WorldWideScience

Sample records for information embedding capacity

  1. Electric distribution systems and embedded generation capacity

    International Nuclear Information System (INIS)

    Calderaro, V.; Galdi, V.; Piccolo, A.; Siano, P.

    2006-01-01

    The main policy issues of European States are sustainable energy supply promotion and liberalization of energy markets, which introduced market competition in electricity production and created support mechanisms to encourage renewable electricity production and consumption. As a result of liberalization, any generator, including small-scale and renewable energy based units, can sell electricity on the free market. In order to meet future sustainability targets, connection of a higher number of Distributed Generation (DG) units to the electrical power system is expected, requiring changes in the design and operation of distribution electricity systems, as well as changes in electricity network regulation. In order to assist distribution system operators in planning and managing DG connections and in maximizing DG penetration and renewable sources exploitation, this paper proposed a reconfiguration methodology based on a Genetic Algorithm (GA), that was tested on a 70-bus system with DG units. The simulation results confirmed that the methodology represents a suitable tool for distribution system operators when dealing with DG capacity expansion and power loss issues, providing information regarding the potential penetration network-wide and allowing maximum exploitation of renewable generation. 35 refs., 4 tabs., 6 figs

  2. Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.

    Science.gov (United States)

    Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong

    2015-01-01

    Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

  3. Exploring Embedded Path Capacity Estimation in TCP Receiver

    NARCIS (Netherlands)

    Marcondes, Cesar; Sanadidi, M.Y.; Gerla, Mario; Martinello, Magnos; de Souza Schwartz, Ramon

    2007-01-01

    Accurate estimation of network characteristics, such as capacity, based on non-intrusive measurements is a fundamental desire of several applications. For instance, P2P applications that build overlay networks can use path capacity for optimizing network performance. We present a simple technique to

  4. Study on the bearing capacity of embedded chute on shield tunnel segment

    Science.gov (United States)

    Fanzhen, Zhang; Jie, Bu; Zhibo, Su; Qigao, Hu

    2018-05-01

    The method of perforation and steel implantation is often used to fix and install pipeline, cables and other facilities in the shield tunnel, which would inevitably do damage to the precast segments. In order to reduce the damage and the resulting safety and durability problems, embedded chute was set at the equipment installation in one shield tunnel. Finite element models of segment concrete and steel are established in this paper. When water-soil pressure calculated separately and calculated together, the mechanical property of segment is studied. The bearing capacity and deformation of segment are analysed before and after embedding the chute. Research results provide a reference for similar shield tunnel segment engineering.

  5. Embedded Design Research of Iris Information Acquisition System

    Directory of Open Access Journals (Sweden)

    Huiyan Xu

    2014-09-01

    Full Text Available In view of the limitation of traditional identification, it is easy to lose and copy keys, cards or ID cards, and it is easy to forget the password, so we designed an embedded application system based on the iris identification technology, which can realize the functions of gathering, inputting, and registering the iris information and identification. The hardware circuit was designed by using advanced RISC machines (ARM embedded microprocessor as the core. The iris sensor was used to gather the iris information, and the development of software was accomplished with the embedded OS Windows CE. The system can be used on the company entrance guard system, customs security of airport and criminal identification.

  6. Graph embedding with rich information through heterogeneous graph

    KAUST Repository

    Sun, Guolei

    2017-11-12

    Graph embedding, aiming to learn low-dimensional representations for nodes in graphs, has attracted increasing attention due to its critical application including node classification, link prediction and clustering in social network analysis. Most existing algorithms for graph embedding only rely on the topology information and fail to use the copious information in nodes as well as edges. As a result, their performance for many tasks may not be satisfactory. In this thesis, we proposed a novel and general framework for graph embedding with rich text information (GERI) through constructing a heterogeneous network, in which we integrate node and edge content information with graph topology. Specially, we designed a novel biased random walk to explore the constructed heterogeneous network with the notion of flexible neighborhood. Our sampling strategy can compromise between BFS and DFS local search on heterogeneous graph. To further improve our algorithm, we proposed semi-supervised GERI (SGERI), which learns graph embedding in an discriminative manner through heterogeneous network with label information. The efficacy of our method is demonstrated by extensive comparison experiments with 9 baselines over multi-label and multi-class classification on various datasets including Citeseer, Cora, DBLP and Wiki. It shows that GERI improves the Micro-F1 and Macro-F1 of node classification up to 10%, and SGERI improves GERI by 5% in Wiki.

  7. Inventory management with advance capacity information

    NARCIS (Netherlands)

    Jaksic, M.; Fransoo, J.C.; Tan, T.; Kok, de A.G.; Rusjan, B.

    2008-01-01

    One of the important aspects of supply chain management is dealing with demand and supply uncertainty. The uncertainty of future supply can be reduced, if a company is able to obtain advance capacity information (ACI) on future supply/production capacity availability from its supplier. We address a

  8. Inventory management with advance capacity information

    NARCIS (Netherlands)

    Jaksic, M.; Fransoo, J.C.; Tan, T.; Kok, de A.G.; Rusjan, B.

    2011-01-01

    An important aspect of supply chain management is dealing with demand and supply uncertainty. The uncertainty of future supply can be reduced if a company is able to obtain advance capacity information (ACI) about future supply/production capacity availability from its supplier. We address a

  9. Developing Evaluation Capacity in Information and Communication ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    17 août 2009 ... The nuanced ways in which information and communication technologies (ICTs) interact with developing country societies necessitate thoughtful, systematic evaluation of their effects, grounded in the concepts of utility, outcome and ownership. This grant will allow Developing Evaluation Capacity in ICT4D ...

  10. Visual words assignment via information-theoretic manifold embedding.

    Science.gov (United States)

    Deng, Yue; Li, Yipeng; Qian, Yanjun; Ji, Xiangyang; Dai, Qionghai

    2014-10-01

    Codebook-based learning provides a flexible way to extract the contents of an image in a data-driven manner for visual recognition. One central task in such frameworks is codeword assignment, which allocates local image descriptors to the most similar codewords in the dictionary to generate histogram for categorization. Nevertheless, existing assignment approaches, e.g., nearest neighbors strategy (hard assignment) and Gaussian similarity (soft assignment), suffer from two problems: 1) too strong Euclidean assumption and 2) neglecting the label information of the local descriptors. To address the aforementioned two challenges, we propose a graph assignment method with maximal mutual information (GAMI) regularization. GAMI takes the power of manifold structure to better reveal the relationship of massive number of local features by nonlinear graph metric. Meanwhile, the mutual information of descriptor-label pairs is ultimately optimized in the embedding space for the sake of enhancing the discriminant property of the selected codewords. According to such objective, two optimization models, i.e., inexact-GAMI and exact-GAMI, are respectively proposed in this paper. The inexact model can be efficiently solved with a closed-from solution. The stricter exact-GAMI nonparametrically estimates the entropy of descriptor-label pairs in the embedding space and thus leads to a relatively complicated but still trackable optimization. The effectiveness of GAMI models are verified on both the public and our own datasets.

