... and ACC may increase the political focus on resources and environmental issues and may help to move local authorities towards a more holistic spatial planning approach. A carrying capacity approach could be an inspiration for local spatial planning in developing countries. A spatial planning act...... was introduced inIndonesia 1992 and renewed in 2008. It emphasised the planning role of decentralised authorities. The spatial planning act covers both spatial and environmental issues. It defines the concept of carrying capacity and includes definitions of supportive carrying capacity (SCC) and assimilative...

  8. Building capacity for information and communication technology use in global health research and training in China: a qualitative study among Chinese health sciences faculty members.

    Science.gov (United States)

    Wang, Jie; Abdullah, Abu S; Ma, Zhenyu; Fu, Hua; Huang, Kaiyong; Yu, Hongping; Wang, Jiaji; Cai, Le; He, Huimin; Xiao, Jian; Quintiliani, Lisa; Friedman, Robert H; Yang, Li

    2017-06-28

    The demand to use information and communications technology (ICT) in education and research has grown fast among researchers and educators working in global health. However, access to ICT resources and the capacity to use them in global health research remains limited among developing country faculty members. In order to address the global health needs and to design an ICT-related training course, we herein explored the Chinese health science faculty members' perceptions and learning needs for ICT use. Nine focus groups discussions (FGDs) were conducted during December 2015 to March 2016, involving 63 faculty members working in areas of health sciences from six universities in China. All FGDs were audio recorded and analysed thematically. The findings suggest that the understandings of ICT were not clear among many researchers; some thought that the concept of ICT was too wide and ambiguous. Most participants were able to cite examples of ICT application in their research and teaching activities. Positive attitudes and high needs of ICT use and training were common among most participants. Recommendations for ICT training included customised training programmes focusing on a specific specialty, maintaining a balance between theories and practical applications, more emphasis on the application of ICT, and skills in finding the required information from the bulk information available in the internet. Suggestions regarding the format and offering of training included short training programmes, flexible timing, lectures with practicum opportunities, and free of charge or with very minimal cost to the participants. Two participants suggested the linking of ICT-related training courses with faculty members' year-end assessment and promotion. This study among health sciences faculty members in China demonstrated a high level of need and interest in learning about ICT use in research and training. The results have important implications for the design and implementation of

  9. Building Land Information Policies

    DEFF Research Database (Denmark)

    Enemark, Stig

    2004-01-01

    The paper presents a conceptual understanding in the areas of Cadastre, Land Administration, and Land Management as a basis for building adequate land information policies. To develop this understanding the paper looks at each area as a system or an infrastructure designed for handling specific...... tasks and serving specific needs in society. The paper analyzes the function and the basic elements of the systems and looks at the interaction between the four key areas: land tenure, land value, land-use, and land development. Basically such systems are embedded in the historical, cultural...... of measurement science, spatial information, management, and land management. (2) To establish national professional associations which accommodate a modern interdisciplinary profile. (3) To assess the capacity needs in land administration and to develop the capacity needed at societal, institutional...

  10. A high-capacity steganography scheme for JPEG2000 baseline system.

    Science.gov (United States)

    Zhang, Liang; Wang, Haili; Wu, Renbiao

    2009-08-01

    Hiding capacity is very important for efficient covert communications. For JPEG2000 compressed images, it is necessary to enlarge the hiding capacity because the available redundancy is very limited. In addition, the bitstream truncation makes it difficult to hide information. In this paper, a high-capacity steganography scheme is proposed for the JPEG2000 baseline system, which uses bit-plane encoding procedure twice to solve the problem due to bitstream truncation. Moreover, embedding points and their intensity are determined in a well defined quantitative manner via redundancy evaluation to increase hiding capacity. The redundancy is measured by bit, which is different from conventional methods which adjust the embedding intensity by multiplying a visual masking factor. High volumetric data is embedded into bit-planes as low as possible to keep message integrality, but at the cost of an extra bit-plane encoding procedure and slightly changed compression ratio. The proposed method can be easily integrated into the JPEG2000 image coder, and the produced stego-bitstream can be decoded normally. Simulation shows that the proposed method is feasible, effective, and secure.

  11. Embedding Multiple Literacies into STEM Curricula

    Science.gov (United States)

    Soules, Aline; Nielsen, Sarah; LeDuc, Danika; Inouye, Caron; Singley, Jason; Wildy, Erica; Seitz, Jeff

    2014-01-01

    In fall 2012, an interdisciplinary team of science, English, and library faculty embedded reading, writing, and information literacy strategies in Science, Technology, Engineering, and Mathematics (STEM) curricula as a first step in improving student learning and retention in science courses and aligning them with the Next Generation Science and…

  12. Is Embedded Librarianship Right for Your Institution?

    Science.gov (United States)

    Muir, Gordon; Heller-Ross, Holly

    2010-01-01

    Embedded librarians, connected with students and faculty inside the classroom, lab and studio, have new opportunities for preparing students for research and for collaborating with faculty on course-integrated information literacy, research assignment design, teaching, assignment interpretation, and timely student assistance. What makes embedded…

  13. Capacity-achieving CPM schemes

    CERN Document Server

    Perotti, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The so obtained schemes are cascaded with an outer serially-concatenated convolutional code to form a pragmatic coded-modulation system. The resulting schemes exhibit performance very close to the CPM capacity without requiring iterations between the outer decoder and the CPM demodulator. As a result, the receiver exhibits reduced complexity and increased flexibility due to the separation of the demodulation and decoding functions.

  14. Introduction to embedded system design using field programmable gate arrays

    CERN Document Server

    Dubey, Rahul

    2009-01-01

    Offers information on the use of field programmable gate arrays (FPGAs) in the design of embedded systems. This text considers a hypothetical robot controller as an embedded application and weaves around it related concepts of FPGA-based digital design. It is suitable for both students and designers who have worked with microprocessors.

  15. Emerging Trends in Embedded Processors

    Directory of Open Access Journals (Sweden)

    Gurvinder Singh

    2014-05-01

    Full Text Available An Embedded Processors is simply a µProcessors that has been “Embedded” into a device. Embedded systems are important part of human life. For illustration, one cannot visualize life without mobile phones for personal communication. Embedded systems are used in many places like healthcare, automotive, daily life, and in different offices and industries.Embedded Processors develop new research area in the field of hardware designing.

  16. Embedment of Employee?

    DEFF Research Database (Denmark)

    Buhl, Henrik

    1998-01-01

    The purpose of the paper is to discuss the influence of different approaches and work life conditions on the conception of embedment of employee participation. The discussion is based on three connected approaches: a theoretical research, a research into participation in working life and an empir......The purpose of the paper is to discuss the influence of different approaches and work life conditions on the conception of embedment of employee participation. The discussion is based on three connected approaches: a theoretical research, a research into participation in working life...... and an empirical case study. My starting point will be a case study of a Danish ABB company which will form the framework of my discussion and reflect my present experience. This analysis will emphasize the possibilities of making employee participation a permanent part of the company at all levels....

  17. Embedded librarianship what every academic librarian should know

    CERN Document Server

    Russo, Michael F

    2013-01-01

    Is the embedded librarian an equal partner in the course, or is the librarian perceived as a "value-added" extra? What is the place of technology in this effort? Is there a line librarians should not cross? Taking into account both theory and practice to discuss multiple facets of the subject, Embedded Librarianship: What Every Academic Librarian Should Know thoroughly examines these questions and more from the perspectives of experienced embedded librarian contributors who have worked in higher education settings. The chapters illuminate the benefits and challenges of embedding, explain the planning required to set up an embedded course, identify the different forms of embedding, and consider information literacy instruction in various contexts. Readers who will benefit from this work include not only academic librarians but any professor who wants their students to be able to do better research in their fields.

  18. Audio Steganography with Embedded Text

    Science.gov (United States)

    Teck Jian, Chua; Chai Wen, Chuah; Rahman, Nurul Hidayah Binti Ab.; Hamid, Isredza Rahmi Binti A.

    2017-08-01

    Audio steganography is about hiding the secret message into the audio. It is a technique uses to secure the transmission of secret information or hide their existence. It also may provide confidentiality to secret message if the message is encrypted. To date most of the steganography software such as Mp3Stego and DeepSound use block cipher such as Advanced Encryption Standard or Data Encryption Standard to encrypt the secret message. It is a good practice for security. However, the encrypted message may become too long to embed in audio and cause distortion of cover audio if the secret message is too long. Hence, there is a need to encrypt the message with stream cipher before embedding the message into the audio. This is because stream cipher provides bit by bit encryption meanwhile block cipher provide a fixed length of bits encryption which result a longer output compare to stream cipher. Hence, an audio steganography with embedding text with Rivest Cipher 4 encryption cipher is design, develop and test in this project.

  19. Embeddings of Iteration Trees

    OpenAIRE

    Mitchell, William

    1992-01-01

    This paper, dating from May 1991, contains preliminary (and unpublishable) notes on investigations about iteration trees. They will be of interest only to the specialist. In the first two sections I define notions of support and embeddings for tree iterations, proving for example that every tree iteration is a direct limit of finite tree iterations. This is a generalization to models with extenders of basic ideas of iterated ultrapowers using only ultrapowers. In the final section (which is m...

  20. Embedded and real-time operating systems

    CERN Document Server

    Wang, K C

    2017-01-01

    This book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems. It includes all the foundational and background information on ARM architecture, ARM instructions and programming, toolchain for developing programs, virtual machines for software implementation and testing, program execution image, function call conventions, run-time stack usage and link C programs with assembly code. It describes the design and implementation of a complete OS for embedded systems in incremental steps, explaining the design principles and implementation techniques. For Symmetric Multiprocessing (SMP) embedded systems, the author examines the ARM MPcore processors, which include the SCU and GIC for interrupts routing and interprocessor communication and synchronization by Software Generated Interrupts (SGIs). Throughout the book, complete working sample systems demonstrate the design principles and...

  1. Embedded Academic Librarianship: A Review of the Literature

    Directory of Open Access Journals (Sweden)

    Stephanie J. Schulte

    2012-12-01

    Full Text Available Objectives – The purpose of this review is to examine the development of embedded librarianship, its multiple meanings, and activities in practice. The review will also report on published outcomes and future research needs of embedded librarian programs.Methods – A search of current literature was conducted and summarized searching PubMed, CINAHL, Library, Information Science & Technology Abstracts (EBSCO, Academic Search Complete, and ERIC (EBSCO through August 23, 2012. Articles wereselected for inclusion in the review if they reported research findings related to embedded librarianship, if they provided unique case reports about embedded librarian programs, or if they provided substantive editorial comments on the topic. Relevant study findings were assessed for quality and presented in tabular and narrative form.Results – Currently, there is disparity in how embedded librarianship is being definedand used in common practice, ranging from embedding an online component into asingle course to full physical and cultural integration into an academic college orbusiness unit of an organization. Activities of embedded librarians include creatingcourse integrated instruction modules for either face-to-face or online courses, providingin depth research assistance to students or faculty, and co-locating within colleges orcustomer units via office hours for a few hours to all hours per week. Several case reports exist in the recent literature. Few high quality research studies reporting outcomes of librarians or library programs labeled as embedded exist at this point. Some evidence suggests that embedded librarians are effective with regards to student learning of information literacy objectives. Surveys suggest that both students and faculty appreciate embedded librarian services.Conclusion – Most published accounts discuss librarians embedding content and ready access to services in an online course management system. A few notable cases

  2. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  3. Spatially Embedded Inequality

    DEFF Research Database (Denmark)

    Holck, Lotte

    2016-01-01

    /methodology/approach: – The (re)production of inequality is explored by linking research on organizational space with HRM diversity management. Data from an ethnographic study undertaken in a Danish municipal center illustrates how a substructure of inequality is spatially upheld alongside a formal diversity policy. Archer...... the more subtle, spatially embedded forms of inequality. Originality/value: – Theoretical and empirical connections between research on organizational space and HRM diversity management have thus far not been systematically studied. This combination might advance knowledge on the persistence of micro...

  4. Quantization of submanifold embeddings

    Energy Technology Data Exchange (ETDEWEB)

    Bahns, Dorothea; Zahn, Jochen [Courant Research Centre ' ' Higher Order Structures' ' , Universitaet Goettingen (Germany); Rejzner, Katarzyna [II. Institut fuer Theoretische Physik, Universitaet Hamburg (Germany)

    2013-07-01

    We describe a perturbative quantization of the embedding of d-dimensional submanifolds into n-dimensional Minkowski space, based on suitable generalizations of the Nambu-Goto action. We use tools from perturbative algebraic quantum field theory, quantum field theory on curved spacetimes, and the Batalin-Vilkovisky formalism. The resulting theory is perturbatively non-renormalizable, but well-defined as an effective theory, i.e., there are no anomalies, for any dimension d,n. In particular there is no critical dimension for the case of string theory (d=2).

  5. Shutters with embedded microprocessors

    Science.gov (United States)

    Stephenson, S.

    2015-06-01

    Shutters are used to periodically provide a non-uniformity correction (NUC) calibration surface to micro bolometers. Many bolometer applications, such as TWS and DVE, require compact, power efficient actuators. Actuators in these applications, such as bistable solenoids and stepper motors, benefit from complex drive schemes. Consumer electronics products have generated compact, low-cost drive components that can be used to embed complex drives into these shutters. Shutter drives using these components maintain compactness and power efficiency while simplifying interfaces at minimal cost. Recently, several commercially available shutter systems have been created that incorporate embedded microprocessors into shutters usable for NUC correction of micro bolometers.

  6. Embedded microcontroller interfacing

    CERN Document Server

    Gupta, Gourab Sen

    2010-01-01

    Mixed-Signal Embedded Microcontrollers are commonly used in integrating analog components needed to control non-digital electronic systems. They are used in automatically controlled devices and products, such as automobile engine control systems, wireless remote controllers, office machines, home appliances, power tools, and toys. Microcontrollers make it economical to digitally control even more devices and processes by reducing the size and cost, compared to a design that uses a separate microprocessor, memory, and input/output devices. In many undergraduate and post-graduate courses, teachi

  7. Biometric data reduction for embedding in small images

    Science.gov (United States)

    Ishaq Qazi, Naseem

    2003-06-01

    Biometric authentication systems require a fast and accurate method of matching biometric data for identification purposes. This paper introduces a data reduction technique based on image processing to better embed biometric data in small images. For the most part, biometric data cannot be directly embedded in small images, because of limited embedding capacities and a large amount of data in biometric images. An image processing technique to extract features from biometric data, like fingerprints and retinal scans, has been developed and tested. This new technique developed to extract features is based on the Hough transform and has been tested on a large volume of real image data. The data reduction technique was applied to these images and the data reduced to size, which could be easily embedded in small pictures, like those on identity cards. Existing embedding algorithms were utilized.

  8. Embedded Librarians: Just-in-Time or Just-in-Case? A Research Study

    Science.gov (United States)

    Heathcock, Kristin

    2015-01-01

    Embedded librarians in online courses provide a wealth of service and information to students. Though students indicate that these services are valuable, the librarians providing embedded services frequently note that these projects are very time consuming. This study examines the provision of a less time-intensive model of embedded librarianship…

  9. Design Methods for Embedded Security

    Directory of Open Access Journals (Sweden)

    I. Verbauwhede

    2009-11-01

    Full Text Available Embedded devices need both an efficient and a secure implementation of cryptographic algorithms. In this overview paper we show a typical top-down approach for secure and efficient implementation of embedded systems. We outline the security pyramid by illustrating the five primary abstraction levels in an embedded system. Focusing only on two levels - architecture and circuit level - we show how the design can be implemented to be both efficient and secure.

  10. Intelligence for embedded systems a methodological approach

    CERN Document Server

    Alippi, Cesare

    2014-01-01

    Addressing current issues of which any engineer or computer scientist should be aware, this monograph is a response to the need to adopt a new computational paradigm as the methodological basis for designing pervasive embedded systems with sensor capabilities. The requirements of this paradigm are to control complexity, to limit cost and energy consumption, and to provide adaptation and cognition abilities allowing the embedded system to interact proactively with the real world. The quest for such intelligence requires the formalization of a new generation of intelligent systems able to exploit advances in digital architectures and in sensing technologies. The book sheds light on the theory behind intelligence for embedded systems with specific focus on: ·        robustness (the robustness of a computational flow and its evaluation); ·        intelligence (how to mimic the adaptation and cognition abilities of the human brain), ·        the capacity to learn in non-stationary and evolv...

  11. Advances in embedded computer vision

    CERN Document Server

    Kisacanin, Branislav

    2014-01-01

    This illuminating collection offers a fresh look at the very latest advances in the field of embedded computer vision. Emerging areas covered by this comprehensive text/reference include the embedded realization of 3D vision technologies for a variety of applications, such as stereo cameras on mobile devices. Recent trends towards the development of small unmanned aerial vehicles (UAVs) with embedded image and video processing algorithms are also examined. The authoritative insights range from historical perspectives to future developments, reviewing embedded implementation, tools, technolog

  12. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  13. Embedded Systems Design with FPGAs

    CERN Document Server

    Pnevmatikatos, Dionisios; Sklavos, Nicolas

    2013-01-01

    This book presents methodologies for modern applications of embedded systems design, using field programmable gate array (FPGA) devices.  Coverage includes state-of-the-art research from academia and industry on a wide range of topics, including advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, dynamic reconfiguration and applications. Describes a variety of methodologies for modern embedded systems design;  Implements methodologies presented on FPGAs; Covers a wide variety of applications for reconfigurable embedded systems, including Bioinformatics, Communications and networking, Application acceleration, Medical solutions, Experiments for high energy physics, Astronomy, Aerospace, Biologically inspired systems and Computational fluid dynamics (CFD).

  14. Do aging and dual-tasking impair the capacity to store and retrieve visuospatial information needed to guide perturbation-evoked reach-to-grasp reactions?

    Directory of Open Access Journals (Sweden)

    Kenneth C Cheng

    Full Text Available A recent study involving young adults showed that rapid perturbation-evoked reach-to-grasp balance-recovery reactions can be guided successfully with visuospatial-information (VSI retained in memory despite: 1 a reduction in endpoint accuracy due to recall-delay (time between visual occlusion and perturbation-onset, PO and 2 slowing of the reaction when performing a concurrent cognitive task during the recall-delay interval. The present study aimed to determine whether this capacity is compromised by effects of aging. Ten healthy older adults were tested with the previous protocol and compared with the previously-tested young adults. Reactions to recover balance by grasping a small handhold were evoked by unpredictable antero-posterior platform-translation (barriers deterred stepping reactions, while using liquid-crystal goggles to occlude vision post-PO and for varying recall-delay times (0-10 s prior to PO (the handhold was moved unpredictably to one of four locations 2 s prior to vision-occlusion. Subjects also performed a spatial- or non-spatial-memory cognitive task during the delay-time in a subset of trials. Results showed that older adults had slower reactions than the young across all experimental conditions. Both age groups showed similar reduction in medio-lateral end-point accuracy when recall-delay was longest (10 s, but differed in the effect of recall delay on vertical hand elevation. For both age groups, engaging in either the non-spatial or spatial-memory task had similar (slowing effects on the arm reactions; however, the older adults also showed a dual-task interference effect (poorer cognitive-task performance that was specific to the spatial-memory task. This provides new evidence that spatial working memory plays a role in the control of perturbation-evoked balance-recovery reactions. The delays in completing the reaction that occurred when performing either cognitive task suggest that such dual-task situations in daily

  15. Embedded sensor systems

    CERN Document Server

    Agrawal, Dharma Prakash

    2017-01-01

    This inspiring textbook provides an introduction to wireless technologies for sensors, explores potential use of sensors for numerous applications, and utilizes probability theory and mathematical methods as a means of embedding sensors in system design. It discusses the need for synchronization and underlying limitations, inter-relation between given coverage and connectivity to number of sensors needed, and the use of geometrical distance to determine location of the base station for data collection and explore use of anchor nodes for relative position determination of sensors. The book explores energy conservation, communication using TCP, the need for clustering and data aggregation, and residual energy determination and energy harvesting. It covers key topics of sensor communication like mobile base stations and relay nodes, delay-tolerant sensor networks, and remote sensing and possible applications. The book defines routing methods and do performance evaluation for random and regular sensor topology an...

  16. Adaptable Embedded Systems

    CERN Document Server

    Lisbôa, Carlos; Carro, Luigi

    2013-01-01

    As embedded systems become more complex, designers face a number of challenges at different levels: they need to boost performance, while keeping energy consumption as low as possible, they need to reuse existent software code, and at the same time they need to take advantage of the extra logic available in the chip, represented by multiple processors working together.  This book describes several strategies to achieve such different and interrelated goals, by the use of adaptability. Coverage includes reconfigurable systems, dynamic optimization techniques such as binary translation and trace reuse, new memory architectures including homogeneous and heterogeneous multiprocessor systems, communication issues and NOCs, fault tolerance against fabrication defects and soft errors, and finally, how one can combine several of these techniques together to achieve higher levels of performance and adaptability.  The discussion also includes how to employ specialized software to improve this new adaptive system, and...

  17. Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources

    CERN Document Server

    Merhav, Neri

    2007-01-01

    An information-theoretic approach is proposed to watermark embedding and detection under limited detector resources. First, we consider the attack-free scenario under which asymptotically optimal decision regions in the Neyman-Pearson sense are proposed, along with the optimal embedding rule. Later, we explore the case of zero-mean i.i.d. Gaussian covertext distribution with unknown variance under the attack-free scenario. For this case, we propose a lower bound on the exponential decay rate of the false-negative probability and prove that the optimal embedding and detecting strategy is superior to the customary linear, additive embedding strategy in the exponential sense. Finally, these results are extended to the case of memoryless attacks and general worst case attacks. Optimal decision regions and embedding rules are offered, and the worst attack channel is identified.

  18. Embedding potentials for excited states of embedded species.

    Science.gov (United States)

    Wesolowski, Tomasz A

    2014-05-14

    Frozen-Density-Embedding Theory (FDET) is a formalism to obtain the upper bound of the ground-state energy of the total system and the corresponding embedded wavefunction by means of Euler-Lagrange equations [T. A. Wesolowski, Phys. Rev. A 77(1), 012504 (2008)]. FDET provides the expression for the embedding potential as a functional of the electron density of the embedded species, electron density of the environment, and the field generated by other charges in the environment. Under certain conditions, FDET leads to the exact ground-state energy and density of the whole system. Following Perdew-Levy theorem on stationary states of the ground-state energy functional, the other-than-ground-state stationary states of the FDET energy functional correspond to excited states. In the present work, we analyze such use of other-than-ground-state embedded wavefunctions obtained in practical calculations, i.e., when the FDET embedding potential is approximated. Three computational approaches based on FDET, that assure self-consistent excitation energy and embedded wavefunction dealing with the issue of orthogonality of embedded wavefunctions for different states in a different manner, are proposed and discussed.

  19. Biologically inspired large scale chemical sensor arrays and embedded data processing

    Science.gov (United States)

    Marco, S.; Gutiérrez-Gálvez, A.; Lansner, A.; Martinez, D.; Rospars, J. P.; Beccherelli, R.; Perera, A.; Pearce, T.; Vershure, P.; Persaud, K.