  11. ESTIMATION OF FILTRATION CAPACITY OF POSTFLOTATION TAILINGS EMBEDDED IN DAMS OF TAILINGS DEPOSITION SITES

    Directory of Open Access Journals (Sweden)

    Wojciech Tschuschke

    2015-10-01

    Full Text Available Construction of very big mine tailings deposition sites, such as postflotation tailings ponds, is a complicated engineering task, in which several technical and environmental problems need to be solved. Designing, construction and operation of such an object applying the monitoring method consists in the verification of design assumptions based on continuous observations. One of the primary tasks of monitoring while the deposition site is being filled with tailings is to control quality of the formed dam embankments, as the structural element of the object responsible for its stability. In order to use material selected from deposited tailings in the construction of dams it is necessary to define grain size and compaction criteria, which directly affect load bearing capacity and deformation of the structure. For this reason main control tests include the analyses of grain size distribution and physical properties of the material embedded in the dams. These data may also be used to estimate filtration capacity of the embankment. A lack of drainage, causing accumulation of water within the embankment, may potentially deteriorate stability conditions. This paper presents the use of empirical formulas, i.e. formulas typically applied to natural soils, to assess permeability coefficient of tailings. A simple empirical formula was also proposed for the estimation of permeability coefficient of tailings based on grain size and compaction parameters determined in routine quality tests of constructed dam embankments.

  12. Information Processing Capacity of Dynamical Systems

    Science.gov (United States)

    Dambre, Joni; Verstraeten, David; Schrauwen, Benjamin; Massar, Serge

    2012-07-01

    Many dynamical systems, both natural and artificial, are stimulated by time dependent external signals, somehow processing the information contained therein. We demonstrate how to quantify the different modes in which information can be processed by such systems and combine them to define the computational capacity of a dynamical system. This is bounded by the number of linearly independent state variables of the dynamical system, equaling it if the system obeys the fading memory condition. It can be interpreted as the total number of linearly independent functions of its stimuli the system can compute. Our theory combines concepts from machine learning (reservoir computing), system modeling, stochastic processes, and functional analysis. We illustrate our theory by numerical simulations for the logistic map, a recurrent neural network, and a two-dimensional reaction diffusion system, uncovering universal trade-offs between the non-linearity of the computation and the system's short-term memory.

  13. Information Processing Capacity of Dynamical Systems

    Science.gov (United States)

    Dambre, Joni; Verstraeten, David; Schrauwen, Benjamin; Massar, Serge

    2012-01-01

    Many dynamical systems, both natural and artificial, are stimulated by time dependent external signals, somehow processing the information contained therein. We demonstrate how to quantify the different modes in which information can be processed by such systems and combine them to define the computational capacity of a dynamical system. This is bounded by the number of linearly independent state variables of the dynamical system, equaling it if the system obeys the fading memory condition. It can be interpreted as the total number of linearly independent functions of its stimuli the system can compute. Our theory combines concepts from machine learning (reservoir computing), system modeling, stochastic processes, and functional analysis. We illustrate our theory by numerical simulations for the logistic map, a recurrent neural network, and a two-dimensional reaction diffusion system, uncovering universal trade-offs between the non-linearity of the computation and the system's short-term memory. PMID:22816038

  14. Wavelet based mobile video watermarking: spread spectrum vs. informed embedding

    Science.gov (United States)

    Mitrea, M.; Prêteux, F.; Duţă, S.; Petrescu, M.

    2005-11-01

    The cell phone expansion provides an additional direction for digital video content distribution: music clips, news, sport events are more and more transmitted toward mobile users. Consequently, from the watermarking point of view, a new challenge should be taken: very low bitrate contents (e.g. as low as 64 kbit/s) are now to be protected. Within this framework, the paper approaches for the first time the mathematical models for two random processes, namely the original video to be protected and a very harmful attack any watermarking method should face the StirMark attack. By applying an advanced statistical investigation (combining the Chi square, Ro, Fisher and Student tests) in the discrete wavelet domain, it is established that the popular Gaussian assumption can be very restrictively used when describing the former process and has nothing to do with the latter. As these results can a priori determine the performances of several watermarking methods, both of spread spectrum and informed embedding types, they should be considered in the design stage.

  15. Graph embedding with rich information through heterogeneous graph

    KAUST Repository

    Sun, Guolei

    2017-01-01

    Graph embedding, aiming to learn low-dimensional representations for nodes in graphs, has attracted increasing attention due to its critical application including node classification, link prediction and clustering in social network analysis. Most

  16. Finite Element Analysis of the Effect on Edge Distance of the Tensile Bearing Capacity of Embedded Hanging Parts

    Directory of Open Access Journals (Sweden)

    Meng Xian Hong

    2016-01-01

    Full Text Available In order to explore the trend of tensile bearing capacity of embedded hanging parts when change the edge distance. Based on the finite element analysis software ABAQUS, the four simulation model was established. The buried depth and strength of concrete remain unchanged, but the edge distance was gradient change. By the load - displacement curve of every model known, the greater the edge distance, the greater the bearing capacity. When the edge distance reaches 1.5 times buried depth, the effect of increasing edge distance for improving the bearing capacity will be impaired.

  17. 2009 Capacity Building For Library and Information Centre

    African Journals Online (AJOL)

    discussed the features of digitized/virtual library and information centre and the need for capacity building especially in .... electronic library, virtual reality, digital library, community library .... architecture of the existing information system and ...

  18. Strengthening Information Society Research Capacity Alliance ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-09-13

    The project is expected to strengthen the body of theoretically based, methodologically sound, interdisciplinary research on information society issues. Project ID. 106618. Project status. Closed. Start Date. September 13, 2011. End Date. August 12, 2014. Duration. 24 months. IDRC Officer. Smith, Matthew. Total funding.

  19. Heave induced reduction of friction capacity of pile embedded in clays

    OpenAIRE

    Setyo Budi Gogot; Wibowo Tantri Gondo

    2017-01-01

    Installation of new piles may cause heave which influence friction capacity of existing piles. The heave can be observed from the difference in the elevation of existing pile heads recorded before and after the installation of new piles or through load-settlement diagram from Static Load Test data. This paper presents the study of bearing capacity of hollow cylindrical concrete piles with diameter of 800 mm from two projects. The piles at Project I and Project II were hydraulically jacked int...

  20. Embedding information retrieval in adaptive hypermedia : IR meets AHA!

    NARCIS (Netherlands)

    Aroyo, L.M.; De Bra, P.M.E.; Houben, G.J.P.M.; De Bra, P.M.E.; etal, xx

    2003-01-01

    Traditionally, adaptive hypermedia research concentrates on "closed" applications (with fixed contents). Certain applications ask for an extension of the contents considered, with data obtained through information retrieval. This paper addresses this issue, and tries to give an insight into research

  1. Embedment Effects on Vertical Bearing Capacity of Offshore Bucket Foundations on Cohesionless Soil

    DEFF Research Database (Denmark)

    Barari, Amin; Ibsen, Lars Bo; Ghalesari, Abbasali Taghavi

    2017-01-01

    This paper presents the results from a series of physical modeling and three-dimensional finite 9 element (FE) analyses, which examined the uniaxial vertical capacity of suction caissons for 10 offshore wind turbines. The experiments were carried out in quartz sand and involved monotonic 11 appli...