    2013-05-01

    Biological olfaction outperforms chemical instrumentation in specificity, response time, detection limit, coding capacity, time stability, robustness, size, power consumption, and portability. This biological function provides outstanding performance due, to a large extent, to the unique architecture of the olfactory pathway, which combines a high degree of redundancy, an efficient combinatorial coding along with unmatched chemical information processing mechanisms. The last decade has witnessed important advances in the understanding of the computational primitives underlying the functioning of the olfactory system. EU Funded Project NEUROCHEM (Bio-ICT-FET- 216916) has developed novel computing paradigms and biologically motivated artefacts for chemical sensing taking inspiration from the biological olfactory pathway. To demonstrate this approach, a biomimetic demonstrator has been built featuring a large scale sensor array (65K elements) in conducting polymer technology mimicking the olfactory receptor neuron layer, and abstracted biomimetic algorithms have been implemented in an embedded system that interfaces the chemical sensors. The embedded system integrates computational models of the main anatomic building blocks in the olfactory pathway: the olfactory bulb, and olfactory cortex in vertebrates (alternatively, antennal lobe and mushroom bodies in the insect). For implementation in the embedded processor an abstraction phase has been carried out in which their processing capabilities are captured by algorithmic solutions. Finally, the algorithmic models are tested with an odour robot with navigation capabilities in mixed chemical plumes

  20. Capacity and Capacity Utilization in Fishing Industries

    OpenAIRE

    Kirkley, James E; Squires, Dale

    1999-01-01

    Excess capacity of fishing fleets is one of the most pressing problems facing the world's fisheries and the sustainable harvesting of resource stocks. Considerable confusion persists over the definition and measurement of capacity and capacity utilization in fishing. Fishing capacity and capacity utilization, rather than capital (or effort) utilization, provide the appropriate framework. This paper provides both technological-economic and economic definitions of capacity and excess capacity i...

  1. Competence building capacity shortage

    Energy Technology Data Exchange (ETDEWEB)

    Doorman, Gerard; Wangensteen, Ivar; Bakken, Bjoern

    2005-02-01

    conditions after 1990 and if the availability of Danish import and hydropower is normal. Finally, an analysis was done of Capacity Subscription, a model where consumers pay for the capacity they use during system peak load. It was shown how this model can be embedded in the Nordic market solution. However, given the present situation which is not seen as critical, a prospective introduction of this model would lie some years into the future. Further research with respect to technological solutions and market communication should be undertaken to learn more about these central issues for this model. (author)

  2. Computer algebra in spacetime embedding

    CERN Document Server

    Roque, Waldir L

    2014-01-01

    In this paper we describe an algorithm to determine the vectors normal to a space-time V4 embedded in a pseudo-Euclidean manifold M4+n. An application of this algorithm is given considering the Schwarzchild space-time geometry embedded in a 6 dimensional pseudo-Euclidean manifold, using the algebraic computing system REDUCE.

  3. Molecular Properties through Polarizable Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2011-01-01

    We review the theory related to the calculation of electric and magnetic molecular properties through polarizable embedding. In particular, we derive the expressions for the response functions up to the level of cubic response within the density functional theory-based polarizable embedding (PE-D...

  4. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, Rene Rydhof

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety...

  5. Hybridity in Embedded Computing Systems

    Institute of Scientific and Technical Information of China (English)

    虞慧群; 孙永强

    1996-01-01

    An embedded system is a system that computer is used as a component in a larger device.In this paper,we study hybridity in embedded systems and present an interval based temporal logic to express and reason about hybrid properties of such kind of systems.

  6. Collaborative development of embedded systems

    NARCIS (Netherlands)

    Verhoef, Marcel; Pierce, Kenneth; Gamble, Carl; Broenink, Jan; Fitzgerald, John; Larsen, Peter Gorm; Verhoef, Marcel

    2014-01-01

    This chapter presents motivation for taking a collaborative multi-disciplinary approach to the model-based development of embedded systems. Starting from a consideration of the ubiquity of embedded systems in daily life it identifies challenges faced by industry in developing products in a timely ma

  7. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...

  8. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2002-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...

  9. The Influence of Organisational Defensive Patterns on Innovation Capacity and Learning of Information and Communication Technology: An Empirical Study in Hong Kong Transport Sector

    Science.gov (United States)

    Yau, Hon Keung; Cheng, Alison Lai Fong

    2010-01-01

    Organisational defensive patterns, including skilled incompetence, organisational defensive routines and fancy footwork, are considered to be a hindrance to effective learning and innovation capacity building in all organisations. The purpose of this research is to investigate: 1) the perceptions of the influence of organisational defensive…

  10. Capacity bounds and constructions for reversible data-hiding

    Science.gov (United States)

    Kalker, Ton; Willems, Frans M. J.

    2003-06-01

    An undesirable side effect of many watermarking and data-hiding schemes is that the host signal into which auxiliary data is embedded is distorted. Finding an optimal balance between the amount of information embedded and the induced distortion is therefore an active field of research. In recent years, with the rediscovery of Costa's seminal paper Writing on Dirty Paper, there has been considerable progress in understanding the fundamental limits of the capacity versus distortion of watermarking and data-hiding schemes. For some applications, however, no distortion resulting from auxiliary data, however small, is allowed. In these cases the use of reversible data-hiding methods provide a way out. A reversible data-hiding scheme is defined as a scheme that allows complete and blind restoration (i.e. without additional signaling) of the original host data. Practical reversible data-hiding schemes have been proposed by Fridrich et al., but little attention has been paid to the theoretical limits. Some first results on the capacity of reversible watermarking schemes have been derived. The reversible schemes considered in most previous papers have a highly fragile nature: in those schemes, changing a single bit in the watermarked data would prohibit recovery of both the original host signal as well as the embedded auxiliary data. It is the purpose of this paper to repair this situation and to provide some first results on the limits of robust reversible data-hiding. Admittedly, the examples provided in this paper are toy examples, but they are indicative of more practical schemes that will be presented in subsequent papers.

  11. Asymmetric distances for binary embeddings.

    Science.gov (United States)

    Gordo, Albert; Perronnin, Florent; Gong, Yunchao; Lazebnik, Svetlana

    2014-01-01

    In large-scale query-by-example retrieval, embedding image signatures in a binary space offers two benefits: data compression and search efficiency. While most embedding algorithms binarize both query and database signatures, it has been noted that this is not strictly a requirement. Indeed, asymmetric schemes that binarize the database signatures but not the query still enjoy the same two benefits but may provide superior accuracy. In this work, we propose two general asymmetric distances that are applicable to a wide variety of embedding techniques including locality sensitive hashing (LSH), locality sensitive binary codes (LSBC), spectral hashing (SH), PCA embedding (PCAE), PCAE with random rotations (PCAE-RR), and PCAE with iterative quantization (PCAE-ITQ). We experiment on four public benchmarks containing up to 1M images and show that the proposed asymmetric distances consistently lead to large improvements over the symmetric Hamming distance for all binary embedding techniques.

  12. Maximum Genus of Strong Embeddings

    Institute of Scientific and Technical Information of China (English)

    Er-ling Wei; Yan-pei Liu; Han Ren

    2003-01-01

    The strong embedding conjecture states that any 2-connected graph has a strong embedding on some surface. It implies the circuit double cover conjecture: Any 2-connected graph has a circuit double cover.Conversely, it is not true. But for a 3-regular graph, the two conjectures are equivalent. In this paper, a characterization of graphs having a strong embedding with exactly 3 faces, which is the strong embedding of maximum genus, is given. In addition, some graphs with the property are provided. More generally, an upper bound of the maximum genus of strong embeddings of a graph is presented too. Lastly, it is shown that the interpolation theorem is true to planar Halin graph.

  13. Lattice Embedding of Heronian Simplices

    CERN Document Server

    Lunnon, W Fred

    2012-01-01

    A rational triangle has rational edge-lengths and area; a rational tetrahedron has rational faces and volume; either is Heronian when its edge-lengths are integer, and proper when its content is nonzero. A variant proof is given, via complex number GCD, of the previously known result that any Heronian triangle may be embedded in the Cartesian lattice Z^2; it is then shown that, for a proper triangle, such an embedding is unique modulo lattice isometry; finally the method is extended via quaternion GCD to tetrahedra in Z^3, where uniqueness no longer obtains, and embeddings also exist which are unobtainable by this construction. The requisite complex and quaternionic number theoretic background is summarised beforehand. Subsequent sections engage with subsidiary implementation issues: initial rational embedding, canonical reduction, exhaustive search for embeddings additional to those yielded via GCD; and illustrative numerical examples are provided. A counter-example shows that this approach must fail in high...

  14. The Working Mechanism and An Analytic Method of the Deep Embedded Large Cylinder Structure

    Institute of Scientific and Technical Information of China (English)

    孙克俐; 周锡礽; 钱荣

    2004-01-01

    The large cylinder is a new-type structure that has been applied to harbor and offshore engineering. An analytic method of the relationship between loads and the structure displacement is developed based on the failure mode of deep embedded large cylinder structures. It can be used to calculate directly the soil resistance and the ultimate bearing capacity of the structure under usage. A new criterion of the large cylinder structure, which discriminates the deep embedded cylinder from the shallow embedded cylinder, is defined. Model tests prove that the proposed method is feasible for the analysis of deep embedded large cylinder structures.

  15. Metric embeddings bilipschitz and coarse embeddings into Banach spaces

    CERN Document Server

    Ostrovskii, Mikhail I

    2013-01-01

    Embeddings of discrete metric spaces into Banach spaces recently became an important tool in computer science and topology. The book will help readers to enter and to work in this very rapidly developing area having many important connections with different parts of mathematics and computer science. The purpose of the book is to present some of the most important techniques and results, mostly on bilipschitz and coarse embeddings. The topics include embeddability of locally finite metric spaces into Banach spaces is finitely determined, constructions of embeddings, distortion in terms of Poinc

  16. Capacity Building in Land Management

    DEFF Research Database (Denmark)

    Enemark, Stig; Ahene, Rexford

    2003-01-01

    There is a significant need for capacity building in the interdisciplinary area of land management especially in developing countries and countries in transition, to deal with the complex issues of building efficient land information systems and sustainable institutional infrastructures. Capacity...... development in this area. Furthermore, capacity building should ensure that the focus is on building sound institutions and governance rather than just high-level IT-infrastructures.    This overall approach to capacity building in land management is used for implementing a new land policy reform in Malawi...

  17. Considering Patients’ Mental Capacity When Giving Them Bad News May Help Their Well-Being: A Case of Suicide Attempt after Being Informed of Lung Cancer Diagnosis

    Directory of Open Access Journals (Sweden)

    Toshiyuki Kobayashi

    2014-01-01

    Full Text Available Mental capacity is a central determinant of patients’ ability to make autonomous decisions about their care and deal with bad news. Physicians should be cognizant of this when giving patients bad news in efforts to help them to cope with the illness and to avoid a deterioration of their mental well-being. To show the importance of this concept, a case of suicide attempt with lung cancer is exemplified. A 76-year-old woman attempted suicide after receiving a diagnosis of lung cancer. Her recent life had been emotionally turbulent and she did not have sufficient mental capacity to accept and cope with this truth. She developed depression before attempting suicide.

  18. Coordination Capacity

    CERN Document Server

    Cuff, Paul; Cover, Thomas

    2009-01-01

    We develop elements of a theory of cooperation and coordination in networks. Rather than considering a communication network as a means of distributing information, or of reconstructing random processes at remote nodes, we ask what dependence can be established among the nodes given the communication constraints. Specifically, in a network with communication rates between the nodes, we ask what is the set of all achievable joint distributions p(x1, ..., xm) of actions at the nodes on the network. Several networks are solved, including arbitrarily large cascade networks. Distributed cooperation can be the solution to many problems such as distributed games, distributed control, and establishing mutual information bounds on the influence of one part of a physical system on another.

  19. Fiber Bragg Gratings Embedded in 3D-Printed Scaffolds

    CERN Document Server

    Liacouras, Peter; Choudhry, Khazar; Strouse, G F; Ahmed, Zeeshan

    2015-01-01

    In recent years there has been considerable interest in utilizing embedded fiber optic based sensors for fabricating smart materials. One of the primary motivations is to provide real-time information on the structural integrity of the material so as to enable proactive actions that prevent catastrophic failure. In this preliminary study we have examined the impact of embedding on the temperature-dependent response of fiber Bragg gratings.

  20. Measuring the dimension of partially embedded networks

    CERN Document Server

    Kondor, Dániel; Csabai, István; Vattay, Gábor

    2013-01-01

    Scaling phenomena have been intensively studied during the past decade in the context of complex networks. As part of these works, recently novel methods have appeared to measure the dimension of abstract and spatially embedded networks. In this paper we propose a new dimension measurement method for networks, which does not require global knowledge on the embedding of the nodes, instead it exploits link-wise information (link lengths, link delays or other physical quantities). Our method can be regarded as a generalization of the spectral dimension, that grasps the network's large-scale structure through local observations made by a random walker while traversing the links. We apply the presented method to synthetic and real-world networks, including road maps, the Internet infrastructure and the Gowalla geosocial network. We analyze the theoretically and empirically designated case when the length distribution of the links has the form P(r) ~ 1/r. We show that while previous dimension concepts are not appli...

  1. Private Capacity of Quantum Channels is Not Additive

    Science.gov (United States)

    Li, Ke; Winter, Andreas; Zou, Xubo; Guo, Guangcan

    2009-09-01

    Recently there has been considerable activity on the subject of the additivity of various quantum channel capacities. Here, we construct a family of channels with a sharply bounded classical and, hence, private capacity. On the other hand, their quantum capacity when combined with a zero private (and zero quantum) capacity erasure channel becomes larger than the previous classical capacity. As a consequence, we can conclude for the first time that the classical private capacity is nonadditive. In fact, in our construction even the quantum capacity of the tensor product of two channels can be greater than the sum of their individual classical private capacities. We show that this violation occurs quite generically: every channel can be embedded into our construction, and a violation occurs whenever the given channel has a larger entanglement-assisted quantum capacity than (unassisted) classical capacity.

  2. Phylogenetic trees and Euclidean embeddings.

    Science.gov (United States)

    Layer, Mark; Rhodes, John A

    2017-01-01

    It was recently observed by de Vienne et al. (Syst Biol 60(6):826-832, 2011) that a simple square root transformation of distances between taxa on a phylogenetic tree allowed for an embedding of the taxa into Euclidean space. While the justification for this was based on a diffusion model of continuous character evolution along the tree, here we give a direct and elementary explanation for it that provides substantial additional insight. We use this embedding to reinterpret the differences between the NJ and BIONJ tree building algorithms, providing one illustration of how this embedding reflects tree structures in data.

  3. Embedded systems circuits and programming

    CERN Document Server

    Sanchez, Julio

    2012-01-01

    During the development of an engineered product, developers often need to create an embedded system--a prototype--that demonstrates the operation/function of the device and proves its viability. Offering practical tools for the development and prototyping phases, Embedded Systems Circuits and Programming provides a tutorial on microcontroller programming and the basics of embedded design. The book focuses on several development tools and resources: Standard and off-the-shelf components, such as input/output devices, integrated circuits, motors, and programmable microcontrollers The implementat

  4. Bandwidth Extension of Telephone Speech Aided by Data Embedding

    Directory of Open Access Journals (Sweden)

    David Malah

    2007-01-01

    Full Text Available A system for bandwidth extension of telephone speech, aided by data embedding, is presented. The proposed system uses the transmitted analog narrowband speech signal as a carrier of the side information needed to carry out the bandwidth extension. The upper band of the wideband speech is reconstructed at the receiving end from two components: a synthetic wideband excitation signal, generated from the narrowband telephone speech and a wideband spectral envelope, parametrically represented and transmitted as embedded data in the telephone speech. We propose a novel data embedding scheme, in which the scalar Costa scheme is combined with an auditory masking model allowing high rate transparent embedding, while maintaining a low bit error rate. The signal is transformed to the frequency domain via the discrete Hartley transform (DHT and is partitioned into subbands. Data is embedded in an adaptively chosen subset of subbands by modifying the DHT coefficients. In our simulations, high quality wideband speech was obtained from speech transmitted over a telephone line (characterized by spectral magnitude distortion, dispersion, and noise, in which side information data is transparently embedded at the rate of 600 information bits/second and with a bit error rate of approximately 3⋅10−4. In a listening test, the reconstructed wideband speech was preferred (at different degrees over conventional telephone speech in 92.5% of the test utterances.

  5. Bandwidth Extension of Telephone Speech Aided by Data Embedding

    Directory of Open Access Journals (Sweden)

    Sagi Ariel

    2007-01-01

    Full Text Available A system for bandwidth extension of telephone speech, aided by data embedding, is presented. The proposed system uses the transmitted analog narrowband speech signal as a carrier of the side information needed to carry out the bandwidth extension. The upper band of the wideband speech is reconstructed at the receiving end from two components: a synthetic wideband excitation signal, generated from the narrowband telephone speech and a wideband spectral envelope, parametrically represented and transmitted as embedded data in the telephone speech. We propose a novel data embedding scheme, in which the scalar Costa scheme is combined with an auditory masking model allowing high rate transparent embedding, while maintaining a low bit error rate. The signal is transformed to the frequency domain via the discrete Hartley transform (DHT and is partitioned into subbands. Data is embedded in an adaptively chosen subset of subbands by modifying the DHT coefficients. In our simulations, high quality wideband speech was obtained from speech transmitted over a telephone line (characterized by spectral magnitude distortion, dispersion, and noise, in which side information data is transparently embedded at the rate of 600 information bits/second and with a bit error rate of approximately . In a listening test, the reconstructed wideband speech was preferred (at different degrees over conventional telephone speech in of the test utterances.

  6. The Anti-surge Capacity of the Surge Arresters for Information System%信息系统避雷器的抗浪涌能力

    Institute of Scientific and Technical Information of China (English)

    谭克勤

    2001-01-01

    The paper describes the basic characteristics about lightning over-voltage, the technology measures of anti-lightning, and the usage and classification of surge arresters. The paper forcus on the Anti-surge capacity of the various surge arresters.%阐述了雷电过电压的基本特性及防雷技术措施,避雷器的用途和分类,重点论述了各种信息系统避雷器的抗浪涌能力。

  7. Observability of multivariate differential embeddings

    Energy Technology Data Exchange (ETDEWEB)

    Aguirre, Luis Antonio [Laboratorio de Modelagem, Analise e Controle de Sistemas Nao Lineares, Departamento de Engenharia Eletronica, Universidade Federeal de Minas Gerais, Av. Antonio Carlos 6627, 31270-901 Belo Horizonte, MG (Brazil); Letellier, Christophe [Universite de Rouen-CORIA UMR 6614, Av. de l' Universite, BP 12, F-76801 Saint-Etienne du Rouvray Cedex (France)

    2005-07-15

    The present paper extends some results recently developed for the analysis of observability in nonlinear dynamical systems. The aim of the paper is to address the problem of embedding an attractor using more than one observable. A multivariate nonlinear observability matrix is proposed which includes the monovariable nonlinear and linear observability matrices as particular cases. Using the developed framework and a number of worked examples, it is shown that the choice of embedding coordinates is critical. Moreover, in some cases, to reconstruct the dynamics using more than one observable could be worse than to reconstruct using a scalar measurement. Finally, using the developed framework it is shown that increasing the embedding dimension, observability problems diminish and can even be eliminated. This seems to be a physically meaningful interpretation of the Takens embedding theorem.

  8. Embedded Systems Design: Optimization Challenges

    DEFF Research Database (Denmark)

    Pop, Paul

    2005-01-01

    of designing such systems is becoming increasingly important and difficult at the same time. New automated design optimization techniques are needed, which are able to: successfully manage the complexity of embedded systems, meet the constraints imposed by the application domain, shorten the time...... in use has become larger than the number of humans on the planet. The complexity of embedded systems is growing at a very high pace and the constraints in terms of functionality, performance, low energy consumption, reliability, cost and time-to-market are getting tighter. Therefore, the task......-to-market, and reduce development and manufacturing costs. In this paper, the author introduces several embedded systems design problems, and shows how they can be formulated as optimization problems. Solving such challenging design optimization problems are the key to the success of the embedded systems design...

  9. Visualizing spacetimes via embedding diagrams

    CERN Document Server

    Hledik, Stanislav; Cipko, Alois

    2016-01-01

    It is hard to imagine curved spacetimes of General Relativity. A simple but powerful way how to achieve this is visualizing them via embedding diagrams of both ordinary geometry and optical reference geometry. They facilitate to gain an intuitive insight into the gravitational field rendered into a curved spacetime, and to assess the influence of parameters like electric charge and spin of a black hole, magnetic field or cosmological constant. Optical reference geometry and related inertial forces and their relationship to embedding diagrams are particularly useful for investigation of test particles motion. Embedding diagrams of static and spherically symmetric, or stationary and axially symmetric black-hole and naked-singularity spacetimes thus present a useful concept for intuitive understanding of these spacetimes' nature. We concentrate on general way of embedding into 3-dimensional Euclidean space, and give a set of illustrative examples.

  10. Hardware Support for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2012-01-01

    The general Java runtime environment is resource hungry and unfriendly for real-time systems. To reduce the resource consumption of Java in embedded systems, direct hardware support of the language is a valuable option. Furthermore, an implementation of the Java virtual machine in hardware enables...... worst-case execution time analysis of Java programs. This chapter gives an overview of current approaches to hardware support for embedded and real-time Java....

  11. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2002-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...... be answered affirmatively for an idealized Haskell-like language and discuss to which extent Haskell can be used as a meta-language....

  12. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...... be answered affirmatively for an idealized Haskell-like language and discuss to which extent Haskell can be used as a meta-language....

  13. Multilingual Word Embeddings using Multigraphs

    OpenAIRE

    Soricut, Radu; Ding, Nan

    2016-01-01

    We present a family of neural-network--inspired models for computing continuous word representations, specifically designed to exploit both monolingual and multilingual text. This framework allows us to perform unsupervised training of embeddings that exhibit higher accuracy on syntactic and semantic compositionality, as well as multilingual semantic similarity, compared to previous models trained in an unsupervised fashion. We also show that such multilingual embeddings, optimized for semant...

  14. Hardware Support for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2012-01-01

    The general Java runtime environment is resource hungry and unfriendly for real-time systems. To reduce the resource consumption of Java in embedded systems, direct hardware support of the language is a valuable option. Furthermore, an implementation of the Java virtual machine in hardware enables...... worst-case execution time analysis of Java programs. This chapter gives an overview of current approaches to hardware support for embedded and real-time Java....

  15. Fresnel Lens with Embedded Vortices

    Directory of Open Access Journals (Sweden)

    Sunil Vyas

    2012-01-01

    Full Text Available Vortices of different charges are embedded in a wavefront that has quadratic phase variation, and the intensity distribution near the focal plane is studied. This method may be useful in realizing complicated beam profiles. We have experimentally demonstrated the generation of vortex arrays having integer as well as fractional topological charges that produce different intensity profiles at the focal plane. The phase variation realized on a spatial light modulator (SLM acts as a Fresnel lens with embedded vortices.

  16. Increasing Bellevue School District's elementary teachers' capacity for teaching inquiry-based science: Using ideas from contemporary learning theory to inform professional development

    Science.gov (United States)

    Maury, Tracy Anne

    This Capstone project examined how leaders in the Bellevue School District can increase elementary teachers' capacity for teaching inquiry-based science through the use of professional learning activities that are grounded in ideas from human learning theory. A framework for professional development was constructed and from that framework, a set of professional learning activities were developed as a means to support teacher learning while project participants piloted new curriculum called the Isopod Habitat Challenge. Teachers in the project increased their understanding of the learning theory principles of preconceptions and metacognition. Teachers did not increase their understanding of the principle of learning with understanding, although they did articulate the significance of engaging children in student-led inquiry cycles. Data from the curriculum revision and professional development project coupled with ideas from learning theory, cognition and policy implementation, and learning community literatures suggest Bellevue's leaders can encourage peer-to-peer interaction, link professional development to teachers' daily practice, and capitalize on technology as ways to increase elementary teachers' capacity for teaching inquiry-based science. These lessons also have significance for supporting teacher learning and efficacy in other subject areas and at other levels in the system.

  17. Analysis of Information Hiding Capacity in the Multiple Antennas Coding Channel System%多天线编码信道系统中的信息隐藏容量分析

    Institute of Scientific and Technical Information of China (English)

    卢苗; 陈立全

    2012-01-01

    在分析信道编码和信息隐藏技术相结合的基础上,提出了Alamouti编码多天线系统中的基于LDPC码的信息隐藏方案,理论推导了单天线编码信道及多天线编码信道系统中的信息隐藏容量上限,并进行数值验算和MATLAB仿真验证.实验结果表明,较之单天线编码信道,基于多天线编码信道的信息隐藏容量有明显的提高.%Based on analysis of the combination between channel coding technologies and information hiding technologies, an information hiding scheme based on LDPC codes is proposed, which is implemented in Alamouti coding MIMO system. A theoretical analysis about information hiding capacities of the coding channel system and multi-antennas coding channel system is presented. Then,it evaluates the proposed scheme by numerical analyses and MATLAB simulations. Compared with the single antenna channel coding system experimental results show that the information hiding capacity based on multiple antenna channel coding system is improved significant.

  18. Information

    CERN Document Server

    Ritchie, L David

    1991-01-01

    This volume thoroughly covers the sub-field of information, and is one of the first in a series which synthesizes the research literature on major concepts in the field of communication. Each concise volume includes a research definition (concept explication) and presents a state-of-the-art analysis of theory and empirical findings related to the concept. After defining the word `information', the author contrasts non-linear and reflexive ideas about human communication with linear perspectives. Information is equated with uncertainty. The result presents a pattern for the process of conceptua

  19. Universal Learning System for Embedded System Education and Promotion

    Directory of Open Access Journals (Sweden)

    Kai-Chao Yang

    2013-03-01

    Full Text Available In this article, the idea of the universal learning system for embedded systems is presented. The proposed system provides a complete learning environment consisting of the information collection center, preference estimation system, Q&A center, forum, and virtual classroom. The skeleton of the proposed system is a preference estimation system, which helps users know the relationship between different hardware kits and suggests suitable hardware kits to users to learn embedded systems. Then, the proposed system provides the virtual classroom and Q&A service for users to start their classes. Besides, users can share design samples and experience, and join discussions through the forum of the proposed system. For demonstration, three embedded hardware platforms are introduced and applied by the proposed learning system. The results show that most students feel the proposed learning system can effectively help with their embedded software design.

  20. Watermark Embedding and Detection

    OpenAIRE

    Zhong, Jidong

    2007-01-01

    The embedder and the detector (or decoder) are the two most important components of the digital watermarking systems. Thus in this work, we discuss how to design a better embedder and detector (or decoder). I first give a summary of the prospective applications of watermarking technology and major watermarking schemes in the literature. My review on the literature closely centers upon how the side information is exploited at both embedders and detectors. In Chapter 3, I explore the optimum de...

  1. Embedded Linux projects using Yocto project cookbook

    CERN Document Server

    González, Alex

    2015-01-01

    If you are an embedded developer learning about embedded Linux with some experience with the Yocto project, this book is the ideal way to become proficient and broaden your knowledge with examples that are immediately applicable to your embedded developments. Experienced embedded Yocto developers will find new insight into working methodologies and ARM specific development competence.

  2. Embedded systems for controlling LED matrix displays

    Science.gov (United States)

    Marghescu, Cristina; Drumea, Andrei

    2016-12-01

    LED matrix displays are a common presence in everyday life - they can be found in trains, buses, tramways, office information tables or outdoor media. The structure of the display unit is similar for all these devices, a matrix of light emitting diodes coupled between row and column lines, but there are many options for the display controller that switches these lines. Present paper analyzes different types of embedded systems that can control the LED matrix, based on single board computers, on microcontrollers with different peripheral devices or with programmable logic devices like field programmable gate arrays with implemented soft processor cores. Scalability, easiness of implementation and costs are analyzed for all proposed solutions.

  3. 消费者嵌入式开放创新价值生成过程研究--基于消费类电子信息产品技术创新的视角%Research on the Value Generated Process of Consumer Embedded Open Innovation Based on the Perspective of Technology Innovation of Consuming Electronic and Information Products

    Institute of Scientific and Technical Information of China (English)

    许爱萍

    2015-01-01

    消费类电子信息产品创新过程越来越重视客户体验和需要,将顾客视为最终消费者的企业-顾客互动式创新模式已经难以满足消费类电子技术高速创新的需要。提出顾客嵌入式开放创新的概念和内涵,并对消费类电子信息产品顾客嵌入式开放创新过程和创新价值生成过程进行剖析,有助于探究顾客嵌入技术创新的轨迹,以期为相关产业开放式技术创新提供参考。%More and more consuming electronic information product companies focus on customers experience in the inno-vative process and choose open innovative models to fit customer needs. The businesses and customer interactive innovation model which treats consumers as the final consumer is barely to meet the high speed of consuming electronics information technology innovation. In the paper,the concept and content of embedded customers open innovation is proposed,and the consumer embedded open innovation process of consuming electronics and information technology products and its value generation process is explored,which will help exploring the trajectory of embedded innovation in order to provide a refer-ence to open technology innovation for related industries.

  4. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  5. Quantum reading capacity

    Science.gov (United States)

    Pirandola, Stefano; Lupo, Cosmo; Giovannetti, Vittorio; Mancini, Stefano; Braunstein, Samuel L.

    2011-11-01

    The readout of a classical memory can be modelled as a problem of quantum channel discrimination, where a decoder retrieves information by distinguishing the different quantum channels encoded in each cell of the memory (Pirandola 2011 Phys. Rev. Lett. 106 090504). In the case of optical memories, such as CDs and DVDs, this discrimination involves lossy bosonic channels and can be remarkably boosted by the use of nonclassical light (quantum reading). Here we generalize these concepts by extending the model of memory from single-cell to multi-cell encoding. In general, information is stored in a block of cells by using a channel-codeword, i.e. a sequence of channels chosen according to a classical code. Correspondingly, the readout of data is realized by a process of ‘parallel’ channel discrimination, where the entire block of cells is probed simultaneously and decoded via an optimal collective measurement. In the limit of a large block we define the quantum reading capacity of the memory, quantifying the maximum number of readable bits per cell. This notion of capacity is nontrivial when we suitably constrain the physical resources of the decoder. For optical memories (encoding bosonic channels), such a constraint is energetic and corresponds to fixing the mean total number of photons per cell. In this case, we are able to prove a separation between the quantum reading capacity and the maximum information rate achievable by classical transmitters, i.e. arbitrary classical mixtures of coherent states. In fact, we can easily construct nonclassical transmitters that are able to outperform any classical transmitter, thus showing that the advantages of quantum reading persist in the optimal multi-cell scenario.

  6. Design Methodologies for Secure Embedded Systems

    CERN Document Server

    Biedermann, Alexander

    2011-01-01

    Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? And how can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration o

  7. Building policy-making capacity in the Ministry of Health: the Kazakhstan experience.

    Science.gov (United States)

    Chanturidze, Tata; Adams, Orvill; Tokezhanov, Bolat; Naylor, Mike; Richardson, Erica

    2015-01-20

    Recent economic growth in Kazakhstan has been accompanied by slower improvements in population health and this has renewed impetus for health system reform. Strengthening strategic planning and policy-making capacity in the Ministry of Health has been identified as an important priority, particularly as the Ministry of Health is leading the health system reform process. The intervention was informed by the United Nations Development Programme (UNDP) framework for capacity building which views capacity building as an ongoing process embedded in local institutions and practices. In response to local needs extra elements were included in the framework to tailor the capacity building programme according to the existing policy and budget cycles and respective competence requirements, and link it with transparent career development structures of the Ministry of Health. This aspect of the programme was informed by the institutional capability assessment model used by the United Kingdom National Health Service (NHS) which was adapted to examine the specific organizational and individual competences of the Ministry of Health in Kazakhstan. There were clear successes in building capacity for policy making and strategic planning within the Ministry of Health in Kazakhstan, including better planned, more timely and in-depth responses to policy assignments. Embedding career development as a part of this process was more challenging. This case study highlights the importance of strong political will and high level support for capacity building in ensuring the sustainability of programmes. It also shows that capacity-building programmes need to ensure full engagement with all local stakeholders, or where this is not possible, programmes need to be targeted narrowly to those stakeholders who will benefit most, for the greatest impact to be achieved. In sum, high quality tailor-made capacity development programmes should be based on thorough needs assessment of individual and

  8. Enhancing Research Ethics Review Systems in Egypt: The Focus of an International Training Program Informed by an Ecological Developmental Approach to Enhancing Research Ethics Capacity.

    Science.gov (United States)

    Edwards, Hillary Anne; Hifnawy, Tamer; Silverman, Henry

    2015-12-01

    Recently, training programs in research ethics have been established to enhance individual and institutional capacity in research ethics in the developing world. However, commentators have expressed concern that the efforts of these training programs have placed 'too great an emphasis on guidelines and research ethics review', which will have limited effect on ensuring ethical conduct in research. What is needed instead is a culture of ethical conduct supported by national and institutional commitment to ethical practices that are reinforced by upstream enabling conditions (strong civil society, public accountability, and trust in basic transactional processes), which are in turn influenced by developmental conditions (basic freedoms of political freedoms, economic facilities, social opportunities, transparency guarantees, and protective security). Examining this more inclusive understanding of the determinants of ethical conduct enhances at once both an appreciation of the limitations of current efforts of training programs in research ethics and an understanding of what additional training elements are needed to enable trainees to facilitate national and institutional policy changes that enhance research practices. We apply this developmental model to a training program focused in Egypt to describe examples of such additional training activities.

  9. Embedding Graphs in Lorentzian Spacetime

    CERN Document Server

    Clough, James R

    2016-01-01

    Geometric approaches to network analysis combine simply defined models with great descriptive power. In this work we provide a method for embedding directed acyclic graphs into Minkowski spacetime using Multidimensional scaling (MDS). First we generalise the classical MDS algorithm, defined only for metrics with a Euclidean signature, to manifolds of any metric signature. We then use this general method to develop an algorithm to be used on networks which have causal structure allowing them to be embedded in Lorentzian manifolds. The method is demonstrated by calculating embeddings for both causal sets and citation networks in Minkowski spacetime. We finally suggest a number of applications in citation analysis such as paper recommendation, identifying missing citations and fitting citation models to data using this geometric approach.

  10. Embedded Processor Oriented Compiler Infrastructure

    Directory of Open Access Journals (Sweden)

    DJUKIC, M.

    2014-08-01

    Full Text Available In the recent years, research of special compiler techniques and algorithms for embedded processors broaden the knowledge of how to achieve better compiler performance in irregular processor architectures. However, industrial strength compilers, besides ability to generate efficient code, must also be robust, understandable, maintainable, and extensible. This raises the need for compiler infrastructure that provides means for convenient implementation of embedded processor oriented compiler techniques. Cirrus Logic Coyote 32 DSP is an example that shows how traditional compiler infrastructure is not able to cope with the problem. That is why the new compiler infrastructure was developed for this processor, based on research. in the field of embedded system software tools and experience in development of industrial strength compilers. The new infrastructure is described in this paper. Compiler generated code quality is compared with code generated by the previous compiler for the same processor architecture.

  11. Phase space embedding of electrocardiograms

    CERN Document Server

    Richter, M; Richter, Marcus; Schreiber, Thomas

    1998-01-01

    We study properties of the human electrocardiogram under the working hypothesis that fluctuations beyond the regular structure of single cardiac cycles are unpredictable. On this background we discuss the possibility to use the phase space embedding method for this kind of signal. In particular, the specific nature of the stochastic or high dimensional component allows to use phase space embeddings for certain signal processing tasks. As practical applications, we discuss noise filtering, fetal ECG extraction, and the automatic detection of clinically relevant features. The main purpose of the paper is to connect results of embedding theory which had not been previously applied in practise, and practical applications which had not yet been justified theoretically.

  12. Strong embeddings of minimum genus

    CERN Document Server

    Mohar, Bojan

    2009-01-01

    A "folklore conjecture, probably due to Tutte" (as described in [P.D. Seymour, Sums of circuits, Graph theory and related topics (Proc. Conf., Univ. Waterloo, 1977), pp. 341-355, Academic Press, 1979]) asserts that every bridgeless cubic graph can be embedded on a surface of its own genus in such a way that the face boundaries are cycles of the graph. In this paper we consider closed 2-cell embeddings of graphs and show that certain (cubic) graphs (of any fixed genus) have closed 2-cell embedding only in surfaces whose genus is very large (proportional to the order of these graphs), thus providing plethora of strong counterexamples to the above conjecture. The main result yielding such counterexamples may be of independent interest.

  13. A high capacity 3D steganography algorithm.

    Science.gov (United States)

    Chao, Min-Wen; Lin, Chao-hung; Yu, Cheng-Wei; Lee, Tong-Yee

    2009-01-01

    In this paper, we present a very high-capacity and low-distortion 3D steganography scheme. Our steganography approach is based on a novel multilayered embedding scheme to hide secret messages in the vertices of 3D polygon models. Experimental results show that the cover model distortion is very small as the number of hiding layers ranges from 7 to 13 layers. To the best of our knowledge, this novel approach can provide much higher hiding capacity than other state-of-the-art approaches, while obeying the low distortion and security basic requirements for steganography on 3D models.

  14. An Approach to Hide Secret Speech Information

    Institute of Scientific and Technical Information of China (English)

    WU Zhi-jun; DUAN Hai-xin; LI Xing

    2006-01-01

    This paper presented an approach to hide secret speech information in code excited linear prediction(CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information hiding and extracting for the purpose of secure speech communication. The secret speech is coded in 2.4Kb/s mixed excitation linear prediction (MELP), which is embedded in CELP type public speech. The ABS algorithm adopts speech synthesizer in speech coder. Speech embedding and coding are synchronous, i.e. a fusion of speech information data of public and secret. The experiment of embedding 2.4 Kb/s MELP secret speech in G.728 scheme coded public speech transmitted via public switched telephone network (PSTN) shows that the proposed approach satisfies the requirements of information hiding, meets the secure communication speech quality constraints, and achieves high hiding capacity of average 3.2 Kb/s with an excellent speech quality and complicating speakers' recognition.

  15. Embedding Climate Services

    Science.gov (United States)

    Shafer, M.; Boone, M.; Keim, B. D.

    2015-12-01

    With the rapidly-increasing number of climate services providers, the landscape for putting climate into practice is getting both easier to access and more confusing. Each provider serves a different clientele, and in so doing draws more stakeholder organizations into the sphere of those using climate information in decision-making. The challenge has been in connecting these new stakeholders with expertise that may reside within a different provider organization. To help close the gap, the Southern Climate Impacts Planning Program (SCIPP; http://www.southernclimate.org), a NOAA RISA Team, initiated a summer internship program, where students with expertise in meteorology or climatology would work for an organization more closely aligned with another climate services provider network. The format was patterned after the successful NSF-funded Research Experience for Undergraduates (REU) program at the National Weather Center, where students are selected from undergraduate programs across the nation to spend a summer conducting research under a scientific mentor. The SCIPP initiative flipped this model, instead sending students to organizations with operational needs for climate information to work under their mentorship in partnership with SCIPP scientists. Over the past two summers, SCIPP has recruited students to work at landscape-based (Gulf Coast Joint Venture and National Wetlands Research Center) and community-based (Tulsa Partners) organizations. Students worked alongside the organizations' staff on a daily basis and were supported through periodic calls with the SCIPP team to help identify appropriate datasets and work through methodological issues. This presentation will discuss how these relationships were created, the expertise of each of the organizations involved, and outcomes from the projects.

  16. High Capacity Secure Image Steganography Based on Contourlet Transform

    Directory of Open Access Journals (Sweden)

    Kolsoom Shahryari

    2013-09-01

    Full Text Available In this paper we propose an image steganography technique which embeds secret data without making explicit modifications to the image. The proposed method simultaneously provides both imperceptibility and undetectability. We decompose image by contourlet transform and determine nonsmooth regions. Embedding data in these regions cause less degradation in image quality. Contourlet sub-bands are divided into 3×3 blocks. Central coefficient of each block is considered for embedding if they belong to edgy regions. Experiments show that this method can achieve high embedding capacity while remains undetectable by Farid's universal steganalysis technique.

  17. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, Rene Rydhof

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety......-critical applications, a predictable Java processor built with FPGA technology, and an Eclipse based application development environment that binds the profile and the platform together and provides analyses that help to provide evidence that can be used as part of a safety case. This paper summarizes key contributions...

  18. Homogeneous Spaces and Equivariant Embeddings

    CERN Document Server

    Timashev, DA

    2011-01-01

    Homogeneous spaces of linear algebraic groups lie at the crossroads of algebraic geometry, theory of algebraic groups, classical projective and enumerative geometry, harmonic analysis, and representation theory. By standard reasons of algebraic geometry, in order to solve various problems on a homogeneous space it is natural and helpful to compactify it keeping track of the group action, i.e. to consider equivariant completions or, more generally, open embeddings of a given homogeneous space. Such equivariant embeddings are the subject of this book. We focus on classification of equivariant em

  19. Graph Embedding for Pattern Analysis

    CERN Document Server

    Ma, Yunqian

    2013-01-01

    Graph Embedding for Pattern Analysis covers theory methods, computation, and applications widely used in statistics, machine learning, image processing, and computer vision. This book presents the latest advances in graph embedding theories, such as nonlinear manifold graph, linearization method, graph based subspace analysis, L1 graph, hypergraph, undirected graph, and graph in vector spaces. Real-world applications of these theories are spanned broadly in dimensionality reduction, subspace learning, manifold learning, clustering, classification, and feature selection. A selective group of experts contribute to different chapters of this book which provides a comprehensive perspective of this field.

  20. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Hansen, René Rydhof; Ravn, Anders P.;

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety......-critical applications, a predictable Java processor built with FPGA technology, and an Eclipse based application development environment that binds the profile and the platform together and provides analyses that help to provide evidence that can be used as part of a safety case. This paper summarizes key contributions...

  1. Habitual Tastes and Embedded Taste

    DEFF Research Database (Denmark)

    Hedegaard, Liselotte

    2016-01-01

    of the national cuisine indicates continuity over time. There seems, hence, to be a gap between the multiplicity of instances of experience and recollection that belongs to the sphere of the individual and a historical memory embedded in the larger context of a society. From a common-sense perspective, this gap...... may be bridged by story-telling or other ways of handing over historically embedded practices, but this leaves a more fundamental question unanswered. Namely, that given that all remembrance has individual recollection as the point of departure, then how does individual recollection of tastes...

  2. Perturbation Theory of Embedded Eigenvalues

    DEFF Research Database (Denmark)

    Engelmann, Matthias

    We study problems connected to perturbation theory of embedded eigenvalues in two different setups. The first part deals with second order perturbation theory of mass shells in massive translation invariant Nelson type models. To this end an expansion of the eigenvalues w.r.t. fiber parameter up...... project gives a general and systematic approach to analytic perturbation theory of embedded eigenvalues. The spectral deformation technique originally developed in the theory of dilation analytic potentials in the context of Schrödinger operators is systematized by the use of Mourre theory. The group...

  3. Evolution of Deeply Embedded Protostars

    DEFF Research Database (Denmark)

    Frimann, Søren

    of this comparison is both to benchmark the simulations by testing if observational results can be reproduced, and to use the simulations to aid in the interpretation of the observations. The research deals with the earliest stages of star formation – the protostellar phase – where the protostars are still embedded...... tolink evidence of accretion bursts together with evidence of circumstellardisks. The study targets 20 embedded protostars in the Perseusmolecular cloud, and reveals plenty of evidence for variable accretionthrough observations of C18O (an optically thin isotopologue of CO).The study also reveals...

  4. Embedded EZ-Source Inverters

    DEFF Research Database (Denmark)

    Chiang Loh, Poh; Gao, Feng; Blaabjerg, Frede

    2010-01-01

    of embedded EZ-source inverters that can produce the same gain as the Z-source inverters but with smoother and smaller current/voltage maintained across the dc input source and within the impedance network. These latter features are attained without using any additional passive filter, which surely...... is a favorable advantage, since an added filter will raise the system cost and, at times, can complicate the dynamic tuning and resonant consideration of the inverters. The same embedded concept can also be used for designing a full range of voltage- and current-type inverters with each of them tested...

  5. Embedded EZ-Source Inverters

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Loh, Poh Chiang; Gao, F.

    2008-01-01

    -voltage oscillations to the system. Therefore, Z-source inverters are in effect safer and less complex, and can be implemented using only passive elements with no additional active semiconductor needed. Believing in the prospects of Z-source inverters, this paper contributes by introducing a new family of embedded EZ...... since an added filter will raise the system cost, and at times can complicate the dynamic tuning and resonant consideration of the inverters. The same embedded concept can also be used for designing a full range of voltage and current-type inverters with each of them tested experimentally using a number...

  6. NOISE SECURES SECRET DATA! BY ACT AS A REFERENCE FOR EMBEDDING

    Directory of Open Access Journals (Sweden)

    J. Jayaseelan

    2014-03-01

    Full Text Available Data Security is that the most crucial think about a communication network. Data security is achieved by cryptography and data concealing. Steganography is one of the info concealing technique; here any form of signal is concealing by exploitation a picture, audio or video. In an exceedingly spatial domain steganography, most typically the info is embedded into a LSB’s of the cover image pixels. As a result of it maintain the standard of the stego image as like as cover image instead of embedded into MSB’s. To embedding into a LSB’s of cover image (R, G, B plane researchers are using different types of pixel indicating methods, random embedding, edge based embedding in spatial domain or applying completely different reworks in transform domain. In this paper, for spatial domain steganography noise based embedding technique is proposed; it is entirely different from the out there techniques. In this paper two copies of JPEG, PNG, GIF, or BMP etc., images are used. One is taken as a reference image and noise is added onto that. Supported this reference image knowledge is embedded into the LSB’s of cover image. Proposed system using salt and pepper noise for data embedding, it is an ON, OFF noise. Based on added salt, pepper, and no noise portions of reference image completely different range of bits are embedded into the cover image. The result is analyzed by using MSE, PSNR and capacity performance metrics.

  7. Relation between observability and differential embeddings for nonlinear dynamics

    Science.gov (United States)

    Letellier, Christophe; Aguirre, Luis A.; Maquet, Jean

    2005-06-01

    In the analysis of a scalar time series, which lies on an m -dimensional object, a great number of techniques will start by embedding such a time series in a d -dimensional space, with d>m . Therefore there is a coordinate transformation Φs from the original phase space to the embedded one. The embedding space depends on the observable s(t) . In theory, the main results reached are valid regardless of s(t) . In a number of practical situations, however, the choice of the observable does influence our ability to extract dynamical information from the embedded attractor. This may arise in problems in nonlinear dynamics such as model building, control and synchronization. To some degree, ease of success will depend on the choice of the observable simply because it is related to the observability of the dynamics. In this paper the observability matrix for nonlinear systems, which uses Lie derivatives, is revisited. It is shown that such a matrix can be interpreted as the Jacobian matrix of Φs —the map between the original phase space and the differential embedding induced by the observable—thus establishing a link between observability and embedding theory.

  8. A fast video watermarking scheme for embedded device identity verification

    Science.gov (United States)

    Liu, Jun; Hu, Fang; Wang, Jianzong

    2009-08-01

    This paper presents a new fast video watermarking scheme in spatial domain for embedded device identity verification. A binary watermark signal, which is produced by the identity of the embedded device such as the disc video player, is permutated using sequence numbers generated by a secret key. And then it is encoded by Gray code. Each bit of the binary encoded watermark is embedded four times in different positions, by modifying the intensities of a nonoverlapping block of 8*8 of the blue component of the frames in host video. In watermarking extract scheme, the frame of the watermarked video and the original video are decoded to images. And the intensities of a block of 8*8 of all components of the frame images in the watermarked and the original video are compared to calculate the probability of detecting '0' or '1' for extracting binary watermark. Both the embedding and the extraction of watermarks are done in the spatial domain, so the computational cost is low. Then the digital watermark with the identity information is embedded in real time to the video image when the embedded devices play their videos. Experimental results show that the algorithm has obvious low complexity, and the strong robustness against distortion, deleting, and cropping operations.