  2. Efficient physical embedding of topologically complex information processing networks in brains and computer circuits.

    Directory of Open Access Journals (Sweden)

    Danielle S Bassett

    2010-04-01

    Full Text Available Nervous systems are information processing networks that evolved by natural selection, whereas very large scale integrated (VLSI computer circuits have evolved by commercially driven technology development. Here we follow historic intuition that all physical information processing systems will share key organizational properties, such as modularity, that generally confer adaptivity of function. It has long been observed that modular VLSI circuits demonstrate an isometric scaling relationship between the number of processing elements and the number of connections, known as Rent's rule, which is related to the dimensionality of the circuit's interconnect topology and its logical capacity. We show that human brain structural networks, and the nervous system of the nematode C. elegans, also obey Rent's rule, and exhibit some degree of hierarchical modularity. We further show that the estimated Rent exponent of human brain networks, derived from MRI data, can explain the allometric scaling relations between gray and white matter volumes across a wide range of mammalian species, again suggesting that these principles of nervous system design are highly conserved. For each of these fractal modular networks, the dimensionality of the interconnect topology was greater than the 2 or 3 Euclidean dimensions of the space in which it was embedded. This relatively high complexity entailed extra cost in physical wiring: although all networks were economically or cost-efficiently wired they did not strictly minimize wiring costs. Artificial and biological information processing systems both may evolve to optimize a trade-off between physical cost and topological complexity, resulting in the emergence of homologous principles of economical, fractal and modular design across many different kinds of nervous and computational networks.

  3. Information Transfer Capacity of Articulators in American Sign Language.

    Science.gov (United States)

    Malaia, Evie; Borneman, Joshua D; Wilbur, Ronnie B

    2018-03-01

    The ability to convey information is a fundamental property of communicative signals. For sign languages, which are overtly produced with multiple, completely visible articulators, the question arises as to how the various channels co-ordinate and interact with each other. We analyze motion capture data of American Sign Language (ASL) narratives, and show that the capacity of information throughput, mathematically defined, is highest on the dominant hand (DH). We further demonstrate that information transfer capacity is also significant for the non-dominant hand (NDH), and the head channel too, as compared to control channels (ankles). We discuss both redundancy and independence in articulator motion in sign language, and argue that the NDH and the head articulators contribute to the overall information transfer capacity, indicating that they are neither completely redundant to, nor completely independent of, the DH.

  4. The capacity of black holes to transmit quantum information

    International Nuclear Information System (INIS)

    Brádler, Kamil; Adami, Christoph

    2014-01-01

    We study the properties of the quantum information transmission channel that emerges from the quantum dynamics of particles interacting with a black hole horizon. We calculate the quantum channel capacity in two limiting cases where a single-letter capacity is known to exist: the limit of perfectly reflecting and perfectly absorbing black holes. We find that the perfectly reflecting black hole channel is closely related to the Unruh channel and that its capacity is non-vanishing, allowing for the perfect reconstruction of quantum information outside of the black hole horizon. We also find that the complementary channel (transmitting entanglement behind the horizon) is entanglement-breaking in this case, with vanishing capacity. We then calculate the quantum capacity of the black hole channel in the limit of a perfectly absorbing black hole and find that this capacity vanishes, while the capacity of the complementary channel is non-vanishing instead. Rather than inviting a new crisis for quantum physics, this finding instead is in accordance with the quantum no-cloning theorem, because it guarantees that there are no space-like surfaces that contain both the sender’s quantum state and the receiver’s reconstructed quantum state

  5. The capacity of black holes to transmit quantum information

    Energy Technology Data Exchange (ETDEWEB)

    Brádler, Kamil [Department of Astronomy and Physics, Saint Mary’s University,Halifax, Nova Scotia, B3H 3C3 (Canada); Adami, Christoph [Department of Physics and Astronomy, Michigan State University,East Lansing, MI 48824 (United States)

    2014-05-21

    We study the properties of the quantum information transmission channel that emerges from the quantum dynamics of particles interacting with a black hole horizon. We calculate the quantum channel capacity in two limiting cases where a single-letter capacity is known to exist: the limit of perfectly reflecting and perfectly absorbing black holes. We find that the perfectly reflecting black hole channel is closely related to the Unruh channel and that its capacity is non-vanishing, allowing for the perfect reconstruction of quantum information outside of the black hole horizon. We also find that the complementary channel (transmitting entanglement behind the horizon) is entanglement-breaking in this case, with vanishing capacity. We then calculate the quantum capacity of the black hole channel in the limit of a perfectly absorbing black hole and find that this capacity vanishes, while the capacity of the complementary channel is non-vanishing instead. Rather than inviting a new crisis for quantum physics, this finding instead is in accordance with the quantum no-cloning theorem, because it guarantees that there are no space-like surfaces that contain both the sender’s quantum state and the receiver’s reconstructed quantum state.

  6. Embedded Information Literacy in the Basic Oral Communication Course: From Conception through Assessment

    Science.gov (United States)

    Weaver, Kari D.; Pier, Penni M.

    2010-01-01

    This article explores the process of embedding information literacy into a basic oral communication course. Discussion includes student performance as an impetus for change, collaborative course design between the oral communication teaching team and instructional librarians, and assessment initiatives. Suggestions for future collaborative work…

  7. RMT Assessments of the Market Latent Information Embedded in the Stocks' Raw, Normalized, and Partial Correlations

    OpenAIRE

    Kenett, Dror Y.; Shapira, Yoash; Ben-Jacob, Eshel

    2009-01-01

    We present here assessment of the latent market information embedded in the raw, affinity (normalized), and partial correlations. We compared the Zipf plot, spectrum, and distribution of the eigenvalues for each matrix with the results of the corresponding random matrix. The analysis was performed on stocks belonging to the New York ...

  8. Evaluation of protein immobilization capacity on various carbon nanotube embedded hydrogel biomaterials

    Energy Technology Data Exchange (ETDEWEB)

    Derkus, Burak, E-mail: burakderkus@gmail.com; Emregul, Kaan Cebesoy; Emregul, Emel

    2015-11-01

    This study investigates effective immobilization of proteins, an important procedure in many fields of bioengineering and medicine, using various biomaterials. Gelatin, alginate and chitosan were chosen as polymeric carriers, and applied in both their composites and nanocomposite forms in combination with carbon nanotubes (CNTs). The prepared nano/composite structures were characterized using scanning electron microscopy (SEM), Fourier-transform infrared spectroscopy (FTIR), thermal gravimetric analysis (TG) and contact angle analysis (CA). Electrochemical impedance spectroscopy analysis revealed gelatin composites in general to exhibit better immobilization performance relative to the native gelatin which can be attributed to enhanced film morphologies of the composite structures. Moreover, superior immobilization efficiencies were obtained with the addition of carbon nanotubes, due to their conducting and surface enhancement features, especially in the gelatin–chitosan structures due to the presence of structural active groups. - Highlights: • Various nanocomposite biomaterials were developed for efficient immobilization of proteins. • CNTs enhance the immobilization efficiency owing to their conducting and surface enhancement features. • Gelatin–chitosan–CNTs structure is promising immobilization matrix thanks to its effective CNTs binding capacity.