  9. Capacity-building and Participatory Research Development of a Community-based Nutrition and Exercise Lifestyle Intervention Program (NELIP for Pregnant and Postpartum Aboriginal Women:Information Gathered from Talking Circles.

    Directory of Open Access Journals (Sweden)

    Katie Big-Canoe

    2011-05-01

    Full Text Available Objectives were to gather information from Talking Circles of Aboriginal women who participated in a maternal Nutrition and Exercise Lifestyle Intervention Program (NELIP to identify strategies to bring NELIP into the community. Twelve First Nations women participated. Several main themes were identified regarding health: balance, knowledge/education and time management. Benefits of the NELIP were improvement in health, stamina, stress, and a healthy baby, no gestational diabetes and a successful home birth, with social support as an important contributing factor for success. Suggestions for improvement for the NELIP included group walking, and incorporating more traditional foods into the meal plan. The information gathered is the first step in determining strategies using participatory research and capacity-building to develop a community-based NELIP for pregnant Aboriginal women.

  10. Embedded Systems for Smart Appliances and Energy Management

    CERN Document Server

    Neumann, Peter; Mahlknecht, Stefan

    2013-01-01

    This book provides a comprehensive introduction to embedded systems for smart appliances and energy management, bringing together for the first time a multidisciplinary blend of topics from embedded systems, information technology and power engineering.  Coverage includes challenges for future resource distribution grids, energy management in smart appliances, micro energy generation, demand response management, ultra-low power stand by, smart standby and communication networks in home and building automation.   Provides a comprehensive, multidisciplinary introduction to embedded systems for smart appliances and energy management; Equips researchers and engineers with information required to succeed in designing energy management for smart appliances; Includes coverage of resource distribution grids, energy management in smart appliances, micro energy generation, demand response management, ultra-low power stand by, smart standby and communication networks in home and building automation.  

  11. A Study of Neural Word Embeddings for Named Entity Recognition in Clinical Text

    OpenAIRE

    Wu, Yonghui; Xu, Jun; Jiang, Min; Zhang, Yaoyun; Xu, Hua

    2015-01-01

    Clinical Named Entity Recognition (NER) is a critical task for extracting important patient information from clinical text to support clinical and translational research. This study explored the neural word embeddings derived from a large unlabeled clinical corpus for clinical NER. We systematically compared two neural word embedding algorithms and three different strategies for deriving distributed word representations. Two neural word embeddings were derived from the unlabeled Multiparamete...

  12. Research and Design of Embedded Wireless Meal Ordering System Based on SQLite

    Science.gov (United States)

    Zhang, Jihong; Chen, Xiaoquan

    The paper describes features and internal architecture and developing method of SQLite. And then it gives a design and program of meal ordering system. The system realizes the information interaction among the users and embedded devices with SQLite as database system. The embedded database SQLite manages the data and achieves wireless communication by using Bluetooth. A system program based on Qt/Embedded and Linux drivers realizes the local management of environmental data.

  13. Embedded Wireless Fingerprint Exam Affair Management

    Directory of Open Access Journals (Sweden)

    Yuan Yuan

    2013-01-01

    Full Text Available This thesis studies the design method of fingerprint identification module based on embedded system, which can realize the design of wireless fingerprint examination management system.This method reduces the hardware cost by building hardware environment whose platform is ARM9 microprocessor and MBF200 fingerprint sensor-integrated module. And, under the enviroment of Linux, adopting framework for embedded fingerprint identification system and introducing relevant technology about fingerprint identification, the design of distributed fingerprint identification system could be realized, which is low-cost and reliable. Meanwhile, by combining wireless network communication with Ethernet communication, it can maintain real time data exchanege with central data bank. This system adopts SQL Server database to manage usres baisc information and information data of their fingerprints characteristics and runs reliably. Comprehensive tests and practical application proved that fingerprint images collected by this system are more clear and less fuzzy. After being processed, the outlines of images are clear and have outstanding features, so that it is easy to classify and identify fingerprints. This system could be applied in the management of large-scale examinations and remote network examination. It also improves traditional checking way which identifies person by his holdings, and is the future direction of examination management.

  14. Risk management for the emergency physician: competency and decision-making capacity, informed consent, and refusal of care against medical advice.

    Science.gov (United States)

    Magauran, Brendan G

    2009-11-01

    This article focuses on those times that the emergency physician (EP) and patient do not agree on a treatment option. Attention is placed on the risk management issues relevant to the patient's unexpected choice. Emphasis is placed on determining a patient's competency or capability of making clinical decisions, with particular focus on the EP deciding that patient competency requires a formal evaluation. The EP should have a strategy for assessing clinical decision-making capability and an understanding of what circumstances should act as a trigger for considering such an assessment. Attention to documentation issues around informed consent, common barriers to consent, refusal of care, and ED discharge against medical advice are examined.

  15. Morphware - Fremtidens Embedded System Platform

    DEFF Research Database (Denmark)

    Madsen, Jan

    2006-01-01

    FPGA'er bliver i stigende grad brugt som komponenter i embedded systemer. Faldende priser, større kapacitet og en større felksibilitet har gjort FPGA'en til en attraktiv og konkurrencedygtig teknologi der tillader en stadig stigende grad af system integration, hvor traditionel hardware og software...

  16. Software for Embedded Control Systems

    NARCIS (Netherlands)

    Broenink, Jan F.; Hilderink, Gerald H.; Jovanovic, Dusko S.

    2001-01-01

    The research of our team deals with the realization of control schemes on digital computers. As such the emphasis is on embedded control software implementation. Applications are in the field of mechatronic devices, using a mechatronic design approach (the integrated and optimal design of a mechanic

  17. Simulation and Embedded Smart Control

    DEFF Research Database (Denmark)

    Conrad, Finn; Fan, Zhun; Sørensen, Torben

    2006-01-01

    The paper presents results obtained from a Danish mechatronic research program focusing on intelligent motion control, simulation and embedded smart controllers for hydraulic actuators and robots as well as results from the EU projects. A mechatronic test facility with digital controllers...... and algorithms. Furthermore, a developed IT-tool concept for controller and system design utilizing the ISO 10303 STEP Standard is proposed....

  18. Embedding Sensors During Additive Manufacturing

    Energy Technology Data Exchange (ETDEWEB)

    Sbriglia, Lexey Raylene [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-08-10

    This PowerPoint presentation had the following headings: Fused deposition modeling (FDM); Open source 3D printing; Objectives; Vibration analysis; Equipment; Design; Material choices; Failure causes, such as tension, bubbling; Potential solutions; Simulations; Embedding the sensors; LabView programming; Alternate data acquisition; Problem and proposed solution; and, Conclusions

  19. Embedding Laboratory Experience in Lectures

    Science.gov (United States)

    Morgan, James R.; Barroso, Luciana R.; Simpson, Nancy

    2009-01-01

    Demonstrations can be very effective at enhancing student learning and represent a mechanism for embedding laboratory experiences within a classroom setting. A key component to an effective demonstration is active student engagement throughout the entire process, leading to a guided laboratory experience in a lecture setting. Students are involved…

  20. A high capacity multiple watermarking scheme based on Fourier descriptor and Sudoku

    Science.gov (United States)

    Zhang, Li; Zheng, Huimin

    2015-12-01

    Digital watermark is a type of technology to hide some significant information which is mainly used to protect digital data. A high capacity multiple watermarking method is proposed, which adapts the Fourier descriptor to pre-process the watermarks, while a Sudoku puzzle is used as a reference matrix in embedding process and a key in extraction process. It can dramatically reduce the required capacity by applying Fourier descriptor. Meanwhile, the security of watermarks can be guaranteed due to the Sudoku puzzle. Unlike previous algorithms applying Sudoku puzzle in spatial domain, the proposed algorithm works in transformed domain by applying LWT2.In addition, the proposed algorithm can detect the temper location accurately. The experimental results demonstrated that the goals mentioned above have been achieved.

  1. Embedding Data Stewardship in Geoscience Australia

    Science.gov (United States)

    Bastrakova, I.; Fyfe, S.

    2013-12-01

    Ten years of technological innovation now enable vast amounts of data to be collected, managed, processed and shared. At the same time, organisations have witnessed government legislative and policy requirements for open access to public sector data, and a demand for flexibility in access to data by both machine-to-machine and human consumption. Geoscience Australia (GA) has adopted Data Stewardship as an organisation-wide initiative to improve the way we manage and share our data. The benefits to GA including: - Consolidated understanding of GA's data assets and their value to the Agency; - Recognition of the significant role of data custodianship and data management; - Well-defined governance, policies, standards, practices and accountabilities that promote the accessibility, quality and interoperability of GA's data; - Integration of disparate data sets into cohesive information products available online in real time and equally accessible to researchers, government, industry and the public. Although the theory behind data stewardship is well-defined and accepted and the benefits are generally well-understood, practical implementation requires an organisation to prepare for a long-term commitment of resources, both financial and human. Fundamentally this involves: 1. Raising awareness in the organisation of the need for data stewardship and the challenges this entails; 2. Establishing a data stewardship framework including a data governance office to set policy and drive organisational change; and 3. Embedding the functions and a culture of data stewardship into business as usual operations. GA holds a vast amount of data ranging from petabytes of Big Data to significant quantities of relatively small ';long tail' geoscientific observations and measurements. Over the past four years, GA has undertaken strategic activities that prepare us for Data Stewardship: - Organisation-wide audits of GA's data holdings and identification of custodians for each dataset

  2. Information

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    There are unstructured abstracts (no more than 256 words) and structured abstracts (no more than 480). The specific requirements for structured abstracts are as follows:An informative, structured abstracts of no more than 4-80 words should accompany each manuscript. Abstracts for original contributions should be structured into the following sections. AIM (no more than 20 words): Only the purpose should be included. Please write the aim as the form of "To investigate/ study/..."; MATERIALS AND METHODS (no more than 140 words); RESULTS (no more than 294 words): You should present P values where appropnate and must provide relevant data to illustrate how they were obtained, e.g. 6.92 ± 3.86 vs 3.61 ± 1.67, P< 0.001; CONCLUSION (no more than 26 words).

  3. [Studies on digital watermark embedding intensity against image processing and image deterioration].

    Science.gov (United States)

    Nishio, Masato; Ando, Yutaka; Tsukamoto, Nobuhiro; Kawashima, Hironao

    2004-04-01

    In order to apply digital watermarking to medical imaging, it is required to find a trade-off between strength of watermark embedding and deterioration of image quality. In this study, watermarks were embedded in 4 types of modality images to determine the correlation among the watermarking strength, robustness against image processing, and image deterioration due to embedding. The results demonstrated that watermarks which were embedded by the least significant bit insertion method became unable to be detected and recognized on image processing even if the watermarks were embedded with such strength that could cause image deterioration. On the other hand, watermarks embedded by the Discrete Cosine Transform were clearly detected and recognized even after image processing regardless of the embedding strength. The maximum level of embedding strength that will not affect diagnosis differed depending on the type of modality. It is expected that embedding the patient information together with the facility information as watermarks will help maintain the patient information, prevent mix-ups of the images, and identify the test performing facilities. The concurrent use of watermarking less resistant to image processing makes it possible to detect whether any image processing has been performed or not.

  4. Embedding Affective Learning Outcomes in Library Instruction

    Directory of Open Access Journals (Sweden)

    Ellysa Stern Cahoy

    2012-12-01

    Full Text Available While information literacy in higher education has long been focused on cognitive learning outcomes, attention must be paid to students’ affective, emotional needs throughout the research process. This article identifies models for embedding affective learning outcomes within information literacy instruction, and provides strategies to help librarians discover, articulate, and address students’ self-efficacy, motivation, emotions and attitudes. Worksheets to assist in creating affective learning outcomes are included to bring structure to an area of learning that is often challenging to articulate and measure. Also included in the article are the results of a recent survey of instruction librarians’ familiarity and inclusion of affective learning outcomes within teaching and learning initiatives.

  5. Capacity Building in Land Management

    DEFF Research Database (Denmark)

    Enemark, Stig; Ahene, Rexford

    2003-01-01

    There is a significant need for capacity building in the interdisciplinary area of land management especially in developing countries and countries in transition, to deal with the complex issues of building efficient land information systems and sustainable institutional infrastructures. Capacity...... building in land management is not only a question of establishing a sufficient technological level or sufficient economic resources. It is mainly a question of understanding the interdisciplinary and cross-sectoral nature of land administration systems, and understanding the need for human resource...... development in this area. Furthermore, capacity building should ensure that the focus is on building sound institutions and governance rather than just high-level IT-infrastructures.    This overall approach to capacity building in land management is used for implementing a new land policy reform in Malawi...

  6. Sensor-embedded computers for better life-cycle management

    Science.gov (United States)

    Vadde, Srikanth; Kamarthi, Sagar V.; Gupta, Surendra M.; Zeid, Ibrahim

    2004-12-01

    This research investigates the advantages offered by embedded sensors for cost-effective and environmentally benign product life cycle management for desktop computers. During their use by customers as well as at the end of their lives, Sensor Embedded Computers (SECs) by virtue of sensors embedded in them generate data and information pertaining to the conditions and remaining lives of important components such as hard-drive, motherboard, and power supply unit. A computer monitoring framework is proposed to provide more customer comfort, reduce repair costs and increase the effectiveness of current disassembly practices. The framework consists of SECs, remote monitoring center (RMC), repair/service, disassembly, and disposal centers. The RMC collects dynamic data/information generated by sensors during computer usage as well as static data/information from the original equipment manufacturers (OEMs). The RMC forwards this data/information to the repair/service, disassembly, and disposal centers on need-basis. The knowledge about the condition and remaining life of computer components can be advantageously used for planning repair/service and disassembly operations as well as for building refurbished computers with known expected lives. Simulation model of the framework is built and is evaluated in terms of the following performance measures: average downtime of a computer, average repair/service cost of a computer, average disassembly cost of a computer, and average life cycle cost of a computer. Test results show that embedding sensors in computers provides a definite advantage over conventional computers in terms of the performance measures.

  7. Model-based application development for massively parallel embedded systems

    NARCIS (Netherlands)

    Jacobs, Johannes Wilhelmus Maria

    2008-01-01

    The development of embedded systems in information-rich contexts is governed by some intertwined trends. The increase of both volume of data to be processed and the related processing functionality feeds the growing complexity of applications. Independently, the processing hardware that is needed to

  8. Learning styles and embedded training: a case study

    Energy Technology Data Exchange (ETDEWEB)

    Stoddard, M.L.

    1985-01-01

    The purpose of this paper is to describe user behavior with fixed-format and context-sensitive help that has been implemented on a personnel information system at Los Alamos National Laboratory and to suggest that user learning style is a key determinant for the design of embedded training.

  9. Transforming Teaching and Learning: Embedding ICT into Everyday Classroom Practices

    Science.gov (United States)

    Sutherland, R.; Armstrong, V.; Barnes, S.; Brawn, R.; Breeze, N.; Gall, M.; Matthewman, S.; Olivero, F.; Taylor, A.; Triggs, P.; Wishart, J.; John, P.

    2004-01-01

    Drawing on socio-cultural theory, this paper describes how teams of teachers and researchers have developed ways of embedding information and communications technology (ICT) into everyday classroom practices to enhance learning. The focus is on teaching and learning across a range of subjects: English, history, geography, mathematics, modern…

  10. Embedding Marketing in International Campus Development: Lessons from UK Universities

    Science.gov (United States)

    Lewis, Vicky

    2016-01-01

    This paper provides recommendations for embedding a market- and marketing-informed approach within the development process for a new international campus. It includes a brief outline of the current global profile of international campuses (as one form of transnational education) before highlighting the role of marketing at key stages of campus…

  11. Density Matrix Embedding: A Strong-Coupling Quantum Embedding Theory.

    Science.gov (United States)

    Knizia, Gerald; Chan, Garnet Kin-Lic

    2013-03-12

    We extend our density matrix embedding theory (DMET) [Phys. Rev. Lett.2012, 109, 186404] from lattice models to the full chemical Hamiltonian. DMET allows the many-body embedding of arbitrary fragments of a quantum system, even when such fragments are open systems and strongly coupled to their environment (e.g., by covalent bonds). In DMET, empirical approaches to strong coupling, such as link atoms or boundary regions, are replaced by a small, rigorous quantum bath designed to reproduce the entanglement between a fragment and its environment. We describe the theory and demonstrate its feasibility in strongly correlated hydrogen ring and grid models; these are not only beyond the scope of traditional embeddings but even challenge conventional quantum chemistry methods themselves. We find that DMET correctly describes the notoriously difficult symmetric dissociation of a 4 × 3 hydrogen atom grid, even when the treated fragments are as small as single hydrogen atoms. We expect that DMET will open up new ways of treating complex strongly coupled, strongly correlated systems in terms of their individual fragments.

  12. Capacity Statement for Railways

    DEFF Research Database (Denmark)

    Landex, Alex

    2007-01-01

    The subject “Railway capacity” is a combination of the capacity consumption and how the capacity is utilized. The capacity utilization of railways can be divided into 4 core elements: The number of trains; the average speed; the heterogeneity of the operation; and the stability. This article...... describes how the capacity consumption for railways can be worked out and analytical measurements of how the capacity is utilized. Furthermore, the article describes how it is possible to state and visualize railway capacity. Having unused railway capacity is not always equal to be able to operate more...

  13. On Embeddings of Tori in Euclidean Spaces

    Institute of Scientific and Technical Information of China (English)

    Matija CENCELJ; Du(s)an REPOV(S)

    2005-01-01

    Using the relation between the set of embeddings of tori into Euclidean spaces modulo ambient isotopies and the homotopy groups of Stiefel manifolds, we prove new results on embeddings of tori into Euclidean spaces.

  14. Digital Libraries with Embedded Values: Combining Insights from LIS and Science and Technology Studies

    Science.gov (United States)

    Fleischmann, Kenneth R.

    2007-01-01

    In the digital age, libraries are increasingly being augmented or even replaced by information technology (IT), which is often accompanied by implicit assumptions of objectivity and neutrality, yet the field of science and technology studies (STS) has a long history of studying what values are embedded in IT and how they are embedded. This article…

  15. Digital Libraries with Embedded Values: Combining Insights from LIS and Science and Technology Studies

    Science.gov (United States)

    Fleischmann, Kenneth R.

    2007-01-01

    In the digital age, libraries are increasingly being augmented or even replaced by information technology (IT), which is often accompanied by implicit assumptions of objectivity and neutrality, yet the field of science and technology studies (STS) has a long history of studying what values are embedded in IT and how they are embedded. This article…

  16. The Mekong Fish Network: expanding the capacity of the people and institutions of the Mekong River Basin to share information and conduct standardized fisheries monitoring

    Science.gov (United States)

    Patricio, Harmony C.; Ainsley, Shaara M.; Andersen, Matthew E.; Beeman, John W.; Hewitt, David A.

    2012-01-01

    The Mekong River is one of the most biologically diverse rivers in the world, and it supports the most productive freshwater fisheries in the world. Millions of people in the Lower Mekong River Basin (LMB) countries of the Union of Myanmar (Burma), Lao People’s Democratic Republic, the Kingdom of Thailand, the Kingdom of Cambodia, and the Socialist Republic of Vietnam rely on the fisheries of the basin to provide a source of protein. The Mekong Fish Network Workshop was convened in Phnom Penh, Cambodia, in February 2012 to discuss the potential for coordinating fisheries monitoring among nations and the utility of establishing standard methods for short- and long-term monitoring and data sharing throughout the LMB. The concept for this network developed out of a frequently cited need for fisheries researchers in the LMB to share their knowledge with other scientists and decisionmakers. A fish monitoring network could be a valuable forum for researchers to exchange ideas, store data, or access general information regarding fisheries studies in the LMB region. At the workshop, representatives from governments, nongovernmental organizations, and universities, as well as participating foreign technical experts, cited a great need for more international cooperation and technical support among them. Given the limited staff and resources of many institutions in the LMB, the success of the proposed network would depend on whether it could offer tools that would provide benefits to network participants. A potential tool discussed at the workshop was a user-friendly, Web-accessible portal and database that could help streamline data entry and storage at the institutional level, as well as facilitate communication and data sharing among institutions. The workshop provided a consensus to establish pilot standardized data collection and database efforts that will be further reviewed by the workshop participants. Overall, workshop participants agreed that this is the type of

  17. Requirements Specifications Checking of Embedded Real-Time Software

    Institute of Scientific and Technical Information of China (English)

    WU Guoqing(毋国庆); SHU Fengdi(舒风笛); WANG Min(王敏); CHEN Weiqing(陈伟清)

    2002-01-01

    After introducing the overview of our requirements description model HRFSM,the paper presents a dynamic software execution model (DERTS) of embedded real-time software, which can integrate control flow, data flow and time. Based on DERTS, a checking method is also presented. It consists of three kinds of checking and can check the consistency and completeness of the requirement specifications of embedded real-time software. Besides providing information helpful to improve the efficiency of analyzing and checking specifications,the checking method is flexible, and easy to understand and to use for the analyst.

  18. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  19. Efficient Measurement of Multiparticle Entanglement with Embedding Quantum Simulator.

    Science.gov (United States)

    Chen, Ming-Cheng; Wu, Dian; Su, Zu-En; Cai, Xin-Dong; Wang, Xi-Lin; Yang, Tao; Li, Li; Liu, Nai-Le; Lu, Chao-Yang; Pan, Jian-Wei

    2016-02-19

    The quantum measurement of entanglement is a demanding task in the field of quantum information. Here, we report the direct and scalable measurement of multiparticle entanglement with embedding photonic quantum simulators. In this embedding framework [R. Di Candia et al. Phys. Rev. Lett. 111, 240502 (2013)], the N-qubit entanglement, which does not associate with a physical observable directly, can be efficiently measured with only two (for even N) and six (for odd N) local measurement settings. Our experiment uses multiphoton quantum simulators to mimic dynamical concurrence and three-tangle entangled systems and to track their entanglement evolutions.

  20. Sustaining librarian vitality: embedded librarianship model for health sciences libraries.

    Science.gov (United States)

    Wu, Lin; Mi, Misa

    2013-01-01

    With biomedical information widely accessible from anywhere at any time, health sciences libraries have become less centralized, and they are challenged to stay relevant and vital to the mission and strategic goals of their home institution. One solution is to embed librarians at strategic points in health professions' education, research, and patient care. This article discusses a proposed five-level model of embedded librarianship within the context of health sciences libraries and describes different roles, knowledge, and skills desirable for health sciences librarians working as embedded librarians.

  1. Embedding complementarity in HCI methods

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Levinsen, Karin

    2007-01-01

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...... in the techniques and the tools that we apply. We lack a framework for discussing what and who we are, when we talk about a person as the user of an ICT system that has to be designed, developed and implemented. As a framework, we suggest a theory of complementary positions that insists on solid accounts from all...... observer posi-tions in relation to perspective, standpoint and focus. We need to develop com-plementary theories that embed complexity, and we need to reflect critically upon forty years of dominance by rationalistic, empirical understandings of the user as illustrated in the literature and practice within...

  2. Approximately Counting Embeddings into Random Graphs

    CERN Document Server

    Furer, Martin

    2008-01-01

    Let H be a graph, and let C(H,G) be the number of (subgraph isomorphic) copies of H contained in a graph G. We investigate the fundamental problem of estimating C(H,G). Previous results cover only a few specific instances of this general problem, for example, the case when H has degree at most one (monomer-dimer problem). In this paper, we present the first general subcase of the subgraph isomorphism counting problem which is almost always efficiently approximable. The results rely on a new graph decomposition technique. Informally, the decomposition is a labeling of the vertices generating a sequence of bipartite graphs. The decomposition permits us to break the problem of counting embeddings of large subgraphs into that of counting embeddings of small subgraphs. Using this method, we present a simple randomized algorithm for the counting problem. For all decomposable graphs H and all graphs G, the algorithm is an unbiased estimator. Furthermore, for all graphs H having a decomposition where each of the bipa...

  3. Characterization of Embedded BPM Collimators

    CERN Document Server

    VALENTINO, Gianluca

    2015-01-01

    During LS1, 16 tertiary collimators (TCTs) and 2 secondary collimators (TCSGs) in IR6 were replaced by new embedded BPM collimators. The BPM functionality allows the possibility to align the collimators more quickly and therefore be able to respond faster to machine configuration changes, as well as a direct monitoring of the beam orbit at the collimators. Following an initial commissioning phase, an MD was carried out to test the new collimators and acquisition electronics with beam in the LHC.

  4. Cybersecurity of embedded computers systems

    OpenAIRE

    Carlioz, Jean

    2016-01-01

    International audience; Several articles have recently raised the issue of computer security of commercial flights by evoking the "connected aircraft, hackers target" or "Wi-Fi on planes, an open door for hackers ? " Or "Can you hack the computer of an Airbus or a Boeing ?". The feared scenario consists in a takeover of operational aircraft software that intentionally cause an accident. Moreover, several computer security experts have lately announced they had detected flaws in embedded syste...

  5. Fundamental cycles and graph embeddings

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    In this paper, we investigate fundamental cycles in a graph G and their relations with graph embeddings. We show that a graph G may be embedded in an orientable surface with genus at least g if and only if for any spanning tree T , there exists a sequence of fundamental cycles C1, C2, . . . , C2g with C2i-1 ∩ C2i≠ф for 1≤ i ≤g. In particular, among β(G) fundamental cycles of any spanning tree T of a graph G, there are exactly 2γM (G) cycles C1, C2, . . . , C2γM (G) such that C2i-1 ∩ C2i≠ф for 1 ≤i≤γM (G), where β(G) and γM (G) are the Betti number and the maximum genus of G, respectively. This implies that it is possible to construct an orientable embedding with large genus of a graph G from an arbitrary spanning tree T (which may have very large number of odd components in G\\E(T )). This is different from the earlier work of Xuong and Liu, where spanning trees with small odd components are needed. In fact, this makes a common generalization of Xuong, Liu and Fu et al. Furthermore, we show that (1) this result is useful for locating the maximum genus of a graph having a specific edge-cut. Some known results for embedded graphs are also concluded; (2) the maximum genus problem may be reduced to the maximum matching problem. Based on this result and the algorithm of Micali-Vazirani, we present a new efficient algorithm to determine the maximum genus of a graph in O((β(G)) 25 ) steps. Our method is straight and quite different from the algorithm of Furst, Gross and McGeoch which depends on a result of Giles where matroid parity method is needed.

  6. Strengthen the innovation of agricultural information technology and service capacity of public service information%加强农业信息科技创新与公益信息服务能力的思考

    Institute of Scientific and Technical Information of China (English)

    刘 珺

    2012-01-01

    农业信息科技创新是促进现代农业发展、增加农民收入的重要途径,在农业科技中具有重要的引领和支撑作用。要大力加强农业信息技术的创新,提升农业社会化公共信息服务能力。%The innovation of agricultural information technology which plays an important role on leading and supporting in agricultural science and technology is an important way to promote the development of modem agriculture and to increase farmers' income. We should vigorously strengthen the innovations in agricultal information technology, to enhance capability of public information service for the socialization of agriculture.

  7. Probe into the Strategies for Optimizing the Embedded Service Capacity of University Librarys in the Era of Big Data%大数据时代高校图书馆嵌入式服务能力优化策略探讨

    Institute of Scientific and Technical Information of China (English)

    霍东燕

    2015-01-01

    分析了大数据时代高校图书馆面临的问题,探讨了高校图书馆应对大数据挑战的思路,阐述了高校图书馆在运用嵌入式理论优化其运作系统的过程中应采取的策略。%This paper analyzes some problems faced by university library in the era of big data, probes into the ideas of university library for approaching challenges of the big data era, and expounds the strategies that should be taken by university library in the course of optimizing its operation system by using the embedded theory.

  8. Embedding initial data for black hole collisions

    CERN Document Server

    Romano, J D; Romano, Joseph D; Price, Richard H

    1994-01-01

    We discuss isometric embedding diagrams for the visualization of initial data for the problem of the head-on collision of two black holes. The problem of constructing the embedding diagrams is explicitly presented for the best studied initial data, the Misner geometry. We present a partial solution of the embedding diagrams and discuss issues related to completing the solution.

  9. Embedded Services in Chinese Academic Libraries

    Science.gov (United States)

    Si, Li; Xing, Wenming; Zhou, Limei; Liu, Sha

    2012-01-01

    Embedded librarianship service describes the practice of librarians integrating actively into the user's environment, rather than remaining in the library to await requests for service. This paper examines the concept of embedded service in the recent literature, within the past 5 years. It reports on a survey of embedded service in Chinese…

  10. Absorptive capacity and smart companies

    Directory of Open Access Journals (Sweden)

    Patricia Moro González

    2014-12-01

    Full Text Available Purpose: The current competitive environment is substantially modifying the organizations’ learning processes due to a global increase of available information allowing this to be transformed into knowledge. This opportunity has been exploited since the nineties by the tools of “Business Analytics” and “Business Intelligence” but, nevertheless, being integrated in the study of new organizational capacities engaged in the process of creating intelligence inside organizations is still an outstanding task. The review of the concept of absorptive capacity and a detailed study from the perspective of this new reality will be the main objective of study of this paper.Design/methodology/approach: By comparing classical absorptive capacity and absorptive capacity from the point of view of information management tools in each one of the three stages of the organizational learning cycle, some gaps of the former are overcome/fulfilled. The academic/bibliographical references provided in this paper have been obtained from ISI web of knowledge, Scopus and Dialnet data bases, supporting the state of affairs on absorptive capacity and thereafter filtering by "Business Intelligence" and "Business Analytics". Specialized websites and Business Schools` Publications there have also been included, crowning the content on information management tools used that are currently used in the strategic consulting.Findings: Our contribution to the literature is the development of "smart absorptive capacity". This is a new capacity emerging from the reformulation of the classical concept of absorptive capacity wherein some aspects of its definition that might have been omitted are emphasized. The result of this new approach is the creation of a new Theoretical Model of Organizational Intelligence, which aims to explain, within the framework of the Resources and Capabilities Theory, the competitive advantage achieved by the so-called smart companies

  11. Virtually embedded the librarian in an online environment

    CERN Document Server

    McCaffrey, Erin

    2014-01-01

    The rise of online education at institutions of higher learning, together with the increasing cost of higher education, lead some to suggest that online (or distance) education will eventually become the dominant form of higher learning. This has particular significance for librarians. This casebook, a blueprint for embedding academic librarians in online environments, from undergraduate to science-based graduate schools to MOOCs is the first to explore how librarians can play a key role in the virtual academic landscape. The authors, academic librarians representing a broad range of colleges and universities, look at the evolution of the embedded librarian from physical to virtual, suggest how to develop and implement unique programs in and out of the classroom, and explain how to scale programs once they are embedded. This book is suitable for professional collections in academic libraries of all sizes and types. It is also suitable for collections in schools of library and information science.

  12. Semi-supervised Graph Embedding Approach to Dynamic Link Prediction

    CERN Document Server

    Hisano, Ryohei

    2016-01-01

    We propose a simple discrete time semi-supervised graph embedding approach to link prediction in dynamic networks. The learned embedding reflects information from both the temporal and cross-sectional network structures, which is performed by defining the loss function as a weighted sum of the supervised loss from past dynamics and the unsupervised loss of predicting the neighborhood context in the current network. Our model is also capable of learning different embeddings for both formation and dissolution dynamics. These key aspects contributes to the predictive performance of our model and we provide experiments with three real--world dynamic networks showing that our method is comparable to state of the art methods in link formation prediction and outperforms state of the art baseline methods in link dissolution prediction.

  13. Secrecy Capacity Region of Fading Broadcast Channels

    CERN Document Server

    Liang, Yingbin; Shamai, Shlomo

    2007-01-01

    The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1. The confidential information needs to be kept as secret as possible from receiver 2. The channel state information (CSI) is assumed to be known at both the transmitter and the receivers. The secrecy capacity region is first established for the parallel Gaussian BCC, and the optimal source power allocations that achieve the boundary of the secrecy capacity region are derived. In particular, the secrecy capacity region is established for the Gaussian case of the Csiszar-Korner BCC model. The secrecy capacity results are then applied to give the ergodic secrecy capacity region for the fading BCC.

  14. Isometric embeddings in cosmology and astrophysics

    Indian Academy of Sciences (India)

    Gareth Amery; Jothi Moodley; James Paul Londal

    2011-09-01

    Recent interest in higher-dimensional cosmological models has prompted some signifi-cant work on the mathematical technicalities of how one goes about embedding spacetimes into some higher-dimensional space. We survey results in the literature (existence theorems and simple explicit embeddings); briefly outline our work on global embeddings as well as explicit results for more complex geometries; and provide some examples. These results are contextualized physically, so as to provide a foundation for a detailed commentary on several key issues in the field such as: the meaning of `Ricci equivalent’ embeddings; the uniqueness of local (or global) embeddings; symmetry inheritance properties; and astrophysical constraints.

  15. A Low-Cost Remote Healthcare Monitor System Based on Embedded Server

    Directory of Open Access Journals (Sweden)

    He Liu

    2013-04-01

    Full Text Available In the paper, we propose a scheme about a low-cost remote healthcare monitor system based on embedded server between home and hospital. In the scheme, we design an embedded server based on an ARM9 microprocessor. The embedded server supplies all kinds of interfaces such as GPIO interfaces, serial interfaces. These interfaces can acquire all kinds of physiology signals such as Electrocardiograph, heart rate, respiration wave, blood pressure, oxygen saturation, body temperature and so on through connecting the sensor modules. The network is based on local area network and adopts the Browser/Server model. Each home with an embedded server is as a server endpoint and the hospital is as a Browser endpoint. Every embedded server owns an independent static internet protocol address. The doctors can easily acquire patients’ physiology information through writing patients’ internet protocol address on any computer browser. The embedded server can store patients’ physiology information using database in an 8 GB SD card. The doctor can download the database information into the local computers. The system can conveniently upgrade all software in the embedded server only on a remote hospital computer. The remote healthcare monitor system based on embedded server has advantages of low-cost, convenience and feasibility.

  16. Embedding Color Watermarks in Color Images

    Directory of Open Access Journals (Sweden)

    Wu Tung-Lin

    2003-01-01

    Full Text Available Robust watermarking with oblivious detection is essential to practical copyright protection of digital images. Effective exploitation of the characteristics of human visual perception to color stimuli helps to develop the watermarking scheme that fills the requirement. In this paper, an oblivious watermarking scheme that embeds color watermarks in color images is proposed. Through color gamut analysis and quantizer design, color watermarks are embedded by modifying quantization indices of color pixels without resulting in perceivable distortion. Only a small amount of information including the specification of color gamut, quantizer stepsize, and color tables is required to extract the watermark. Experimental results show that the proposed watermarking scheme is computationally simple and quite robust in face of various attacks such as cropping, low-pass filtering, white-noise addition, scaling, and JPEG compression with high compression ratios.

  17. Embedded random matrix ensembles in quantum physics

    CERN Document Server

    Kota, V K B

    2014-01-01

    Although used with increasing frequency in many branches of physics, random matrix ensembles are not always sufficiently specific to account for important features of the physical system at hand. One refinement which retains the basic stochastic approach but allows for such features consists in the use of embedded ensembles.  The present text is an exhaustive introduction to and survey of this important field. Starting with an easy-to-read introduction to general random matrix theory, the text then develops the necessary concepts from the beginning, accompanying the reader to the frontiers of present-day research. With some notable exceptions, to date these ensembles have primarily been applied in nuclear spectroscopy. A characteristic example is the use of a random two-body interaction in the framework of the nuclear shell model. Yet, topics in atomic physics, mesoscopic physics, quantum information science and statistical mechanics of isolated finite quantum systems can also be addressed using these ensemb...

  18. A Literary Study on Embedding Therapy

    Directory of Open Access Journals (Sweden)

    Kwang-Ho Lee

    2003-12-01

    Full Text Available Background : This study focuses on a new acupuncture method of embedding method which inserts a substance on the acupuncture points for continuous stimulation. Clinical applications and cautions were examined through literary investigations. Results : Based on the literary consideration of embedding method, the following results were obtained: 1. Embedding method is a combination of traditional and embedding technique to provide longer duration of stimulation on the acupuncture points. 2. To administer the embedding method, one needs to utilize a embedding thread besides acupuncture apparatus. Sheep gut is commonly used in China and the surgical thread is the choice in Korea. 3. Embedding method may vary from the patient to patient, depending on the nature and location of the illness. Piercing, embedding, and tying are some of the possibilities. 4. Embedding method may have different arrangement of threads based on the choice of usage. 5. Embedding method is effective for various chronic illnesses such as aches, functional diseases, and the diseases of internal organs. 6. When using the embedding methods, cautions against infection and side effects due to strong stimulation are mandatory.

  19. Architecture design of a virtualized embedded system

    Directory of Open Access Journals (Sweden)

    A.Sbaa

    2013-01-01

    Full Text Available Nowadays, embedded systems have become a major driver of technological developments particularly in the industrial sector. In an embedded system, the hardware and software components are so intertwined that evolution is often a big issue. Thanks to the contributions of virtualization it is possible to design more flexible and scalable embedded systems. In fact, virtualization adds an abstraction layer between the hardware and the software to make it less intimately dependent. In this paper we propose system architecture based on embedded virtualization that will be modeled by the multi-agent systems. In the first part, we will discuss the state of the art with respect to embedded systems, multi-agent systems and the concept of virtualization. In the second part, we explain theissues related to traditional embedded systems and the constraints associated with their architecture. Subsequently, we propose a virtualization based architecture for embedded systems. In the last part we will showcase this architecture through a prototype.

  20. Embedded multiple description coding of video.

    Science.gov (United States)

    Verdicchio, Fabio; Munteanu, Adrian; Gavrilescu, Augustin I; Cornelis, Jan; Schelkens, Peter

    2006-10-01

    Real-time delivery of video over best-effort error-prone packet networks requires scalable erasure-resilient compression systems in order to 1) meet the users' requirements in terms of quality, resolution, and frame-rate; 2) dynamically adapt the rate to the available channel capacity; and 3) provide robustness to data losses, as retransmission is often impractical. Furthermore, the employed erasure-resilience mechanisms should be scalable in order to adapt the degree of resiliency against transmission errors to the varying channel conditions. Driven by these constraints, we propose in this paper a novel design for scalable erasure-resilient video coding that couples the compression efficiency of the open-loop architecture with the robustness provided by multiple description coding. In our approach, scalability and packet-erasure resilience are jointly provided via embedded multiple description scalar quantization. Furthermore, a novel channel-aware rate-allocation technique is proposed that allows for shaping on-the-fly the output bit rate and the degree of resiliency without resorting to channel coding. As a result, robustness to data losses is traded for better visual quality when transmission occurs over reliable channels, while erasure resilience is introduced when noisy links are involved. Numerical results clearly demonstrate the advantages of the proposed approach over equivalent codec instantiations employing 1) no erasure-resilience mechanisms, 2) erasure-resilience with nonscalable redundancy, or 3) data-partitioning principles.

  1. Discontinuous symplectic capacities

    NARCIS (Netherlands)

    Zehmisch, K.; Ziltener, F.J.

    2014-01-01

    We show that the spherical capacity is discontinuous on a smooth family of ellipsoidal shells. Moreover, we prove that the shell capacity is discontinuous on a family of open sets with smooth connected boundaries.

  2. Responsibility and Capacities

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2014-01-01

    That responsible moral agency presupposes certain mental capacities, constitutes a widely accepted view among theorists. Moreover, it is often assumed that degrees in the development of the relevant capacities co-vary with degrees of responsibility. In this article it is argued that, the move from...... the view that responsibility requires certain mental capacities to the position that degrees of responsibility co-vary with degrees of the development of the mental capacities, is premature....

  3. An embedded Video Transmission System Based on H.264

    Institute of Scientific and Technical Information of China (English)

    GAO Jing-min; LAN Ya-zhu

    2009-01-01

    In this paper,an embedded Video Transmission System based on H.264 is proposed.In this system,the latest video compression standards-H.264 is used as video codec algorithm,the i.mx27 is used as the center processors of the system,embedded Linux is used as the operating system and RTP/UDP is used as the network transmission protocol.The paper introduces the design way and the frame of the system.The test results of the system show that the proposed system can support good quality transmission of the video information.The parameters with the transmission are D1,720*480,30fps and 4Mbps.In addition,in order to ensure the security of the video information in the transmission,the system provides the encryption to the information in the process of compressing.

  4. Multipole moments for embedding potentials

    DEFF Research Database (Denmark)

    Nørby, Morten Steen; Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2016-01-01

    Polarizable quantum mechanical (QM)/molecular mechanics (MM)-embedding methods are currently among the most promising methods for computationally feasible, yet reliable, production calculations of localized excitations and molecular response properties of large molecular complexes, such as proteins...... extended with site polarizabilities including internal charge transfer terms. We present a new way of dealing with well-known problems in relation to the use of basis sets with diffuse functions in conventional atomic allocation algorithms, avoiding numerical integration schemes. Using this approach, we...

  5. Testing Complex and Embedded Systems

    CERN Document Server

    Pries, Kim H

    2010-01-01

    Many enterprises regard system-level testing as the final piece of the development effort, rather than as a tool that should be integrated throughout the development process. As a consequence, test teams often execute critical test plans just before product launch, resulting in much of the corrective work being performed in a rush and at the last minute. Presenting combinatorial approaches for improving test coverage, Testing Complex and Embedded Systems details techniques to help you streamline testing and identify problems before they occur--including turbocharged testing using Six Sigma and

  6. Professional Windows Embedded Compact 7

    CERN Document Server

    Phung, Samuel; Joubert, Thierry; Hall, Mike

    2011-01-01

    Learn to program an array of customized devices and solutions As a compact, highly efficient, scalable operating system, Windows Embedded Compact 7 (WEC7) is one of the best options for developing a new generation of network-enabled, media-rich, and service-oriented devices. This in-depth resource takes you through the benefits and capabilities of WEC7 so that you can start using this performance development platform today. Divided into several major sections, the book begins with an introduction and then moves on to coverage of OS design, application development, advanced application developm

  7. CDMA systems capacity engineering

    CERN Document Server

    Kim, Kiseon

    2004-01-01

    This new hands-on resource tackles capacity planning and engineering issues that are crucial to optimizing wireless communication systems performance. Going beyond the system physical level and investigating CDMA system capacity at the service level, this volume is the single-source for engineering and analyzing systems capacity and resources.

  8. Quantum Reading Capacity

    CERN Document Server

    Pirandola, Stefano; Giovannetti, Vittorio; Mancini, Stefano; Braunstein, Samuel L

    2011-01-01

    The readout of a classical memory can be modelled as a problem of quantum channel discrimination, where a decoder retrieves information by distinguishing the different quantum channels encoded in each cell of the memory [S. Pirandola, Phys. Rev. Lett. 106, 090504 (2011)]. In the case of optical memories, such as CDs and DVDs, this discrimination involves lossy bosonic channels and can be remarkably boosted by the use of nonclassical light (quantum reading). Here we generalize these concepts by extending the model of memory from single-cell to multi-cell encoding. In general, information is stored in a block of cells by using a channel-codeword, i.e., a sequence of channels chosen according to a classical code. Correspondingly, the readout of data is realized by a process of "parallel" channel discrimination, where the entire block of cells is probed simultaneously and decoded via an optimal collective measurement. In the limit of an infinite block we define the quantum reading capacity of the memory, quantify...

  9. Strategic analytics: towards fully embedding evidence in healthcare decision-making.

    Science.gov (United States)

    Garay, Jason; Cartagena, Rosario; Esensoy, Ali Vahit; Handa, Kiren; Kane, Eli; Kaw, Neal; Sadat, Somayeh

    2015-01-01

    Cancer Care Ontario (CCO) has implemented multiple information technology solutions and collected health-system data to support its programs. There is now an opportunity to leverage these data and perform advanced end-to-end analytics that inform decisions around improving health-system performance. In 2014, CCO engaged in an extensive assessment of its current data capacity and capability, with the intent to drive increased use of data for evidence-based decision-making. The breadth and volume of data at CCO uniquely places the organization to contribute to not only system-wide operational reporting, but more advanced modelling of current and future state system management and planning. In 2012, CCO established a strategic analytics practice to assist the agency's programs contextualize and inform key business decisions and to provide support through innovative predictive analytics solutions. This paper describes the organizational structure, services and supporting operations that have enabled progress to date, and discusses the next steps towards the vision of embedding evidence fully into healthcare decision-making. Copyright © 2014 Longwoods Publishing.

  10. Enhancing public sectors’ capacity for inclusive economic participation of disabled youth in rural communities

    Directory of Open Access Journals (Sweden)

    Lieketseng Ned

    2016-02-01

    Full Text Available Background: The capacity of service providers in the public sector to deliver inclusive services is essential to implement strategies that will allow the full participation of disabled youth in development opportunities in the rural context. Objective: The article sets to describe the capacity of service providers in facilitating participation of disabled youth in economic development opportunities. Method: An instrumental, embedded single case study informed the research design. The sample consisted of five disabled youth, four family members as well as six service providers. Data was gathered through in-depth individual interviews and focus group discussions. Data analysis was done inductively and thematically. In the discussion, the interpretation used organisational capacity elements as a framework. Findings: The theme on service providers indicates their understanding of disability as still a multifaceted and a challenging issue with different orientations to service delivery based on understanding of impairment and disability. There is a dominant focus on impairment and negative attitudes. Discussion: An asset building approach could facilitate awareness of capacities of disabled youth and thus shift negative attitudes to an enabling attitude. The vague strategies for youth and women that are described as inclusive are a misrepresentation of the reality of experiences of disabled youth. Conclusion: An appreciative process of facilitating a holistic understanding of the needs of disabled people is needed to assist service providers to reconceptualise disability within an expansive framework.

  11. Testing framework for embedded languages

    Science.gov (United States)

    Leskó, Dániel; Tejfel, Máté

    2012-09-01

    Embedding a new programming language into an existing one is a widely used technique, because it fastens the development process and gives a part of a language infrastructure for free (e.g. lexical, syntactical analyzers). In this paper we are presenting a new advantage of this development approach regarding to adding testing support for these new languages. Tool support for testing is a crucial point for a newly designed programming language. It could be done in the hard way by creating a testing tool from scratch, or we could try to reuse existing testing tools by extending them with an interface to our new language. The second approach requires less work, and also it fits very well for the embedded approach. The problem is that the creation of such interfaces is not straightforward at all, because the existing testing tools were mostly not designed to be extendable and to be able to deal with new languages. This paper presents an extendable and modular model of a testing framework, in which the most basic design decision was to keep the - previously mentioned - interface creation simple and straightforward. Other important aspects of our model are the test data generation, the oracle problem and the customizability of the whole testing phase.