  9. Human resource capacity for information management in selected ...

    African Journals Online (AJOL)

    Results: it was established that capacity building was usually undertaken through on-job trainings i.e. 85.1% (103) health workers had on-job training on filling of data collection tools and only 10% (13) had received formal classroom training on the same. Further, only 9.1% (11) health workers had received information ...

  10. RMT Assessments of the Market Latent Information Embedded in the Stocks' Raw, Normalized, and Partial Correlations

    Directory of Open Access Journals (Sweden)

    Dror Y. Kenett

    2009-01-01

    Full Text Available We present here assessment of the latent market information embedded in the raw, affinity (normalized, and partial correlations. We compared the Zipf plot, spectrum, and distribution of the eigenvalues for each matrix with the results of the corresponding random matrix. The analysis was performed on stocks belonging to the New York and Tel Aviv Stock Exchange, for the time period of January 2000 to March 2009. Our results show that in comparison to the raw correlations, the affinity matrices highlight the dominant factors of the system, and the partial correlation matrices contain more information. We propose that significant stock market information, which cannot be captured by the raw correlations, is embedded in the affinity and partial correlations. Our results further demonstrate the differences between NY and TA markets.

  11. An information capacity limitation of visual short-term memory.

    Science.gov (United States)

    Sewell, David K; Lilburn, Simon D; Smith, Philip L

    2014-12-01

    Research suggests that visual short-term memory (VSTM) has both an item capacity, of around 4 items, and an information capacity. We characterize the information capacity limits of VSTM using a task in which observers discriminated the orientation of a single probed item in displays consisting of 1, 2, 3, or 4 orthogonally oriented Gabor patch stimuli that were presented in noise for 50 ms, 100 ms, 150 ms, or 200 ms. The observed capacity limitations are well described by a sample-size model, which predicts invariance of ∑(i)(d'(i))² for displays of different sizes and linearity of (d'(i))² for displays of different durations. Performance was the same for simultaneous and sequentially presented displays, which implicates VSTM as the locus of the observed invariance and rules out explanations that ascribe it to divided attention or stimulus encoding. The invariance of ∑(i)(d'(i))² is predicted by the competitive interaction theory of Smith and Sewell (2013), which attributes it to the normalization of VSTM traces strengths arising from competition among stimuli entering VSTM. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  12. 76 FR 56780 - Notice of Proposed Information Collection: Comment Request; Capacity Building for Sustainable...

    Science.gov (United States)

    2011-09-14

    ... Information Collection: Comment Request; Capacity Building for Sustainable Communities Program: Notice of... public comments on the subject proposal. The Capacity Building for Sustainable Communities Program... also lists the following information: Title of Proposal: Capacity Building for Sustainable Communities...

  13. The capacity to transmit classical information via black holes

    Science.gov (United States)

    Adami, Christoph; Ver Steeg, Greg

    2013-03-01

    One of the most vexing problems in theoretical physics is the relationship between quantum mechanics and gravity. According to an argument originally by Hawking, a black hole must destroy any information that is incident on it because the only radiation that a black hole releases during its evaporation (the Hawking radiation) is precisely thermal. Surprisingly, this claim has never been investigated within a quantum information-theoretic framework, where the black hole is treated as a quantum channel to transmit classical information. We calculate the capacity of the quantum black hole channel to transmit classical information (the Holevo capacity) within curved-space quantum field theory, and show that the information carried by late-time particles sent into a black hole can be recovered with arbitrary accuracy, from the signature left behind by the stimulated emission of radiation that must accompany any absorption event. We also show that this stimulated emission turns the black hole into an almost-optimal quantum cloning machine, where the violation of the no-cloning theorem is ensured by the noise provided by the Hawking radiation. Thus, rather than threatening the consistency of theoretical physics, Hawking radiation manages to save it instead.

  14. Working memory capacity and redundant information processing efficiency.

    Science.gov (United States)

    Endres, Michael J; Houpt, Joseph W; Donkin, Chris; Finn, Peter R

    2015-01-01

    Working memory capacity (WMC) is typically measured by the amount of task-relevant information an individual can keep in mind while resisting distraction or interference from task-irrelevant information. The current research investigated the extent to which differences in WMC were associated with performance on a novel redundant memory probes (RMP) task that systematically varied the amount of to-be-remembered (targets) and to-be-ignored (distractor) information. The RMP task was designed to both facilitate and inhibit working memory search processes, as evidenced by differences in accuracy, response time, and Linear Ballistic Accumulator (LBA) model estimates of information processing efficiency. Participants (N = 170) completed standard intelligence tests and dual-span WMC tasks, along with the RMP task. As expected, accuracy, response-time, and LBA model results indicated memory search and retrieval processes were facilitated under redundant-target conditions, but also inhibited under mixed target/distractor and redundant-distractor conditions. Repeated measures analyses also indicated that, while individuals classified as high (n = 85) and low (n = 85) WMC did not differ in the magnitude of redundancy effects, groups did differ in the efficiency of memory search and retrieval processes overall. Results suggest that redundant information reliably facilitates and inhibits the efficiency or speed of working memory search, and these effects are independent of more general limits and individual differences in the capacity or space of working memory.

  15. Information processing capacity in psychopathy: Effects of anomalous attention.

    Science.gov (United States)

    Hamilton, Rachel K B; Newman, Joseph P

    2018-03-01

    Hamilton and colleagues (2015) recently proposed that an integrative deficit in psychopathy restricts simultaneous processing, thereby leaving fewer resources available for information encoding, narrowing the scope of attention, and undermining associative processing. The current study evaluated this parallel processing deficit proposal using the Simultaneous-Sequential paradigm. This investigation marks the first a priori test of the Hamilton et al.'s theoretical framework. We predicted that psychopathy would be associated with inferior performance (as indexed by lower accuracy and longer response time) on trials requiring simultaneous processing of visual information relative to trials necessitating sequential processing. Results were consistent with these predictions, supporting the proposal that psychopathy is characterized by a reduced capacity to process multicomponent perceptual information concurrently. We discuss the potential implications of impaired simultaneous processing for the conceptualization of the psychopathic deficit. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  16. Informed Consent and Capacity to Give Consent in Mental Disorders

    Directory of Open Access Journals (Sweden)