  12. Drilling azimuth gamma embedded design

    Directory of Open Access Journals (Sweden)

    Zhou Yi Ren

    2016-01-01

    Full Text Available Embedded drilling azimuth gamma design, the use of radioactive measuring principle embedded gamma measurement while drilling a short section analysis. Monte Carlo method, in response to the density of horizontal well logging numerical simulation of 16 orientation, the orientation of horizontal well analysed, calliper, bed boundary location, space, different formation density, formation thickness, and other factors inclined strata dip the impact by simulating 137Cs sources under different formation conditions of the gamma distribution, to determine the orientation of drilling density tool can detect window size and space, draw depth of the logging methods. The data 360° azimuth imaging, image processing method to obtain graph, display density of the formation, dip and strata thickness and other parameters, the logging methods obtain real-time geo-steering. To establish a theoretical basis for the orientation density logging while drilling method implementation and application of numerical simulation in-depth study of the MWD azimuth and density log response factors of horizontal wells.

  13. Flexible Architecture for FPGAs in Embedded Systems

    Science.gov (United States)

    Clark, Duane I.; Lim, Chester N.

    2012-01-01

    Commonly, field-programmable gate arrays (FPGAs) being developed in cPCI embedded systems include the bus interface in the FPGA. This complicates the development because the interface is complicated and requires a lot of development time and FPGA resources. In addition, flight qualification requires a substantial amount of time be devoted to just this interface. Another complication of putting the cPCI interface into the FPGA being developed is that configuration information loaded into the device by the cPCI microprocessor is lost when a new bit file is loaded, requiring cumbersome operations to return the system to an operational state. Finally, SRAM-based FPGAs are typically programmed via specialized cables and software, with programming files being loaded either directly into the FPGA, or into PROM devices. This can be cumbersome when doing FPGA development in an embedded environment, and does not have an easy path to flight. Currently, FPGAs used in space applications are usually programmed via multiple space-qualified PROM devices that are physically large and require extra circuitry (typically including a separate one-time programmable FPGA) to enable them to be used for this application. This technology adds a cPCI interface device with a simple, flexible, high-performance backend interface supporting multiple backend FPGAs. It includes a mechanism for programming the FPGAs directly via the microprocessor in the embedded system, eliminating specialized hardware, software, and PROM devices and their associated circuitry. It has a direct path to flight, and no extra hardware and minimal software are required to support reprogramming in flight. The device added is currently a small FPGA, but an advantage of this technology is that the design of the device does not change, regardless of the application in which it is being used. This means that it needs to be qualified for flight only once, and is suitable for one-time programmable devices or an application

  14. Dissecting psychiatric spectrum disorders by generative embedding.

    Science.gov (United States)

    Brodersen, Kay H; Deserno, Lorenz; Schlagenhauf, Florian; Lin, Zhihao; Penny, Will D; Buhmann, Joachim M; Stephan, Klaas E

    2014-01-01

    This proof-of-concept study examines the feasibility of defining subgroups in psychiatric spectrum disorders by generative embedding, using dynamical system models which infer neuronal circuit mechanisms from neuroimaging data. To this end, we re-analysed an fMRI dataset of 41 patients diagnosed with schizophrenia and 42 healthy controls performing a numerical n-back working-memory task. In our generative-embedding approach, we used parameter estimates from a dynamic causal model (DCM) of a visual-parietal-prefrontal network to define a model-based feature space for the subsequent application of supervised and unsupervised learning techniques. First, using a linear support vector machine for classification, we were able to predict individual diagnostic labels significantly more accurately (78%) from DCM-based effective connectivity estimates than from functional connectivity between (62%) or local activity within the same regions (55%). Second, an unsupervised approach based on variational Bayesian Gaussian mixture modelling provided evidence for two clusters which mapped onto patients and controls with nearly the same accuracy (71%) as the supervised approach. Finally, when restricting the analysis only to the patients, Gaussian mixture modelling suggested the existence of three patient subgroups, each of which was characterised by a different architecture of the visual-parietal-prefrontal working-memory network. Critically, even though this analysis did not have access to information about the patients' clinical symptoms, the three neurophysiologically defined subgroups mapped onto three clinically distinct subgroups, distinguished by significant differences in negative symptom severity, as assessed on the Positive and Negative Syndrome Scale (PANSS). In summary, this study provides a concrete example of how psychiatric spectrum diseases may be split into subgroups that are defined in terms of neurophysiological mechanisms specified by a generative model of

  15. Dissecting psychiatric spectrum disorders by generative embedding

    Directory of Open Access Journals (Sweden)

    Kay H. Brodersen

    2014-01-01

    Full Text Available This proof-of-concept study examines the feasibility of defining subgroups in psychiatric spectrum disorders by generative embedding, using dynamical system models which infer neuronal circuit mechanisms from neuroimaging data. To this end, we re-analysed an fMRI dataset of 41 patients diagnosed with schizophrenia and 42 healthy controls performing a numerical n-back working-memory task. In our generative-embedding approach, we used parameter estimates from a dynamic causal model (DCM of a visual–parietal–prefrontal network to define a model-based feature space for the subsequent application of supervised and unsupervised learning techniques. First, using a linear support vector machine for classification, we were able to predict individual diagnostic labels significantly more accurately (78% from DCM-based effective connectivity estimates than from functional connectivity between (62% or local activity within the same regions (55%. Second, an unsupervised approach based on variational Bayesian Gaussian mixture modelling provided evidence for two clusters which mapped onto patients and controls with nearly the same accuracy (71% as the supervised approach. Finally, when restricting the analysis only to the patients, Gaussian mixture modelling suggested the existence of three patient subgroups, each of which was characterised by a different architecture of the visual–parietal–prefrontal working-memory network. Critically, even though this analysis did not have access to information about the patients' clinical symptoms, the three neurophysiologically defined subgroups mapped onto three clinically distinct subgroups, distinguished by significant differences in negative symptom severity, as assessed on the Positive and Negative Syndrome Scale (PANSS. In summary, this study provides a concrete example of how psychiatric spectrum diseases may be split into subgroups that are defined in terms of neurophysiological mechanisms specified by a

  16. Conditional mean embeddings as regressors - supplementary

    CERN Document Server

    Grünewälder, Steffen; Baldassarre, Luca; Patterson, Sam; Gretton, Arthur; Pontil, Massimilano

    2012-01-01

    We demonstrate an equivalence between reproducing kernel Hilbert space (RKHS) embeddings of conditional distributions and vector-valued regressors. This connection introduces a natural regularized loss function which the RKHS embeddings minimise, providing an intuitive understanding of the embeddings and a justification for their use. Furthermore, the equivalence allows the application of vector-valued regression methods and results to the problem of learning conditional distributions. Using this link we derive a sparse version of the embedding by considering alternative formulations. Further, by applying convergence results for vector-valued regression to the embedding problem we derive minimax convergence rates which are O(\\log(n)/n) -- compared to current state of the art rates of O(n^{-1/4}) -- and are valid under milder and more intuitive assumptions. These minimax upper rates coincide with lower rates up to a logarithmic factor, showing that the embedding method achieves nearly optimal rates. We study o...

  17. Operating System Performance Analyzer for Embedded Systems

    Directory of Open Access Journals (Sweden)

    Shahzada Khayyam Nisar

    2011-11-01

    Full Text Available RTOS provides a number of services to an embedded system designs such as case management, memory management, and Resource Management to build a program. Choosing the best OS for an embedded system is based on the available OS for system designers and their previous knowledge and experience. This can cause an imbalance between the OS and embedded systems. RTOS performance analysis is critical in the design and integration of embedded software to ensure that limits the application meet at runtime. To select an appropriate operating system for an embedded system for a particular application, the OS services to be analyzed. These OS services are identified by parameters to establish performance metrics. Performance Metrics selected include context switching, Preemption time and interrupt latency. Performance Metrics are analyzed to choose the right OS for an embedded system for a particular application.

  18. Adaptive GDDA-BLAST: fast and efficient algorithm for protein sequence embedding.

    Directory of Open Access Journals (Sweden)

    Yoojin Hong

    Full Text Available A major computational challenge in the genomic era is annotating structure/function to the vast quantities of sequence information that is now available. This problem is illustrated by the fact that most proteins lack comprehensive annotations, even when experimental evidence exists. We previously theorized that embedded-alignment profiles (simply "alignment profiles" hereafter provide a quantitative method that is capable of relating the structural and functional properties of proteins, as well as their evolutionary relationships. A key feature of alignment profiles lies in the interoperability of data format (e.g., alignment information, physio-chemical information, genomic information, etc.. Indeed, we have demonstrated that the Position Specific Scoring Matrices (PSSMs are an informative M-dimension that is scored by quantitatively measuring the embedded or unmodified sequence alignments. Moreover, the information obtained from these alignments is informative, and remains so even in the "twilight zone" of sequence similarity (<25% identity. Although our previous embedding strategy was powerful, it suffered from contaminating alignments (embedded AND unmodified and high computational costs. Herein, we describe the logic and algorithmic process for a heuristic embedding strategy named "Adaptive GDDA-BLAST." Adaptive GDDA-BLAST is, on average, up to 19 times faster than, but has similar sensitivity to our previous method. Further, data are provided to demonstrate the benefits of embedded-alignment measurements in terms of detecting structural homology in highly divergent protein sequences and isolating secondary structural elements of transmembrane and ankyrin-repeat domains. Together, these advances allow further exploration of the embedded alignment data space within sufficiently large data sets to eventually induce relevant statistical inferences. We show that sequence embedding could serve as one of the vehicles for measurement of low

  19. Graphical Model Debugger Framework for Embedded Systems

    DEFF Research Database (Denmark)

    Zeng, Kebin; Guo, Yu; Angelov, Christo K.

    2010-01-01

    Model Driven Software Development has offered a faster way to design and implement embedded real-time software by moving the design to a model level, and by transforming models to code. However, the testing of embedded systems has remained at the code level. This paper presents a Graphical Model...... Debugger Framework, providing an auxiliary avenue of analysis of system models at runtime by executing generated code and updating models synchronously, which allows embedded developers to focus on the model level. With the model debugger, embedded developers can graphically test their design model...

  20. Absorptive capacity and smart companies

    OpenAIRE

    Patricia Moro González; Garcia Muiña, Fernando E.

    2014-01-01

    Purpose: The current competitive environment is substantially modifying the organizations’ learning processes due to a global increase of available information allowing this to be transformed into knowledge. This opportunity has been exploited since the nineties by the tools of “Business Analytics” and “Business Intelligence” but, nevertheless, being integrated in the study of new organizational capacities engaged in the process of creating intelligence inside organizations is still an outsta...

  1. Power optimized programmable embedded controller

    CERN Document Server

    Kamaraju, M; Tilak, A V N; 10.5121/ijcnc.2010.2409

    2010-01-01

    Now a days, power has become a primary consideration in hardware design, and is critical in computer systems especially for portable devices with high performance and more functionality. Clock-gating is the most common technique used for reducing processor's power. In this work clock gating technique is applied to optimize the power of fully programmable Embedded Controller (PEC) employing RISC architecture. The CPU designed supports i) smart instruction set, ii) I/O port, UART iii) on-chip clocking to provide a range of frequencies , iv) RISC as well as controller concepts. The whole design is captured using VHDL and is implemented on FPGA chip using Xilinx .The architecture and clock gating technique together is found to reduce the power consumption by 33.33% of total power consumed by this chip.

  2. The embedded operating system project

    Science.gov (United States)

    Campbell, R. H.

    1985-01-01

    The design and construction of embedded operating systems for real-time advanced aerospace applications was investigated. The applications require reliable operating system support that must accommodate computer networks. Problems that arise in the construction of such operating systems, reconfiguration, consistency and recovery in a distributed system, and the issues of real-time processing are reported. A thesis that provides theoretical foundations for the use of atomic actions to support fault tolerance and data consistency in real-time object-based system is included. The following items are addressed: (1) atomic actions and fault-tolerance issues; (2) operating system structure; (3) program development; (4) a reliable compiler for path Pascal; and (5) mediators, a mechanism for scheduling distributed system processes.

  3. Capacity at Railway Stations

    DEFF Research Database (Denmark)

    Landex, Alex

    2011-01-01

    Stations do have other challenges regarding capacity than open lines as it is here the traffic is dispatched. The UIC 406 capacity method that can be used to analyse the capacity consumption can be exposed in different ways at stations which may lead to different results. Therefore, stations need...... special focus when conducting UIC 406 capacity analyses.This paper describes how the UIC 406 capacity method can be expounded for stations. Commonly for the analyses of the stations it is recommended to include the entire station including the switch zone(s) and all station tracks. By including the switch...... is changed, this paper recommends that the railway lines are not always be divided. In case trains turn around on open (single track) line, the capacity consumption may be too low if a railway line is divided. The same can be the case if only few trains are overtaken at an overtaking station. For dead end...

  4. Evaluation of railway capacity

    DEFF Research Database (Denmark)

    Landex, Alex; Kaas, Anders H.; Schittenhelm, Bernd

    2006-01-01

    This paper describes the relatively new UIC 406 method for calculating capacity consumption on railway lines. The UIC 406 method is an easy and effective way of calculating the capacity consumption, but it is possible to expound the UIC 406 method in different ways which can lead to different...... capacity consumptions. This paper describes the UIC 406 method and how it is expounded in Denmark. The paper describes the importance of choosing the right length of the line sections examined and how line sections with multiple track sections are examined. Furthermore, the possibility of using idle...... capacity to run more trains is examined. The paper presents a method to examine the expected capacity utilization of future timetables. The method is based on the plan of operation instead of the exact (known) timetable. At the end of the paper it is described how it is possible to make capacity statements...

  5. Embedded fiber-optic sensing for accurate internal monitoring of cell state in advanced battery management systems part 2: Internal cell signals and utility for state estimation

    Science.gov (United States)

    Ganguli, Anurag; Saha, Bhaskar; Raghavan, Ajay; Kiesel, Peter; Arakaki, Kyle; Schuh, Andreas; Schwartz, Julian; Hegyi, Alex; Sommer, Lars Wilko; Lochbaum, Alexander; Sahu, Saroj; Alamgir, Mohamed

    2017-02-01

    A key challenge hindering the mass adoption of Lithium-ion and other next-gen chemistries in advanced battery applications such as hybrid/electric vehicles (xEVs) has been management of their functional performance for more effective battery utilization and control over their life. Contemporary battery management systems (BMS) reliant on monitoring external parameters such as voltage and current to ensure safe battery operation with the required performance usually result in overdesign and inefficient use of capacity. More informative embedded sensors are desirable for internal cell state monitoring, which could provide accurate state-of-charge (SOC) and state-of-health (SOH) estimates and early failure indicators. Here we present a promising new embedded sensing option developed by our team for cell monitoring, fiber-optic (FO) sensors. High-performance large-format pouch cells with embedded FO sensors were fabricated. This second part of the paper focuses on the internal signals obtained from these FO sensors. The details of the method to isolate intercalation strain and temperature signals are discussed. Data collected under various xEV operational conditions are presented. An algorithm employing dynamic time warping and Kalman filtering was used to estimate state-of-charge with high accuracy from these internal FO signals. Their utility for high-accuracy, predictive state-of-health estimation is also explored.

  6. Mejorar las recomendaciones contenidas en los informes elaborados por consultores. La optimización del discurso (To improve the embedded recommendations from the consultants' detailed reports. The discourse and its enhancement

    Directory of Open Access Journals (Sweden)

    Estrella Montolío Durán

    2010-06-01

    Full Text Available El trabajo se plantea cuatro objetivos: (i caracterizar desde el punto de vista lingüístico y pragmático el género textual del informe que elaboran los profesionales de la Consultoría, género que se encuentra en pleno proceso de transformación; (ii describir las fases de las que se compone el proceso de asesoramiento de un lingüista en la optimización de este tipo de informe; (iii analizar algunos mecanismos lingüísticos y discursivos característicos de este género, así como la dificultad de su elaboración para los profesionales, y (iv reivindicar la necesidad de una línea de investigación lingüística que se imbrique con los resultados empíricos de la mejora de los intercambios comunicativos producidos en los contextos profesionales (estudios de optimización del discurso. (The present study has four principal aims. First, to offer a linguistic and pragmatic characterization of a genre under a transformation process: consultancy report. Second, to describe phases of the counseling process that linguists provide to optimize this kind of report. Third, to analyze some linguistic and discourse mechanisms, distinctive of this gender, as well as the difficulty of its elaboration for professionals. Finally, to argue for the need of a linguistic research line overlapped with the empirical results of the improvement of the communicative exchanges produced in professional settings (studies of discourse optimization.

  7. Capacity Building in Vietnam

    OpenAIRE

    Adam McCarty

    2001-01-01

    This report is the outcome of a study commissioned to examine the capacity building needs in Vietnam, and is a supplementary document to the Asian Development Bank's Country Operational Strategy for Vietnam. Vietnam's needs in terms of capacity building are particularly important given that is it a transitional economy and also one with little institutional experience in dealing with the international donor community. This paper examines the international awareness of capacity building and ca...

  8. Phosphatidylcholine embedded micellar systems: enhanced permeability through rat skin.

    Science.gov (United States)

    Spernath, Aviram; Aserin, Abraham; Sintov, Amnon C; Garti, Nissim

    2008-02-15

    Micellar and microemulsion systems are excellent potential vehicles for delivery of drugs because of their high solubilization capacity and improved transmembrane bioavailability. Mixtures of propylene glycol (PG) and nonionic surfactants with sodium diclofenac (DFC) were prepared in the presence of phosphatidylcholine (PC) as transmembrane transport enhancers. Fully dilutable systems with maximum DFC solubilization capacity (SC) at pH 7 are presented. It was demonstrated that the concentrates underwent phase transitions from reverse micelles to swollen reverse micelles and, via the bicontinuous transitional mesophase, into inverted O/W microstructures. The SC decreases as a function of dilution. DFC transdermal penetration using rat skin in vitro correlated with SC, water content, effect of phospholipid content, presence of an oil phase, and ethanol. Skin penetration from the inverted bicontinuous mesophase and the skin penetration from the O/W-like microstructure were higher than that measured from the W/O-like droplets, especially when the micellar system containing the nonionic surfactant, sugar ester L-1695, and hexaglycerol laurate. PC embedded within the micelle interface significantly increased the penetration flux across the skin compared to micellar systems without the embedded PC at their interface. Moreover, the combination of PC with HECO40 improved the permeation rate (P) and shortened the lag-time (T(L)).

  9. Profile and Instrumentation Driven Methods for Embedded Signal Processing

    Science.gov (United States)

    2015-01-01

    and verification [35]. Another example is the Architecture Analysis & Design Language (AADL) which has been used in automotive and avionics fields to...interference in multitasked embedded workloads , but also further lever- ages compiler-generated application information to preload TLB entries that will be...multitasked workloads . CTP requires profiling the application to identify hotspots, which can be done manually using a tool such as gprof or achieved by using

  10. Design of embedded intelligent monitoring system based on face recognition

    Science.gov (United States)

    Liang, Weidong; Ding, Yan; Zhao, Liangjin; Li, Jia; Hu, Xuemei

    2017-01-01

    In this paper, a new embedded intelligent monitoring system based on face recognition is proposed. The system uses Pi Raspberry as the central processor. A sensors group has been designed with Zigbee module in order to assist the system to work better and the two alarm modes have been proposed using the Internet and 3G modem. The experimental results show that the system can work under various light intensities to recognize human face and send alarm information in real time.

  11. Metadata Embeddings for User and Item Cold-start Recommendations

    OpenAIRE

    Kula, Maciej

    2015-01-01

    I present a hybrid matrix factorisation model representing users and items as linear combinations of their content features' latent factors. The model outperforms both collaborative and content-based models in cold-start or sparse interaction data scenarios (using both user and item metadata), and performs at least as well as a pure collaborative matrix factorisation model where interaction data is abundant. Additionally, feature embeddings produced by the model encode semantic information in...

  12. Technical textiles with embedded fibre Bragg grating sensors

    Science.gov (United States)

    Bilro, L.; Cunha, H.; Pinto, J. L.; Nogueira, R. N.

    2009-10-01

    The characterization of fiber Bragg grating (FBG) sensors integrated on 2D and 3D mesh structures is presented. Several materials and configurations were tested, namely cork, foams, PVC, hexagonal 3D. Sensors were embedded between two substrates using textile lamination technique. Every sample was subjected to temperature variations and mechanical deformations. Through Bragg wavelength monitoring, thermal, deformation and pressure performance were evaluated. These results provide significant information to the conception of smart textiles.

  13. Forensic psychiatry determination of mental capacity

    Directory of Open Access Journals (Sweden)

    Jovanović Aleksandar A.

    2011-01-01

    Full Text Available Forensic psychiatry determination is, ordered by a court, the analysis and interpretation of medical facts with important legal implications. In that sense, psychiatrists (or neuropsychiatrists, apart from their professional expertise, must be familiar with legal, economical and social significance of medical data, so that their forensic reports are clear and useful in the context of legal procedure. This review deals with forensic psychiatry aspects of mental capacity. In the introduction of the article, the explanation of relevant concepts such as mental capacity, contractual and testamentary capacity, informed consent, undue influence and forensic determination in light of Serbian statutory law is presented. Further, the authors present basic principles of making forensic reports on mental capacity as well as contractual and testamentary capacity, and informed consent for eventual medical examination and treatment.

  14. Structure and Thermodynamic Properties of Liquid Transition Metals with Different Embedded-Atom Method Models

    Institute of Scientific and Technical Information of China (English)

    王金照; 陈民; 过增元

    2002-01-01

    Pair distribution functions and constant-volume heat capacities of liquid copper, silver and nickel have been calculated by molecular dynamics simulations with four different versions of the embedded-atom method (EAM) model, namely, the versions of Johnson, Mei, Cai and Pohlong. The simulated structural properties with the four potential models show reasonable agreement with experiments and have little difference with each other, while the calculated heat capacities with the different EAM versions show remarkable discrepancies. Detailed analyses of the energy of the liquid metallic system show that, to predict successfully the heat capacity, an EAM model should match the state equation first proposed by Rose.

  15. Development and characterization of silicone embedded distributed piezoelectric sensors for contact detection

    Science.gov (United States)

    Acer, Merve; Salerno, Marco; Agbeviade, Kossi; Paik, Jamie

    2015-07-01

    Tactile sensing transfers complex interactive information in a most intuitive sense. Such a populated set of data from the environment and human interactions necessitates various degrees of information from both modular and distributed areas. A sensor design that could provide such types of feedback becomes challenging when the target component has a nonuniform, agile, high resolution, and soft surface. This paper presents an innovative methodology for the manufacture of novel soft sensors that have a high resolution sensing array due to the sensitivity of ceramic piezoelectric (PZT) elements, while uncommonly matched with the high stretchability of the soft substrate and electrode design. Further, they have a low profile and their transfer function is easy to tune by changing the material and thickness of the soft substrate in which the PZTs are embedded. In this manuscript, we present experimental results of the soft sensor prototypes: PZTs arranged in a four by two array form, measuring 1.5-2.3 mm in thickness, with the sensitivity in the range of 0.07-0.12 of the normalized signal change per unit force. We have conducted extensive tests under dynamic loading conditions that include impact, step and cyclic. The presented prototype's mechanical and functional capacities are promising for applications in biomedical systems where soft, wearable and high precision sensors are needed.