    Zeynep Mackali

    2014-09-01

    Full Text Available Among four basic principles (respect for autonomy, beneficence, non-malfeasance, and justice which determine ethical behaviors in healthcare, informed consent is mostly related to and lsquo;respect for autonomy'. Also, it reflects patient/client's right for decision and the value given for the client and his/her autonomy. Informed consent is an information sharing process including both rational decision-making about the most appropriate method among many different options and the interaction between the clinician and the client. This concept sheds light on criteria regarding the limits of confidentiality, competency, appropriate and sufficient information sharing and voluntariness. In this theoretical review, the definitions and the content of informed consent were shared, and then a section regarding the required content of informed consent for psychotherapy process was provided. Then, the components of informed consent were discussed and the relationship between capacity to consent and mental disorders in terms of aforementioned diagnostic groups was examined. [Psikiyatride Guncel Yaklasimlar - Current Approaches in Psychiatry 2014; 6(3.000: 227-242

  17. Unfree markets: socially embedded informal health providers in northern Karnataka, India.

    Science.gov (United States)

    George, Asha; Iyer, Aditi

    2013-11-01

    The dynamics of informal health markets in marginalised regions are relevant to policy discourse in India, but are poorly understood. We examine how informal health markets operate from the viewpoint of informal providers (those without any government-recognised medical degrees, otherwise known as RMPs) by drawing upon data from a household survey in 2002, a provider census in 2004 and ongoing field observations from a research site in Koppal district, Karnataka, India. We find that despite their illegality, RMPs depend on government and private providers for their training and referral networks. Buffeted by unregulated market pressures, RMPs are driven to provide allopathic commodities regardless of need, but can also be circumspect in their practice. Though motivated by profit, their socially embedded practice at community level at times undermines their ability to ensure payment of fees for their services. In addition, RMPs feel that communities can threaten them via violence or malicious rumours, leading them to seek political favour and social protection from village elites and elected representatives. RMPs operate within negotiated quid pro quo bargains that lead to tenuous reciprocity or fragile trust between them and the communities in which they practise. In the context of this 'unfree' market, some RMPs reported being more embedded in health systems, more responsive to communities and more vulnerable to unregulated market pressures than others. Understanding the heterogeneity, nuanced motivations and the embedded social relations that mark informal providers in the health systems, markets and communities they work in, is critical for health system reforms. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. Impact and user satisfaction of a clinical information portal embedded in an electronic health record.

    Science.gov (United States)

    Tannery, Nancy H; Epstein, Barbara A; Wessel, Charles B; Yarger, Frances; LaDue, John; Klem, Mary Lou

    2011-01-01

    In 2008, a clinical information tool was developed and embedded in the electronic health record system of an academic medical center. In 2009, the initial information tool, Clinical-e, was superseded by a portal called Clinical Focus, with a single search box enabling a federated search of selected online information resources. To measure the usefulness and impact of Clinical Focus, a survey was used to gather feedback about users' experience with this clinical resource. The survey determined what type of clinicians were using this tool and assessed user satisfaction and perceived impact on patient care decision making. Initial survey results suggest the majority of respondents found Clinical Focus easy to navigate, the content easy to read, and the retrieved information relevant and complete. The majority would recommend Clinical Focus to their colleagues. Results indicate that this tool is a promising area for future development.

  19. Signalling information from embedded sensors to promote lifetime extension in electrical and electronic equipment

    International Nuclear Information System (INIS)

    Hickey, S; Fitzpatrick, C

    2007-01-01

    The work presented in this paper proposes how life cycle data attained from embedded sensors in electronic systems can be used to potentially enhance their environmental efficiency. Signalling is a means whereby sensor information can be utilised to enhance consumer perception of the value of used equipment and therefore promote lifetime extension for these systems. This can help mitigate a large portion of the environmental impact associated with electronic system manufacture. A case study of a Personal Computer (PC) is presented together with potential signals that can ultimately serve to stimulate secondary market activity for this system

  20. Signalling information from embedded sensors to promote lifetime extension in electrical and electronic equipment

    Science.gov (United States)

    Hickey, S.; Fitzpatrick, C.

    2007-07-01

    The work presented in this paper proposes how life cycle data attained from embedded sensors in electronic systems can be used to potentially enhance their environmental efficiency. Signalling is a means whereby sensor information can be utilised to enhance consumer perception of the value of used equipment and therefore promote lifetime extension for these systems. This can help mitigate a large portion of the environmental impact associated with electronic system manufacture. A case study of a Personal Computer (PC) is presented together with potential signals that can ultimately serve to stimulate secondary market activity for this system.

  1. The Effects of Embedding Information Technologies within ELT on EFL Learners’ Motivation and Interest

    Directory of Open Access Journals (Sweden)

    Shaker Al-Mohammadi

    2014-01-01

    Full Text Available In today’s globalised world, technologies have been embedded in every aspect of daily activities and discourses. The field of education made no exception and hence technologies have become an integral part of all educational systems worldwide, but with different levels and layers. The presence of information technology in English language teaching has brought about notable changes for teachers and learners alike. Accordingly, this paper investigates the impact of integrating information technologies in ELT on EFL learners’ motivation and interest. Based on an authentic comparative case study, this paper explores the influence of information technology on EFL learners’ perceptions, motivation, and interest in the context of ELT in the Tunisian higher education. The findings of this study suggest that the integration of IT in ELT heavily affects EFL students’ motivation and academic performance and hence EFL instructors should take this variable into consideration.

  2. Unsupervised Symbolization of Signal Time Series for Extraction of the Embedded Information

    Directory of Open Access Journals (Sweden)

    Yue Li

    2017-03-01

    Full Text Available This paper formulates an unsupervised algorithm for symbolization of signal time series to capture the embedded dynamic behavior. The key idea is to convert time series of the digital signal into a string of (spatially discrete symbols from which the embedded dynamic information can be extracted in an unsupervised manner (i.e., no requirement for labeling of time series. The main challenges here are: (1 definition of the symbol assignment for the time series; (2 identification of the partitioning segment locations in the signal space of time series; and (3 construction of probabilistic finite-state automata (PFSA from the symbol strings that contain temporal patterns. The reported work addresses these challenges by maximizing the mutual information measures between symbol strings and PFSA states. The proposed symbolization method has been validated by numerical simulation as well as by experimentation in a laboratory environment. Performance of the proposed algorithm has been compared to that of two commonly used algorithms of time series partitioning.

  3. Informing potential participants about research: observational study with an embedded randomized controlled trial.

    Directory of Open Access Journals (Sweden)

    Helen M Kirkby

    Full Text Available OBJECTIVES: To assess: 1 the feasibility of electronic information provision; 2 gather evidence on the topics and level of detail of information potential research participant's accessed; 3 to assess satisfaction and understanding. DESIGN: Observational study with an embedded randomised controlled trial. SETTING: Low risk intervention study based in primary care. PARTICIPANTS: White British & Irish, South Asian and African-Caribbean subjects aged between 40-74 years eligible for a blood pressure monitoring study. INTERVENTIONS: PDF copy of the standard paper participant information sheet (PDF-PIS and an electronic Interactive Information Sheet (IIS where participants could choose both the type and level of detail accessed. MAIN OUTCOME MEASURES: 1 Proportion of participants providing an email address and accessing electronic information 2 Willingness to participate in a recruitment clinic. 3 Type and depth of information accessed on the IIS. 4 Participant satisfaction and understanding. RESULTS: 1160 participants were eligible for the study. Of these, 276 (24% provided an active email address, of whom 84 did not respond to the email. 106 responded to the email but chose not to access any electronic information and were therefore ineligible for randomisation. 42 were randomised to receive the PDF-PIS and 44 to receive the IIS (with consent rates of 48% and 36%, respectively; odds ratio 0.6, 95% confidence interval 0.25 to 1.4. Electronic observation of information accessed by potential participants showed 41% chose to access no information and only 9% accessed the detail presented on the Research Ethics Committee approved participant information sheet before booking to attend a recruitment clinic for the intervention study. 63 of the 106 participants (59% who chose not to access any electronic information also booked an appointment. CONCLUSIONS: Current written information about research may not be read, emphasising the importance of the consent

  4. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  5. Non-uniform multivariate embedding to assess the information transfer in cardiovascular and cardiorespiratory variability series.

    Science.gov (United States)

    Faes, Luca; Nollo, Giandomenico; Porta, Alberto

    2012-03-01

    The complexity of the short-term cardiovascular control prompts for the introduction of multivariate (MV) nonlinear time series analysis methods to assess directional interactions reflecting the underlying regulatory mechanisms. This study introduces a new approach for the detection of nonlinear Granger causality in MV time series, based on embedding the series by a sequential, non-uniform procedure, and on estimating the information flow from one series to another by means of the corrected conditional entropy. The approach is validated on short realizations of linear stochastic and nonlinear deterministic processes, and then evaluated on heart period, systolic arterial pressure and respiration variability series measured from healthy humans in the resting supine position and in the upright position after head-up tilt. Copyright © 2011 Elsevier Ltd. All rights reserved.

  6. Sustainable Regulation of Information Sharing with Electronic Data Interchange by a Trust-Embedded Contract

    Directory of Open Access Journals (Sweden)

    Guanghua Han

    2017-06-01

    Full Text Available This paper studies the risks in demand information sharing applications by electronic soft-orders using electronic data interchange (EDI systems in e-commerce and aims to suggest a sustainable regulation mechanism with a trust-embedded contract. In a supply chain with one retailer and one supplier, the retailer solicits private forecasted demand and places soft-orders via EDI to the supplier. To ensure abundant supply, the retailer has an incentive to inflate her soft-orders, which potentially harms the credible information sharing and sustainability of business cooperation. Normally, the degree to which the supplier relies on the retailer’s order information is specified by trust, which is evaluated according to the retailer’s reputation and supplier’s intuition in this study. Based on standard game theory, we find that both the retailer’s order and the quantity of supplier prepared materials are independent of the retailer’s forecast. Therefore, EDI based information sharing in e-commerce without a regulation mechanism leads to inefficient demand information sharing. Since both the supplier and retailer are proved to faces huge of potential profit losses due to the failure of information sharing, the commerce by EDI based information sharing is full of risk and unsustainable. Therefore, a regulation mechanism that leaded by the retailer is proposed to establish ‘win-win’ sustainable cooperation. Numerical experiments highlight the value of trust, the impact of reputation and intuition in decisions, and the effectiveness of the regulation mechanism by a cost-sharing contract.

  7. Civil Service Human Resource Capacity and Information Technology

    African Journals Online (AJOL)

    Tesfaye

    2009-01-01

    Jan 1, 2009 ... had no impact on the size of jobs that require high-level of human resource capacity. Furthermore ... level human resource capacity has an effect on the size of supervisors, which is the main ...... depreciation. 5 This indicates ...

  8. The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information.

    Science.gov (United States)

    Miller, George A.

    1994-01-01

    Capacity limitations in absolute judgment tasks are discussed in relation to information theory. Information theory can provide a quantitative way of resolving questions about limitations on the amount of information we can receive and the process of recoding. (SLD)

  9. Building research capacity to inform practical policymaking | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-08-17

    Aug 17, 2017 ... IDRC is committed to supporting cutting-edge research led by developing country experts to create lasting change. Building strong partnerships with regional researchers and organizations through research support and capacity building is integral to the success of this approach. The African Economic ...

  10. 76 FR 71996 - Notice of Submission of Proposed Information Collection to OMB; Capacity Building for Sustainable...

    Science.gov (United States)

    2011-11-21

    ... Proposed Information Collection to OMB; Capacity Building for Sustainable Communities Program AGENCY... proposal. The Capacity Building for Sustainable Communities Program (Program), through a Notice of Funding...: Title of Proposal: Capacity Building for Sustainable Communities Program OMB Approval Number: 2501-0026...

  11. An experimental approach to estimate operator’s information processing capacity for diagnosing tasks in NPPs

    International Nuclear Information System (INIS)

    Kim, Ji Tae; Shin, Seung Ki; Kim, Jong Hyun; Seong, Poong Hyun

    2013-01-01

    Highlights: • Main control room operator’s information processing capacity is determined. • The relationship between the information processing capacity and human factors is described. • The information processing capacity results from the subjective and physiological measures are nearly identical. - Abstract: The objectives of this research are: (1) to determine information processing capacity of an operator in a main control room and (2) to describe the relationship between the information processing capacity and human factors. This research centers on the relationship, as experimentally determined, between an operator’s mental workload and information flow during accident diagnosis tasks at nuclear power plants. Based on this relationship, the operator’s information processing capacity is established. In this paper, the information processing capacity is defined as the operator’s ability to manage the amount of bits in a second when diagnosing tasks or accidents. If the operator’s performance decreases rapidly as the information flow rate (bit/s) increases, it is possible to determine the operator’s information processing capacity. The cognitive information of a diagnosis task can be quantified using an information flow model and the operator’s mental workload is measured by subjective and physiological measures. NASA-TLX (Task Load indeX) is selected as the subjective method and an eye tracking system is used as the physiological measure for the workload. In addition, the information processing capacity related to human factors is investigated. Once the information processing capacity of operators is known, then it will be possible to apply it to predict the operators’ performance, design diagnosis tasks, and design human–machine interface

  12. Asymmetric information capacities of reciprocal pairs of quantum channels

    Science.gov (United States)

    Rosati, Matteo; Giovannetti, Vittorio

    2018-05-01

    Reciprocal pairs of quantum channels are defined as completely positive transformations which admit a rigid, distance-preserving, yet not completely positive transformation that allows one to reproduce the outcome of one from the corresponding outcome of the other. From a classical perspective these transmission lines should exhibit the same communication efficiency. This is no longer the case in the quantum setting: explicit asymmetric behaviors are reported studying the classical communication capacities of reciprocal pairs of depolarizing and Weyl-covariant channels.