  16. 融入科研管理信息化环境的机构知识库服务功能构建研究%The Service Functions of Institutional Repository Embedded in Scientific and Informational Management Environments

    Institute of Scientific and Technical Information of China (English)

    王秀华

    2015-01-01

    In this paper,we summarized the existing problems of institutional repository development,and analyzed the causes of these problems. Aiming at the demand of scientific and informational management environment ,to explore the extended service functions of institutional repository,and finally to realize the healthy,sustaining and rapid development of institutional repository.%概括了当今机构知识库发展存在的问题,并分析了产生这些问题的原因。针对目前科研管理信息化环境的需求,探讨从项目流程管理、成果登记、科研数据挖掘和统计分析、作品传播保护、长期保存及版权服务等方面拓展机构知识库的服务功能,实现机构知识库持续、健康、快速发展。

  17. Capacity building for HIA

    Directory of Open Access Journals (Sweden)

    Gabriel Gulis PhD

    2007-09-01

    Full Text Available

    Background: To integrate health impact assessment (HIA into existing decision-making processes requires not only methods and procedures but also well-trained experts, aware policy makers and appropriate institutions. Capacity building is the assistance which is provided to entities, which have a need to develop a certain skill or competence, or for general upgrading of performance ability. If a new technique is planned to be introduced there is a need for capacity building with no respect to levels (local, regional, national, international or sectors (health, environment, finance, social care, education, etc.. As such, HIA is a new technique for most of the new Member States and accession countries of the European Union.

    Methods: To equip individuals with the understanding and skills needed to launch a HIA or be aware of the availability of this methodology and to access information, knowledge and training, we focused on the organization of workshops in participating countries. The workshops served also as pilot events to test a “curriculum” for HIA; a set of basic topics and presentations had been developed to be tested during workshops. In spite of classical in-class workshops we aimed to organize e-learning events as a way to over come the “busyness” problem of decision makers.

    Results: Throughout March – October 2006 we organized and ran 7 workshops in Denmark, Turkey, Lithuania, Poland, Bulgaria, Slovak Republic and Hungary. Participants came from the public health sector (141, non-public health decision makers (113 and public health students (100. A concise curriculum was developed and tested during these workshops. Participants developed a basic understanding of HIA, skills to develop and use their own screening tools as well as scoping.Within the workshop in Denmark we tested an online, real-time Internet based training method; participants highly welcomed this

  18. Robust Lossless Semi Fragile Information Protection in Images

    Directory of Open Access Journals (Sweden)

    Pushkar Dixit

    2014-06-01

    Full Text Available Internet security finds it difficult to keep the information secure and to maintain the integrity of the data. Sending messages over the internet secretly is one of the major tasks as it is widely used for passing the message. In order to achieve security there must be some mechanism to protect the data against unauthorized access. A lossless data hiding scheme is proposed in this paper which has a higher embedding capacity than other schemes. Unlike other schemes that are used for embedding fixed amount of data, the proposed data hiding method is block based approach and it uses a variable data embedding in different blocks which reduces the chances of distortion and increases the hiding capacity of the image. When the data is recovered the original image can be restored without any distortion. Our experimental results indicate that the proposed solution can significantly support the data hiding problem. We achieved good Peak signal-to-noise ratio (PSNR while hiding large amount of data into smoother regions.

  19. Improvements of embedded zerotree wavelet (EZW) coding

    Science.gov (United States)

    Li, Jin; Cheng, Po-Yuen; Kuo, C.-C. Jay

    1995-04-01

    In this research, we investigate several improvements of embedded zerotree wavelet (EZW) coding. Several topics addressed include: the choice of wavelet transforms and boundary conditions, the use of arithmetic coder and arithmetic context and the design of encoding order for effective embedding. The superior performance of our improvements is demonstrated with extensive experimental results.

  20. Solid methane toward deeply embedded protostars

    NARCIS (Netherlands)

    Boogert, ACA; Schutte, WA; Tielens, AGGM; Whittet, DCB; Helmich, FP; Ehrenfreund, P; Wesselius, PR; deGraauw, T; Prusti, T

    1996-01-01

    We report on the detection of an absorption feature near 7.67 mu m toward the deeply embedded protostellar objects W 33A and NGC 7538 : IRS9. Comparison with laboratory spectra shows that this feature can be identified as the v(4) ('deformation') mode of solid state CH4 embedded in polar molecules

  1. Multithreading for Embedded Reconfigurable Multicore Systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  2. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems.......This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  3. Teaching Embedded System Concepts for Technological Literacy

    Science.gov (United States)

    Winzker, M.; Schwandt, A.

    2011-01-01

    A basic understanding of technology is recognized as important knowledge even for students not connected with engineering and computer science. This paper shows that embedded system concepts can be taught in a technological literacy course. An embedded system teaching block that has been used in an electronics module for non-engineers is…

  4. Embedded Systems Design with 8051 Microcontrollers

    DEFF Research Database (Denmark)

    Karakahayov, Zdravko; Winther, Ole; Christensen, Knud Smed

    Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator.......Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator....

  5. Virtually Embedded: Library Instruction within Second Life

    Science.gov (United States)

    Davis, Marian G.; Smith, Carol E.

    2009-01-01

    Embedded librarianship in distance learning courses taught within virtual environments such as Second Life is an emerging, leading-edge practice. This paper describes the experiences of librarians embedded in undergraduate English composition courses taught entirely in Second Life and presents the results of an empirical research study to assess…

  6. Liquid heat capacity lasers

    Science.gov (United States)

    Comaskey, Brian J.; Scheibner, Karl F.; Ault, Earl R.

    2007-05-01

    The heat capacity laser concept is extended to systems in which the heat capacity lasing media is a liquid. The laser active liquid is circulated from a reservoir (where the bulk of the media and hence waste heat resides) through a channel so configured for both optical pumping of the media for gain and for light amplification from the resulting gain.

  7. Visual attention capacity

    DEFF Research Database (Denmark)

    Habekost, Thomas; Starrfelt, Randi

    2009-01-01

    to patient testing, and review existing TVA-based patient studies organized by lesion anatomy. Lesions in three anatomical regions affect visual capacity: The parietal lobes, frontal cortex and basal ganglia, and extrastriate cortex. Visual capacity thus depends on large, bilaterally distributed anatomical...

  8. Free Embedding Potentials in General Relativity

    CERN Document Server

    Bustamante, M D; Brachet, M E; Bustamante, Miguel D.; Debbasch, Fabrice; Brachet, Marc-Etienne

    2005-01-01

    The embedding approach to General Relativity (GR), in which the 4-dimensional space-time is embedded in a N-dimensional ($N\\geq 10$) flat host space with hyperbolic signature, is reconsidered. All objections raised by previous authors against this approach are answered. The equations for the embedding potentials are shown to be completely equivalent to the standard GR Einstein equations for the metric, provided that two conditions are met. The first condition is that the embedding fulfills a property closely related to Nash's freeness and the second that physically consistent boundary conditions are considered in the Einstein-Hilbert action. Explicit examples of embeddings whose deformations DO describe gravitational waves around their respective backgrounds are given for both (4-D) cases of flat space-time and Schwarzschild black hole. Beside the Einstein-Hilbert action, a new action principle is considered that is also equivalent to standard GR at both levels of equations of motion and perturbations (waves)...

  9. Graphical Model Debugger Framework for Embedded Systems

    DEFF Research Database (Denmark)

    Zeng, Kebin

    2010-01-01

    Debugger Framework, providing an auxiliary avenue of analysis of system models at runtime by executing generated code and updating models synchronously, which allows embedded developers to focus on the model level. With the model debugger, embedded developers can graphically test their design model......Model Driven Software Development has offered a faster way to design and implement embedded real-time software by moving the design to a model level, and by transforming models to code. However, the testing of embedded systems has remained at the code level. This paper presents a Graphical Model...... and check the running status of the system, which offers a debugging capability on a higher level of abstraction. The framework intends to contribute a tool to the Eclipse society, especially suitable for model-driven development of embedded systems....

  10. Embedding health policy and systems research into decision-making processes in low- and middle-income countries.

    Science.gov (United States)

    Koon, Adam D; Rao, Krishna D; Tran, Nhan T; Ghaffar, Abdul

    2013-08-08

    Attention is increasingly directed to bridging the gap between the production of knowledge and its use for health decision-making in low- and middle-income countries (LMICs). An important and underdeveloped area of health policy and systems research (HPSR) is the organization of this process. Drawing from an interdisciplinary conception of embeddedness, a literature review was conducted to identify examples of embedded HPSR used to inform decision-making in LMICs. The results of the literature review were organized according to the World Health Organization's Building Blocks Framework. Next, a conceptual model was created to illustrate the arrangement of organizations that produce embedded HPSR and the characteristics that facilitate its uptake into the arena of decision-making. We found that multiple forces converge to create context-specific pathways through which evidence enters into decision-making. Depending on the decision under consideration, the literature indicates that decision-makers may call upon an intricate combination of actors for sourcing HPSR. While proximity to decision-making does have advantages, it is not the position of the organization within the network, but rather the qualities the organization possesses, that enable it to be embedded. Our findings suggest that four qualities influence embeddedness: reputation, capacity, quality of connections to decision-makers, and quantity of connections to decision-makers and others. In addition to this, the policy environment (e.g. the presence of legislation governing the use of HPSR, presence of strong civil society, etc.) strongly influences uptake. Through this conceptual model, we can understand which conditions are likely to enhance uptake of HPSR in LMIC health systems. This raises several important considerations for decision-makers and researchers about the arrangement and interaction of evidence-generating organizations in health systems.

  11. Value for railway capacity

    DEFF Research Database (Denmark)

    Sameni, Melody Khadem; Preston, John M.

    2012-01-01

    Growth in rail traffic has not been matched by increases in railway infrastructure. Given this capacity challenge and the current restrictions on public spending, the allocation and the utilization of existing railway capacity are more important than ever. Great Britain has had the greatest growth...... in rail passenger kilometers of European countries since 1996. However, costs are higher and efficiency is lower than European best practice. This paper provides an innovative methodology for assessing the efficiency of passenger operators in capacity utilization. Data envelopment analysis (DEA) is used...... to analyze the efficiency of operators in transforming inputs of allocated capacity of infrastructure and franchise payments into valuable passenger service outputs while avoiding delays. By addressing operational and economic aspects of capacity utilization simultaneously, the paper deviates from existing...

  12. Research on the Elements of Firm's IS Absorptive Capacity%Research on the Elements of Firm' s IS Absorptive Capacity

    Institute of Scientific and Technical Information of China (English)

    CAO Yong; NING Dong-ling

    2009-01-01

    In this paper, we explore the capacity during the process of a firm's information system adoption and implementation from knowledge management perspective, based on a firm's level construct. According to the di- mensions of absorptive capacity proposed by Zahra and George, we point out that the concept of IS absorptive ca- pacity, analyze and summarize the elements of potential absorptive capacity and realized absorptive capacity. We use data from two manufacturing organizations, analyze two firm's realities of IS absorptive capacity. The study indicates differing antecedents may have differing effects on potential absorptive capacity and realized ab- sorptive capacity.

  13. Molecular dynamics simulations on specific heat capacity and glass transition tempera-ture of liquid silver

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The embedded-atom method is adopted to simulate the specific heat capacity of liquid silver. The relationship between the specific heat capacity and the temperature above and below melting point is derived. The results show that there exists an anormaly of the specific heat capacity of liquid silver near 950 K. Simulated pair distribution functions show that the liquid-to-glass transition takes place at this temperature.

  14. Stellar Properties of Embedded Protostars

    CERN Document Server

    White, R J; Doppmann, G W; Covey, Kevin R; Hillenbrand, L A

    2006-01-01

    (Abridged) High dispersion spectrographs on large aperture telescopes have recently allowed observers to study the stellar and accretion properties of deeply embedded young stars, commonly referred to as Class I stars. We summarize these newly determined properties and compare them with observations of more optically revealed Class II (T Tauri) stars. Class I stars have spectral types and stellar luminosities similar to those of Class II stars, suggesting similar masses and ages. Estimates of stellar luminosity and age, however, are especially uncertain given the large extinctions, scattered light emission and continuum excesses typical of Class I stars. Several candidate Class I brown dwarfs are identified. Class I stars appear to rotate more rapidly than T Tauri stars, by roughly a factor of 2. Likewise, Class I disk accretion rates are only a factor of two larger than those of T Tauri stars, less than the mass infall rates predicted by envelope models by 1-2 orders of magnitude. In at least a few cases the...

  15. Medical Image Steganography: Study of Medical Image Quality Degradation when Embedding Data in the Frequency Domain

    Directory of Open Access Journals (Sweden)

    M.I.Khalil

    2017-02-01

    Full Text Available Steganography is the discipline of invisible communication by hiding the exchanged secret information (message in another digital information media (image, video or audio. The existence of the message is kept indiscernible in sense that no one, other than the intended recipient, suspects the existence of the message. The majority of steganography techniques are implemented either in spatial domain or in frequency domain of the digital images while the embedded information can be in the form of plain or cipher message. Medical image steganography is classified as a distinctive case of image steganography in such a way that both the image and the embedded information have special requirements such as achieving utmost clarity reading of the medical images and the embedded messages. There is a contention between the amount of hidden information and the caused detectable distortion of image. The current paper studies the degradation of the medical image when undergoes the steganography process in the frequency domain.

  16. Visual content highlighting via automatic extraction of embedded captions on MPEG compressed video

    Science.gov (United States)

    Yeo, Boon-Lock; Liu, Bede

    1996-03-01

    Embedded captions in TV programs such as news broadcasts, documentaries and coverage of sports events provide important information on the underlying events. In digital video libraries, such captions represent a highly condensed form of key information on the contents of the video. In this paper we propose a scheme to automatically detect the presence of captions embedded in video frames. The proposed method operates on reduced image sequences which are efficiently reconstructed from compressed MPEG video and thus does not require full frame decompression. The detection, extraction and analysis of embedded captions help to capture the highlights of visual contents in video documents for better organization of video, to present succinctly the important messages embedded in the images, and to facilitate browsing, searching and retrieval of relevant clips.

  17. Available transmission capacity assessment

    Directory of Open Access Journals (Sweden)

    Škokljev Ivan

    2012-01-01

    Full Text Available Effective power system operation requires the analysis of vast amounts of information. Power market activities expose power transmission networks to high-level power transactions that threaten normal, secure operation of the power system. When there are service requests for a specific sink/source pair in a transmission system, the transmission system operator (TSO must allocate the available transfer capacity (ATC. It is common that ATC has a single numerical value. Additionally, the ATC must be calculated for the base case configuration of the system, while generation dispatch and topology remain unchanged during the calculation. Posting ATC on the internet should benefit prospective users by aiding them in formulating their requests. However, a single numerical value of ATC offers little for prospect for analysis, planning, what-if combinations, etc. A symbolic approach to the power flow problem (DC power flow and ATC offers a numerical computation at the very end, whilst the calculation beforehand is performed by using symbols for the general topology of the electrical network. Qualitative analysis of the ATC using only qualitative values, such as increase, decrease or no change, offers some new insights into ATC evaluation, multiple transactions evaluation, value of counter-flows and their impact etc. Symbolic analysis in this paper is performed after the execution of the linear, symbolic DC power flow. As control variables, the mathematical model comprises linear security constraints, ATC, PTDFs and transactions. The aim is to perform an ATC sensitivity study on a five nodes/seven lines transmission network, used for zonal market activities tests. A relatively complicated environment with twenty possible bilateral transactions is observed.

  18. Embedding 3D models of biological specimens in PDF publications.

    Science.gov (United States)

    Ruthensteiner, Bernhard; Hess, Martin

    2008-11-01

    By providing two examples, the option for embedding 3D models in electronic versions of life science publications is presented. These examples, presumably representing the first such models published, are developmental stages of an evertebrate (Patella caerulea, Mollusca) and a vertebrate species (Psetta maxima, Teleostei) obtained from histological section series reconstruction processed with the software package Amira. These surface rendering models are particularly suitable for a PDF file because they can easily be transformed to a file format required and components may be conveniently combined and hierarchically arranged. All methodological steps starting from specimen preparation until embedding of resulting models in PDF files with emphasis on conversion of Amira data to the appropriate 3D file format are explained. Usability of 3D models in PDF documents is exemplified and advantages over 2D illustrations are discussed, including better explanation capabilities for spatial arrangements, higher information contents, and limiting options for disguising results by authors. Possibilities for additional applications reaching far beyond the examples presented are suggested. Problems such as long-term compatibility of file format and hardware plus software, editing and embedding of files, file size and differences in information contents between printed and electronic version will likely be overcome by technical development and increasing tendency toward electronic at the cost of printed publications. Since 3D visualization plays an increasing role in manifold disciplines of science and appropriate tools for the popular PDF format are readily available, we propose routine application of this way of illustration in electronic life science papers.

  19. Liquid-phase plasma synthesis of silicon quantum dots embedded in carbon matrix for lithium battery anodes

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Ying [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China); College of Chemistry and Chemical Engineering, Bohai University, Jinzhou 121000 (China); Yu, Hang; Li, Haitao; Ming, Hai; Pan, Keming; Huang, Hui [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China); Liu, Yang, E-mail: yangl@suda.edu.cn [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China); Kang, Zhenhui, E-mail: zhkang@suda.edu.cn [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China)

    2013-10-15

    Graphical abstract: - Highlights: • Silicon quantum dots embedded in carbon matrix (SiQDs/C) were fabricated. • SiQDs/C exhibits excellent battery performance as anode materials with high specific capacity. • The good performance was attributed to the marriage of small sized SiQDs and carbon. - Abstract: Silicon quantum dots embedded in carbon matrix (SiQDs/C) nanocomposites were prepared by a novel liquid-phase plasma assisted synthetic process. The SiQDs/C nanocomposites were demonstrated to show high specific capacity, good cycling life and high coulmbic efficiency as anode materials for lithium-ion battery.

  20. Embedded Implementation of VHR Satellite Image Segmentation.

    Science.gov (United States)

    Li, Chao; Balla-Arabé, Souleymane; Ginhac, Dominique; Yang, Fan

    2016-05-27

    Processing and analysis of Very High Resolution (VHR) satellite images provide a mass of crucial information, which can be used for urban planning, security issues or environmental monitoring. However, they are computationally expensive and, thus, time consuming, while some of the applications, such as natural disaster monitoring and prevention, require high efficiency performance. Fortunately, parallel computing techniques and embedded systems have made great progress in recent years, and a series of massively parallel image processing devices, such as digital signal processors or Field Programmable Gate Arrays (FPGAs), have been made available to engineers at a very convenient price and demonstrate significant advantages in terms of running-cost, embeddability, power consumption flexibility, etc. In this work, we designed a texture region segmentation method for very high resolution satellite images by using the level set algorithm and the multi-kernel theory in a high-abstraction C environment and realize its register-transfer level implementation with the help of a new proposed high-level synthesis-based design flow. The evaluation experiments demonstrate that the proposed design can produce high quality image segmentation with a significant running-cost advantage.

  1. Embedded Systems Programming: Accessing Databases from Esterel

    Directory of Open Access Journals (Sweden)

    White David

    2008-01-01

    Full Text Available Abstract A current limitation in embedded controller design and programming is the lack of database support in development tools such as Esterel Studio. This article proposes a way of integrating databases and Esterel by providing two application programming interfaces (APIs which enable the use of relational databases inside Esterel programs. As databases and Esterel programs are often executed on different machines, result sets returned as responses to database queries may be processed either locally and according to Esterel's synchrony hypothesis, or remotely along several of Esterel's execution cycles. These different scenarios are reflected in the design and usage rules of the two APIs presented in this article, which rely on Esterel's facilities for extending the language by external data types, external functions, and procedures, as well as tasks. The APIs' utility is demonstrated by means of a case study modelling an automated warehouse storage system, which is constructed using Lego Mindstorms robotics kits. The robot's controller is programmed in Esterel in a way that takes dynamic ordering information and the warehouse's floor layout into account, both of which are stored in a MySQL database.

  2. Embedded Systems Programming: Accessing Databases from Esterel

    Directory of Open Access Journals (Sweden)

    2009-03-01

    Full Text Available A current limitation in embedded controller design and programming is the lack of database support in development tools such as Esterel Studio. This article proposes a way of integrating databases and Esterel by providing two application programming interfaces (APIs which enable the use of relational databases inside Esterel programs. As databases and Esterel programs are often executed on different machines, result sets returned as responses to database queries may be processed either locally and according to Esterel’s synchrony hypothesis, or remotely along several of Esterel’s execution cycles. These different scenarios are reflected in the design and usage rules of the two APIs presented in this article, which rely on Esterel’s facilities for extending the language by external data types, external functions, and procedures, as well as tasks. The APIs’ utility is demonstrated by means of a case study modelling an automated warehouse storage system, which is constructed using Lego Mindstorms robotics kits. The robot’s controller is programmed in Esterel in a way that takes dynamic ordering information and the warehouse’s floor layout into account, both of which are stored in a MySQL database.

  3. Entrepreneurial networks as culturally embedded phenomena

    Directory of Open Access Journals (Sweden)

    Vlatka Skokic

    2015-06-01

    Full Text Available Entrepreneurship research concerning networks has largely focused on network structure, content and governance. We believe that further research is required in order to gain a richer understanding of why specific network forms and types originated. The purpose of this paper is to explore the existence, importance, values and meanings of both the informal and formal networks and networking behaviours of small-scale hotel owner-managers embedded in the socio-economic context of Croatia. In order to gain richer and more detailed understanding of entrepreneurial networks and to understand the influence of socio-economic setting on entrepreneurial networking, we have employed qualitative, in-depth study with small hotel owners. Results suggest that entrepreneurs do not establish strong personal and firm-to-firm ties, but rather focus on formal associations. Reported findings identify socio-cultural factors apparently unique to the context of former socialist economy which have the potential to explain the reported networking behaviour. The adopted research approach brings another dimension to existing theoretical underpinnings, which can encourage researchers to extend or revise theories with new contextual variables.

  4. High capacity fiber optic sensor networks using hybrid multiplexing techniques and their applications

    Science.gov (United States)

    Sun, Qizhen; Li, Xiaolei; Zhang, Manliang; Liu, Qi; Liu, Hai; Liu, Deming

    2013-12-01

    Fiber optic sensor network is the development trend of fiber senor technologies and industries. In this paper, I will discuss recent research progress on high capacity fiber sensor networks with hybrid multiplexing techniques and their applications in the fields of security monitoring, environment monitoring, Smart eHome, etc. Firstly, I will present the architecture of hybrid multiplexing sensor passive optical network (HSPON), and the key technologies for integrated access and intelligent management of massive fiber sensor units. Two typical hybrid WDM/TDM fiber sensor networks for perimeter intrusion monitor and cultural relics security are introduced. Secondly, we propose the concept of "Microstructure-Optical X Domin Refecltor (M-OXDR)" for fiber sensor network expansion. By fabricating smart micro-structures with the ability of multidimensional encoded and low insertion loss along the fiber, the fiber sensor network of simple structure and huge capacity more than one thousand could be achieved. Assisted by the WDM/TDM and WDM/FDM decoding methods respectively, we built the verification systems for long-haul and real-time temperature sensing. Finally, I will show the high capacity and flexible fiber sensor network with IPv6 protocol based hybrid fiber/wireless access. By developing the fiber optic sensor with embedded IPv6 protocol conversion module and IPv6 router, huge amounts of fiber optic sensor nodes can be uniquely addressed. Meanwhile, various sensing information could be integrated and accessed to the Next Generation Internet.

  5. Vedr.: Military capacity building

    DEFF Research Database (Denmark)

    Larsen, Josefine Kühnel; Struwe, Lars Bangert

    2013-01-01

    Military capacity building has increasingly become an integral part of Danish defence. Military capacity is a new way of thinking Danish defence and poses a new set of challenges and opportunities for the Danish military and the Political leadership. On the 12th of december, PhD. Candidate Josefine...... Kühnel Larsen and researcher Lars Bangert Struwe of CMS had organized a seminar in collaboration with Royal Danish Defense Colleg and the East African Security Governance Network. The seminar focused on some of the risks involved in Military capacity building and how these risks are dealt with from...