  13. Highly Porous Silicon Embedded in a Ceramic Matrix: A Stable High-Capacity Electrode for Li-Ion Batteries.

    Science.gov (United States)

    Vrankovic, Dragoljub; Graczyk-Zajac, Magdalena; Kalcher, Constanze; Rohrer, Jochen; Becker, Malin; Stabler, Christina; Trykowski, Grzegorz; Albe, Karsten; Riedel, Ralf

    2017-11-28

    We demonstrate a cost-effective synthesis route that provides Si-based anode materials with capacities between 2000 and 3000 mAh·g Si -1 (400 and 600 mAh·g composite -1 ), Coulombic efficiencies above 99.5%, and almost 100% capacity retention over more than 100 cycles. The Si-based composite is prepared from highly porous silicon (obtained by reduction of silica) by encapsulation in an organic carbon and polymer-derived silicon oxycarbide (C/SiOC) matrix. Molecular dynamics simulations show that the highly porous silicon morphology delivers free volume for the accommodation of strain leading to no macroscopic changes during initial Li-Si alloying. In addition, a carbon layer provides an electrical contact, whereas the SiOC matrix significantly diminishes the interface between the electrolyte and the electrode material and thus suppresses the formation of a solid-electrolyte interphase on Si. Electrochemical tests of the micrometer-sized, glass-fiber-derived silicon demonstrate the up-scaling potential of the presented approach.

  14. Embedding an institution-wide capacity building opportunity around transition pedagogy: First Year Teaching and Learning Network Coordinators

    Directory of Open Access Journals (Sweden)

    Jennifer Clark

    2015-03-01

    Full Text Available A First Year Teaching and Learning Network was established in a regional university with a strong focus on distance education for a very diverse student cohort.  The purpose of the Network, which consisted of a Coordinator in each of nine schools, was to support staff teaching students transitioning into tertiary education. The paper explores the theoretical bases of the structure, its current method of operation, its impact so far, and future plans. The development of the Network illustrates how a university can consciously embed opportunities for staff to take ownership of transition pedagogy and thus encourage widespread capacity building amongst their peers. The experiences of the Network in its first two years provide a case study of how institutional support for the Scholarship of Teaching and Learning, in particular scholarship around capacity building, can be used as a mechanism to promote both staff and student engagement with transition pedagogy resulting in a shift from a second generation approach towards a third generation approach to transition.

  15. Informed Consent and Capacity to Give Consent in Mental Disorders

    OpenAIRE

    Zeynep Mackali

    2014-01-01

    Among four basic principles (respect for autonomy, beneficence, non-malfeasance, and justice) which determine ethical behaviors in healthcare, informed consent is mostly related to and lsquo;respect for autonomy'. Also, it reflects patient/client's right for decision and the value given for the client and his/her autonomy. Informed consent is an information sharing process including both rational decision-making about the most appropriate method among many different options and the interacti...

  16. Capacity, information and minority games in public transport

    NARCIS (Netherlands)

    Bouman, P.C.; Kroon, L.; Vervest, P.; Maroti, G.

    2016-01-01

    Many public transport operators are faced with high peak demands. This leads to crowded vehicles and discomfort for the passengers. The increasing availability of information technologies creates new opportunities for passengers to avoid crowding and for operators to inform passengers and reallocate

  17. Stereotype Strength and Attentional Bias: Preference for Confirming versus Disconfirming Information Depends on Processing Capacity

    Science.gov (United States)

    Allen, Thomas J.; Sherman, Jeffrey W.; Conrey, Frederica R.; Stroessner, Steven J.

    2009-01-01

    In two experiments, we investigated the relationships among stereotype strength, processing capacity, and the allocation of attention to stereotype-consistent versus stereotype-inconsistent information describing a target person. The results of both experiments showed that, with full capacity, greater stereotype strength was associated with increased attention toward stereotype-consistent versus stereotype-inconsistent information. However, when capacity was diminished, greater stereotype strength was associated with increased attention toward inconsistent versus consistent information. Thus, strong stereotypes may act as self-confirming filters when processing capacity is plentiful, but as efficient information gathering devices that maximize the acquisition of novel (disconfirming) information when capacity is depleted. Implications for models of stereotyping and stereotype change are discussed. PMID:20161043

  18. Embedding Co3O4 nanoparticles into graphene nanoscrolls as anode for lithium ion batteries with superior capacity and outstanding cycling stability

    Directory of Open Access Journals (Sweden)

    Zhigang Zhang

    2018-04-01

    Full Text Available Co3O4 is a promising high-performance anode for lithium ion batteries (LIBs, but suffers from unsatisfied cyclability originating duo to low electrical conductivity and large volume expansion during charge and discharge process. Herein, we successfully constructed the Co3O4 nanoparticles embedded into graphene nanoscrolls (GNSs as advanced anode for high-performance LIBs with large capacity and exceptional cyclability. The one-dimensional (1D Co3O4/GNSs were synthesized via liquid nitrogen cold quenching of large-size graphene oxide nanosheets and sodium citrate (SC modified Co3O4 nanoparticles, followed by freeze drying and annealing at 400 °C for 2 h in nitrogen atmosphere. Benefiting from the interconnected porous network constructed by 1D Co3O4/GNSs for fast electron transfer and rapid ion diffusion, and wrinkled graphene shell for significantly alleviating the huge volume expansion of Co3O4 during lithiation and delithiation. The resultant Co3O4/GNSs exhibited ultrahigh reversible capacity of 1200 mAh g−1 at 0.1 C, outperforming most reported Co3O4 anodes. Moreover, they showed high rate capability of 600 mAh g−1 at 5 C, and outstanding cycling stability with a high capacity retention of 90% after 500 cycles. Therefore, this developed strategy could be extended as an universal and scalable approach for intergrating various metal oxide materials into GNSs for energy storage and conversion applications. Keywords: Graphene nanoscrolls, Co3O4, Anode, Lithium ion batteries, Energy storage

  19. Informal Education: A Veritable Alternative for Building the Capacity ...

    African Journals Online (AJOL)

    Basic educational attainment has proven to be the catalyst to the development of artisans through mentorship and coaching, especially in developing economies. This study sets out to establish the extent to which informal education increases the technical competence of mentees and coaches and makes them self-reliant.

  20. The value of information in explicit cross-border capacity auction regimes in electricity markets

    International Nuclear Information System (INIS)

    Richter, Jan; Viehmann, Johannes

    2014-01-01

    We study two electricity markets connected by a fixed amount of cross-border capacity. The total amount of capacity is known to all electricity traders and allocated via an auction. The capacity allocated to each bidder in the auction remains private information. We assume that traders are faced with a demand function reflecting the relationship between electricity transmitted between the markets and the spot price difference. Therefore, traders act like Bayesian–Cournot oligopolists in exercising their transmission rights when presented with incomplete information about the competitors’ capacities. Our analysis breaks down the welfare effect into three different components: Cournot behavior, capacity constraints, and incomplete information. We find that social welfare increases with the level of information with which traders are endowed. - Highlights: • We regard the utilization of explicitly auctioned cross-border capacities in electricity markets as a Bayesian Cournot game. • We analyze social welfare and find three forces diminishing it, (1) firms play a cournot game, (2) the presence of capacity constraints, (3) incomplete information. • We derive information regimes from “real world” examples and analyze their effect on social welfare

  1. Research on the method of measuring space information network capacity in communication service

    Directory of Open Access Journals (Sweden)

    Zhu Shichao

    2017-02-01

    Full Text Available Because of the large scale characteristic of space information network in terms of space and time and the increasing of its complexity,existing measuring methods of information transmission capacity have been unable to measure the existing and future space information networkeffectively.In this study,we firstly established a complex model of space information network,and measured the whole space information network capacity by means of analyzing data access capability to the network and data transmission capability within the network.At last,we verified the rationality of the proposed measuring method by using STK and Matlab simulation software for collaborative simulation.