  6. Vedr.: Military capacity building

    DEFF Research Database (Denmark)

    Larsen, Josefine Kühnel; Struwe, Lars Bangert

    2013-01-01

    Kühnel Larsen and researcher Lars Bangert Struwe of CMS had organized a seminar in collaboration with Royal Danish Defense Colleg and the East African Security Governance Network. The seminar focused on some of the risks involved in Military capacity building and how these risks are dealt with from......Military capacity building has increasingly become an integral part of Danish defence. Military capacity is a new way of thinking Danish defence and poses a new set of challenges and opportunities for the Danish military and the Political leadership. On the 12th of december, PhD. Candidate Josefine...

  7. KNET: A General Framework for Learning Word Embedding using Morphological Knowledge

    OpenAIRE

    Cui, Qing; Gao, Bin; Bian, Jiang; Qiu, Siyu; Liu, Tie-Yan

    2014-01-01

    Neural network techniques are widely applied to obtain high-quality distributed representations of words, i.e., word embeddings, to address text mining, information retrieval, and natural language processing tasks. Recently, efficient methods have been proposed to learn word embeddings from context that captures both semantic and syntactic relationships between words. However, it is challenging to handle unseen words or rare words with insufficient context. In this paper, inspired by the stud...

  8. Real-time depth processing for embedded platforms

    Science.gov (United States)

    Rahnama, Oscar; Makarov, Aleksej; Torr, Philip

    2017-05-01

    Obtaining depth information of a scene is an important requirement in many computer-vision and robotics applications. For embedded platforms, passive stereo systems have many advantages over their active counterparts (i.e. LiDAR, Infrared). They are power efficient, cheap, robust to lighting conditions and inherently synchronized to the RGB images of the scene. However, stereo depth estimation is a computationally expensive task that operates over large amounts of data. For embedded applications which are often constrained by power consumption, obtaining accurate results in real-time is a challenge. We demonstrate a computationally and memory efficient implementation of a stereo block-matching algorithm in FPGA. The computational core achieves a throughput of 577 fps at standard VGA resolution whilst consuming less than 3 Watts of power. The data is processed using an in-stream approach that minimizes memory-access bottlenecks and best matches the raster scan readout of modern digital image sensors.

  9. A Grassmann graph embedding framework for gait analysis

    Science.gov (United States)

    Connie, Tee; Goh, Michael Kah Ong; Teoh, Andrew Beng Jin

    2014-12-01

    Gait recognition is important in a wide range of monitoring and surveillance applications. Gait information has often been used as evidence when other biometrics is indiscernible in the surveillance footage. Building on recent advances of the subspace-based approaches, we consider the problem of gait recognition on the Grassmann manifold. We show that by embedding the manifold into reproducing kernel Hilbert space and applying the mechanics of graph embedding on such manifold, significant performance improvement can be obtained. In this work, the gait recognition problem is studied in a unified way applicable for both supervised and unsupervised configurations. Sparse representation is further incorporated in the learning mechanism to adaptively harness the local structure of the data. Experiments demonstrate that the proposed method can tolerate variations in appearance for gait identification effectively.

  10. Vehicle Embedded Data Stream Processing Platform for Android Devices

    Directory of Open Access Journals (Sweden)

    Shingo Akiyama

    2015-02-01

    Full Text Available Automotive information services utilizing vehicle data are rapidly expanding. However, there is currently no data centric software architecture that takes into account the scale and complexity of data involving numerous sensors. To address this issue, the authors have developed an in-vehicle data-stream management system for automotive embedded systems (eDSMS as data centric software architecture. Providing the data stream functionalities to drivers and passengers are highly beneficial. This paper describes a vehicle embedded data stream processing platform for Android devices. The platform enables flexible query processing with a dataflow query language and extensible operator functions in the query language on the platform. The platform employs architecture independent of data stream schema in in-vehicle eDSMS to facilitate smoother Android application program development. This paper presents specifications and design of the query language and APIs of the platform, evaluate it, and discuss the results.

  11. Expression of protein-coding genes embedded in ribosomal DNA

    DEFF Research Database (Denmark)

    Johansen, Steinar D; Haugen, Peik; Nielsen, Henrik

    2007-01-01

    Ribosomal DNA (rDNA) is a specialised chromosomal location that is dedicated to high-level transcription of ribosomal RNA genes. Interestingly, rDNAs are frequently interrupted by parasitic elements, some of which carry protein genes. These are non-LTR retrotransposons and group II introns...... that encode reverse transcriptase-like genes, and group I introns and archaeal introns that encode homing endonuclease genes (HEGs). Although rDNA-embedded protein genes are widespread in nuclei, organelles and bacteria, there is surprisingly little information available on how these genes are expressed....... Exceptions include a handful of HEGs from group I introns. Recent studies have revealed unusual and essential roles of group I and group I-like ribozymes in the endogenous expression of HEGs. Here we discuss general aspects of rDNA-embedded protein genes and focus on HEG expression from group I introns...

  12. System Level Modelling and Performance Estimation of Embedded Systems

    DEFF Research Database (Denmark)

    Tranberg-Hansen, Anders Sejer

    is simulation based and allows performance estimation to be carried out throughout all design phases ranging from early functional to cycle accurate and bit true descriptions of the system, modelling both hardware and software components in a unied way. Design space exploration and performance estimation...... an efficient system level design methodology, a modelling framework for performance estimation and design space exploration at the system level is required. This thesis presents a novel component based modelling framework for system level modelling and performance estimation of embedded systems. The framework...... is performed by having the framework produce detailed quantitative information about the system model under investigation. The project is part of the national Danish research project, Danish Network of Embedded Systems (DaNES), which is funded by the Danish National Advanced Technology Foundation. The project...

  13. Design of Objects Tracking System Based on ARM Embedded Platform

    Institute of Scientific and Technical Information of China (English)

    XU Mei; SONG Yong-duan; LV Shao-dong; LIU Zhi-long; HUANG Cong-ying

    2014-01-01

    In recent years, according to the need of intelligent video surveillance system increasing rapidly in metropolitan cities ,a design based on S3C2440 microprocessor and embedded Linux operating system is adopted for real-time video target tracking. However, it is very challenging as embedded systems usually afford limited processing power and limited resources. Therefore, to address this problem, a real-time tracking algorithm using multi-features based on compressive sensing is proposed and implemented. The algorithm uses multiple matrix as the projection matrix of the compressive sensing and the compressed date as the multiple features to extract useful information needed by tracking process. Functions and libraries in OpenCV which were developed by Intel Corporation are utilized for building the tracking algorithms. It is tested with variant video sequences and the results show that the algorithm achieves stable tracking for the target moved of the light changed.

  14. The art of designing embedded systems

    CERN Document Server

    Ganssle, Jack G

    2000-01-01

    Art of Designing Embedded Systems is apart primer and part reference, aimed at practicing embedded engineers, whether working on the code or the hardware design. Embedded systems suffer from a chaotic, ad hoc development process. This books lays out a very simple seven-step plan to get firmware development under control. There are no formal methodologies to master; the ideas are immediately useful. Most designers are unaware that code complexity grows faster than code size. This book shows a number of ways to linearize the complexity/size curve and get products out faster

  15. On Injective Embeddings of Tree Patterns

    CERN Document Server

    Michaliszyn, Jakub; Staworko, Sławek; Wieczorek, Piotr; Wu, Zhilin

    2012-01-01

    We study three different kinds of embeddings of tree patterns: weakly-injective, ancestor-preserving, and lca-preserving. While each of them is often referred to as injective embedding, they form a proper hierarchy and their computational properties vary (from P to NP-complete). We present a thorough study of the complexity of the model checking problem i.e., is there an embedding of a given tree pattern in a given tree, and we investigate the impact of various restrictions imposed on the tree pattern: bound on the degree of a node, bound on the height, and type of allowed labels and edges.

  16. Technology report on Railway Embedded Network solutions

    OpenAIRE

    Wahl, M; BERNOCCHI, M; Just, P.; WEISS, AH; GOIKOETXEA, J; BILLION, J; NEMORIN, J

    2007-01-01

    Deliverable D3D.3.1 Technology report on Railway Embedded Network solutions is a deliverable of Work Package SP3D_WP3 ICOM Specification & Telecom Interfaces of Onboard and Train Train Networks. It takes place within the InteGRail Task 3D_03.1 State of the Art in Embedded Networks. The objectives of this deliverable are: - to consider which embedded communication network technologies are already into ser-vice within the trains; - to analyse Ethernet-based technologies; - to evaluate how Ethe...

  17. Secure smart embedded devices, platforms and applications

    CERN Document Server

    Markantonakis, Konstantinos

    2013-01-01

    New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and consider

  18. Embedded Solenoid Transformer for Power Conversion

    DEFF Research Database (Denmark)

    2015-01-01

    A resonant power converter for operation in the radio frequency range, preferably in the VHF, comprises at least one PCB-embedded transformer. The transformer is configured for radio frequency operation and comprises a printed circuit board defining a horizontal plane, the printed circuit board...... and second embedded solenoids are formed in the conductive layers of the printed circuit board, wherein each full turn of an embedded solenoid has a horizontal top portion formed in an upper conductive layer, a horizontal bottom portion formed in a lower conductive layer, and two vertical side portions...

  19. Capacities of linear quantum optical systems

    Science.gov (United States)

    Lupo, Cosmo; Giovannetti, Vittorio; Pirandola, Stefano; Mancini, Stefano; Lloyd, Seth

    2012-06-01

    A wide variety of communication channels employ the quantized electromagnetic field to convey information. Their communication capacity crucially depends on losses associated to spatial characteristics of the channel such as diffraction and antenna design. Here we focus on the communication via a finite pupil, showing that diffraction is formally described as a memory channel. By exploiting this equivalence we then compute the communication capacity of an optical refocusing system, modeled as a converging lens. Even though loss of information originates from the finite pupil of the lens, we show that the presence of the refocusing system can substantially enhance the communication capacity. We mainly concentrate on communication of classical information, the extension to quantum information being straightforward.

  20. Capacities of linear quantum optical systems

    CERN Document Server

    Lupo, Cosmo; Pirandola, Stefano; Mancini, Stefano; Lloyd, Seth

    2012-01-01

    A wide variety of communication channels employ the quantized electromagnetic field to convey information. Their communication capacity crucially depends on losses associated to spatial characteristics of the channel such as diffraction and antenna design. Here we focus on the communication via a finite pupil, showing that diffraction is formally described as a memory channel. By exploiting this equivalence we then compute the communication capacity of an optical refocusing system, modeled as a converging lens. Even though loss of information originates from the finite pupil of the lens, we show that the presence of the refocusing system can substantially enhance the communication capacity. We mainly concentrate on communication of classical information, the extension to quantum information being straightforward.

  1. CO diffusion capacity

    Energy Technology Data Exchange (ETDEWEB)

    Mielke, U.

    1979-01-01

    We measured in 287 persons the pulmonary CO diffusion capacity with the steady-state and the single breath methods, applying apnoeic periods of 4 and 10 seconds duration. The aspects methodical significance, polyclinical applicability and pathognostic relevance with respect to other approved pulmonary functional tests are discussed. Differing pulmonary diffusion capacity values found in normal persons or in patients suffering from silicosis, pulmonary fibrosis, Boeck's disease or rheumatoid arthritis, were investigated and critically evaluated.

  2. Revisiting Absorptive Capacity

    DEFF Research Database (Denmark)

    de Araújo, Ana Luiza Lara; Ulhøi, John Parm; Lettl, Christopher

    Absorptive capacity has mostly been perceived as a 'passive' outcome of R&D investments. Recently, however, a growing interest into its 'proactive' potentials has emerged. This paper taps into this development and proposes a dynamic model for conceptualizing the determinants of the complementary...... learning processes of absorptive capacity, which comprise combinative and adaptive capabilities. Drawing on survey data (n=169), the study concludes that combinative capabilities primarily enhance transformative and exploratory learning processes, while adaptive capabilities strengthen all three learning...

  3. Revisiting Absorptive Capacity

    DEFF Research Database (Denmark)

    de Araújo, Ana Luiza Lara; Ulhøi, John Parm; Lettl, Christopher

    Absorptive capacity has mostly been perceived as a 'passive' outcome of R&D investments. Recently, however, a growing interest into its 'proactive' potentials has emerged. This paper taps into this development and proposes a dynamic model for conceptualizing the determinants of the complementary...... learning processes of absorptive capacity, which comprise combinative and adaptive capabilities. Drawing on survey data (n=169), the study concludes that combinative capabilities primarily enhance transformative and exploratory learning processes, while adaptive capabilities strengthen all three learning...

  4. Normalized steganographic capacity of digital image%图像隐写容量归一化研究

    Institute of Scientific and Technical Information of China (English)

    陈够喜; 张鹏程; 伍玉良

    2012-01-01

    To solve the promble that a variety of digital image steganography capacity cannot be unified measure issues, an embedding method with high steganographic capacity is proposed. Based on the explanation of the least significant bit (LSB) steganography technology, It is proven that payload of image is equal or less two times the number of pixels by changing at most 1 bit in a pixel, and maximum steganographic capacity for color, gray and binary images is normalized, and batch steganographic payload is increased more than one times. Embedding and extracting algorithm for secret information is presented, after some rules for images steganography are summarized. The validity of the theory is verified by experimental results and data analysis, and viable solutions are provided for normalized steganography capacity of digital image.%为解决各类数字图像的隐写容量无法统一衡量的问题,提出了数字图像的最大隐写容量归一化的算法.在阐述最低有效位(LSB)隐写技术的基础上,表明了至多改变一位后的图像的最大嵌入容量小于等于像素数的2倍,实现数字图像的最大隐写容量的归一化,将批量隐写最大容量增加了1倍.在阐述和归纳图像隐写规则后,提出了相应的隐秘信息嵌入和提取算法,并通过实例验证了所提算法的有效性,为数字图像的隐写容量归一化提供了可行的解决途径.

  5. Information Theoretic Detection of Objects Embedded in Cluttered Aerial Scenes.

    Science.gov (United States)

    1982-07-01

    procedure must only be accomplished once for each template density and most numerical problems are avoided. The Cyclic Coordinate Method ( Bazaraa , 1979:271...TApril 1962). L4. Bazaraa , Mokhtar S. and C. M. Shetty. Nonlinear Pro- gramming Theory and Algorithms. New York: John Wiley and Sons, 1979. 5. Burg, John P

  6. Flexible thin-film battery based on graphene-oxide embedded in solid polymer electrolyte

    Science.gov (United States)

    Kammoun, M.; Berg, S.; Ardebili, H.

    2015-10-01

    Enhanced safety of flexible batteries is an imperative objective due to the intimate interaction of such devices with human organs such as flexible batteries that are integrated with touch-screens or embedded in clothing or space suits. In this study, the fabrication and testing of a high performance thin-film Li-ion battery (LIB) is reported that is both flexible and relatively safer compared to the conventional electrolyte based batteries. The concept is facilitated by the use of solid polymer nanocomposite electrolyte, specifically, composed of polyethylene oxide (PEO) matrix and 1 wt% graphene oxide (GO) nanosheets. The flexible LIB exhibits a high maximum operating voltage of 4.9 V, high capacity of 0.13 mA h cm-2 and an energy density of 4.8 mW h cm-3. The battery is encapsulated using a simple lamination method that is economical and scalable. The laminated battery shows robust mechanical flexibility over 6000 bending cycles and excellent electrochemical performance in both flat and bent configurations. Finite element analysis (FEA) of the LIB provides critical insights into the evolution of mechanical stresses during lamination and bending.Enhanced safety of flexible batteries is an imperative objective due to the intimate interaction of such devices with human organs such as flexible batteries that are integrated with touch-screens or embedded in clothing or space suits. In this study, the fabrication and testing of a high performance thin-film Li-ion battery (LIB) is reported that is both flexible and relatively safer compared to the conventional electrolyte based batteries. The concept is facilitated by the use of solid polymer nanocomposite electrolyte, specifically, composed of polyethylene oxide (PEO) matrix and 1 wt% graphene oxide (GO) nanosheets. The flexible LIB exhibits a high maximum operating voltage of 4.9 V, high capacity of 0.13 mA h cm-2 and an energy density of 4.8 mW h cm-3. The battery is encapsulated using a simple lamination method

  7. Quasi-superactivation for the classical capacity of quantum channels

    Energy Technology Data Exchange (ETDEWEB)

    Gyongyosi, Laszlo, E-mail: gyongyosi@hit.bme.hu [Quantum Technologies Laboratory, Department of Telecommunications, Budapest University of Technology and Economics, 2 Magyar tudosok krt, Budapest, H-1117, Hungary and Information Systems Research Group, Mathematics and Natural Sciences, Hungarian Ac (Hungary); Imre, Sandor [Quantum Technologies Laboratory, Department of Telecommunications, Budapest University of Technology and Economics, 2 Magyar tudosok krt, Budapest, H-1117 (Hungary)

    2014-12-04

    The superactivation effect has its roots in the extreme violation of additivity of the channel capacity and enables to reliably transmit quantum information over zero-capacity quantum channels. In this work we demonstrate a similar effect for the classical capacity of a quantum channel which previously was thought to be impossible.

  8. 嵌入型信息产业集群行为整合、合作模式与知识共享--信任机制的调节效应%Study on the Relationship of Embedded Information Industrial Cluster among Behavioral Integration, Cooperation Mode and Knowledge Sharing---Based on the Moderating of Trust Mechanism

    Institute of Scientific and Technical Information of China (English)

    周大铭

    2016-01-01

    当下信息产业日益发展,知识共享已经成为企业提升竞争力的关键。本文在总结梳理现有研究成果后,将行为整合和合作模式引入到信息产业集群知识共享关系中,构建行为整合和合作模式与知识共享的概念模型,引入信任机制作为调节变量,并运用结构方程模型进行实证检验。研究发现:行为整合和合作模式对于提升信息产业集群内知识共享效果都具有显著地正向影响,信任机制在行为整合和合作模式与知识共享关系中发挥正向调节作用。%With the development of information industry , knowledge sharing has become the key for businesses to enhance the com-petitiveness . Based on the literature review , this paper constructs the impact mechanism concept model , and studies on the relationship of embedded information industrial cluster among behavioral integration , cooperation mode and knowledge sharing based on the moderating of trust mechanism . Then , this paper uses the structure equation model to analyze the impact mechanism concept model and has the following findings:the behavioral integration and cooperation mode have the significantly positive impact on the knowledge sharing , and the trust mechanism plays a moderating role between behavioral integration and knowledge sharing , cooperation mode and knowledge sharing .

  9. Approximate Capacity of Gaussian Relay Networks

    CERN Document Server

    Avestimehr, Amir Salman; Tse, David N C

    2008-01-01

    We present an achievable rate for general Gaussian relay networks. We show that the achievable rate is within a constant number of bits from the information-theoretic cut-set upper bound on the capacity of these networks. This constant depends on the topology of the network, but not the values of the channel gains. Therefore, we uniformly characterize the capacity of Gaussian relay networks within a constant number of bits, for all channel parameters.

  10. On entanglement-assisted classical capacity

    CERN Document Server

    Holevo, A S

    2001-01-01

    This paper is essentially a lecture from the author's course on quantum information theory, which is devoted to the result of C. H. Bennett, P. W. Shor, J. A. Smolin and A. V. Thapliyal (quant-ph/0106052) concerning entanglement-assisted classical capacity of a quantum channel. A modified proof of this result is given and relation between entanglement-assisted and unassisted classical capacities is discussed.

  11. Power for Vehicle Embedded MEMS Sensors Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Embedded wireless sensors of the future will enable flight vehicle systems to be "highly aware" of onboard health and performance parameters, as well as the external...

  12. Embedding Moodle into Ubiquitous Computing Environments

    NARCIS (Netherlands)

    Glahn, Christian; Specht, Marcus

    2010-01-01

    Glahn, C., & Specht, M. (2010). Embedding Moodle into Ubiquitous Computing Environments. In M. Montebello, et al. (Eds.), 9th World Conference on Mobile and Contextual Learning (MLearn2010) (pp. 100-107). October, 19-22, 2010, Valletta, Malta.

  13. Conforming finite elements with embedded strong discontinuities

    NARCIS (Netherlands)

    Dias-da-Costa, D.; Alfaiate, J.; Sluys, L.J.; Areias, P.; Fernandes, C.; Julio, E.

    2012-01-01

    The possibility of embedding strong discontinuities into finite elements allowed the simulation of different problems, namely, brickwork masonry fracture, dynamic fracture, failure in finite strain problems and simulation of reinforcement concrete members. However, despite the significant contributi

  14. Power for Vehicle Embedded MEMS Sensors Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Embedded wireless sensors of the future will enable flight vehicle systems to be "highly aware" of onboard health and performance parameters, as well as the...

  15. Female Climacteric Syndrome Treated by Ear Embedding

    Institute of Scientific and Technical Information of China (English)

    王勤

    2003-01-01

    @@ Female climacteric syndrome is a common disease occurring before and after menopause. The author has treated the disease with ear embedding therapy, and achieved satisfactory therapeutic results. The following is a report of the clinical observation.

  16. A randomized model for communicating embedded systems

    NARCIS (Netherlands)

    Bujorianu, M.C.; Bujorianu, L.M.

    2008-01-01

    Nowadays, there is an intense research activity in designing systems that operate in real life, physical environments. This research is spanned by various areas in computer science and engineering: embedded systems, reactive systems, wireless communications, hybrid systems, stochastic processes, etc

  17. Using Buildroot for building Embedded Linux Systems

    OpenAIRE

    Ruiz González, Mariano

    2013-01-01

    This document describes the basic steps to developed and embedded Linux-based system using the BeagleBoard. The document has been specifically written to use a BeagleBoard development system based on the OMAP `processor.

  18. Piecewise flat embeddings for hyperspectral image analysis

    Science.gov (United States)

    Hayes, Tyler L.; Meinhold, Renee T.; Hamilton, John F.; Cahill, Nathan D.

    2017-05-01

    Graph-based dimensionality reduction techniques such as Laplacian Eigenmaps (LE), Local Linear Embedding (LLE), Isometric Feature Mapping (ISOMAP), and Kernel Principal Components Analysis (KPCA) have been used in a variety of hyperspectral image analysis applications for generating smooth data embeddings. Recently, Piecewise Flat Embeddings (PFE) were introduced in the computer vision community as a technique for generating piecewise constant embeddings that make data clustering / image segmentation a straightforward process. In this paper, we show how PFE arises by modifying LE, yielding a constrained ℓ1-minimization problem that can be solved iteratively. Using publicly available data, we carry out experiments to illustrate the implications of applying PFE to pixel-based hyperspectral image clustering and classification.

  19. Time-Scale Invariant Audio Data Embedding

    Directory of Open Access Journals (Sweden)

    Mansour Mohamed F

    2003-01-01

    Full Text Available We propose a novel algorithm for high-quality data embedding in audio. The algorithm is based on changing the relative length of the middle segment between two successive maximum and minimum peaks to embed data. Spline interpolation is used to change the lengths. To ensure smooth monotonic behavior between peaks, a hybrid orthogonal and nonorthogonal wavelet decomposition is used prior to data embedding. The possible data embedding rates are between 20 and 30 bps. However, for practical purposes, we use repetition codes, and the effective embedding data rate is around 5 bps. The algorithm is invariant after time-scale modification, time shift, and time cropping. It gives high-quality output and is robust to mp3 compression.

  20. A randomized model for communicating embedded systems

    NARCIS (Netherlands)

    Bujorianu, M.C.; Bujorianu, L.M.

    2008-01-01

    Nowadays, there is an intense research activity in designing systems that operate in real life, physical environments. This research is spanned by various areas in computer science and engineering: embedded systems, reactive systems, wireless communications, hybrid systems, stochastic processes,