  2. Socially anxious individuals with low working memory capacity could not inhibit the goal-irrelevant information.

    Science.gov (United States)

    Moriya, Jun; Sugiura, Yoshinori

    2013-01-01

    Socially anxious individuals are interfered by distractors. Recent work has suggested that low working memory capacity and inappropriate temporary goal induce attention to distractors. We investigated the effects of working memory capacity and temporary goal on attention to distractors in social anxiety. Participants viewed a rapid serial visual presentation, in which participants reported the identity of a single target letter drawn in red. Distractors appeared before the target was presented. When the color of distractors was red (i.e., goal-relevant stimuli), low-capacity individuals were strongly interfered by the distractors compared to high-capacity individuals regardless of social anxiety. When the color of distractors was goal-irrelevant, low-capacity and high socially anxious individuals were strongly interfered by the distractors. These results suggest that socially anxious individuals with low working memory capacity could not inhibit the goal-irrelevant information and direct attention to distractors.

  3. Socially Anxious Individuals with Low Working Memory Capacity Could Not Inhibit the Goal-Irrelevant Information

    Directory of Open Access Journals (Sweden)

    Jun eMoriya

    2013-12-01

    Full Text Available Socially anxious individuals are interfered by distractors. Recent work has suggested that low working memory capacity and inappropriate temporary goal induce attentional capture to distractors. We investigated the effects of working memory capacity and temporary goal on attentional capture to distractors in social anxiety. Participants viewed a rapid serial visual presentation, in which participants reported the identity of a single target letter drawn in red. Distractors appeared before the target was presented. When the color of distractors was red (i.e., goal-relevant stimuli, low-capacity individuals were strongly interfered by the distractors compared to high-capacity individuals regardless of social anxiety. When the color of distractors was goal-irrelevant, low-capacity and high socially anxious individuals were strongly interfered by the distractors. These results suggest that socially anxious individuals with low working memory capacity could not inhibit the goal-irrelevant information and direct attention to distractors.

  4. Embedding Sustainability Instruction across Content Areas: best Classroom Practices from Informal Environmental Education

    Science.gov (United States)

    Clary, R. M.; Walker, R. M.; Wissehr, C.

    2017-12-01

    Environmental education (EE) facilitates students' scientific and environmental literacy, and addresses content areas including sustainability, ecology, and civic responsibility. However, U.S. science content compartmentalization and EE's interdisciplinary nature historically made it a fragmented curriculum within U.S. schools. To gain a better understanding of effective EE instruction that can be transferred to traditional K-12 classrooms, we researched the interactions between a recognized environmental residential camp and students and teachers from six participating schools using grounded theory methodology. Our research identified the residential learning center's objectives, methods of instruction, and objectives' alignment to the delivered curricula. Data generated included lesson plans, survey responses, and interviews. Students (n = 215) identified wilderness and geology activities as the activities they wanted to experience more; they also identified developing curiosity and a sense of discovery as the most meaningful. Whereas most student-identified meaningful experiences aligned with the center's curricular objectives within the optional units, categories emerged that were not explicitly targeted in the unit activities but were embedded throughout the curriculum in sustainable practices, data collection, and reflections. We propose that embedded activities and implicit instruction can be included across content areas within K-12 classrooms. Teacher modeling and implicit instruction will require minimal classroom time, and facilitate students' scientific and environmental literacy in topics such as sustainability and citizen responsibility.

  5. Embedded Systems

    Indian Academy of Sciences (India)

    Embedded system, micro-con- troller ... Embedded systems differ from general purpose computers in many ... Low cost: As embedded systems are extensively used in con- .... operating systems for the desktop computers where scheduling.

  6. An experimental approach to estimation of human information processing capacity for diagnosis tasks in NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ji Tae

    2006-02-15

    The objectives of this research are 1) to determine the human's information processing capacity and 2) to describe the relationship between the information processing capacity and human factors. This research centers on the relationship, as experimentally determined, between an operator's mental workload and information flow during accident diagnosis tasks at nuclear power plants (NPPs). The relationship between the information flow rate and operator's mental workload is investigated experimentally. According to this relationship, the operator's information processing capacity can be established. Once the information processing capacity of a main control room (MCR) operator in a NPP is known, it is possible to apply it 1) to predict the operator's performance, 2) to design diagnosis tasks, and 3) to design human-machine interface. In advanced MCR, an operator's mental activity is more important than his or her physical activity. The mental workload is the portion of the operator's limited capacity that is actually required to perform a particular task. A high mental workload may cause an operator to make a mistake and consequently affect that the safe operation of NPPs. Thus, to predict an operator's performance is very important for the nuclear safety. The information processing capacity is the operator's ability to manage the amount of bits per second when an operator is diagnosing tasks or accidents. We can estimate the information processing capacity using the relationship between the information flow rate and human performance. That is, if the operator's performance decreases rapidly as the information flow rate (bit/sec) is increased, it is possible to determine the operator's information processing capacity. A diagnosis task is one of the most complex and mentally demanding tasks as well as a crucial part in maintaining the safe operation of NPPs. Diagnosis tasks refer to the overall tasks of finding the

  7. An experimental approach to estimation of human information processing capacity for diagnosis tasks in NPPs

    International Nuclear Information System (INIS)

    Kim, Ji Tae

    2006-02-01

    The objectives of this research are 1) to determine the human's information processing capacity and 2) to describe the relationship between the information processing capacity and human factors. This research centers on the relationship, as experimentally determined, between an operator's mental workload and information flow during accident diagnosis tasks at nuclear power plants (NPPs). The relationship between the information flow rate and operator's mental workload is investigated experimentally. According to this relationship, the operator's information processing capacity can be established. Once the information processing capacity of a main control room (MCR) operator in a NPP is known, it is possible to apply it 1) to predict the operator's performance, 2) to design diagnosis tasks, and 3) to design human-machine interface. In advanced MCR, an operator's mental activity is more important than his or her physical activity. The mental workload is the portion of the operator's limited capacity that is actually required to perform a particular task. A high mental workload may cause an operator to make a mistake and consequently affect that the safe operation of NPPs. Thus, to predict an operator's performance is very important for the nuclear safety. The information processing capacity is the operator's ability to manage the amount of bits per second when an operator is diagnosing tasks or accidents. We can estimate the information processing capacity using the relationship between the information flow rate and human performance. That is, if the operator's performance decreases rapidly as the information flow rate (bit/sec) is increased, it is possible to determine the operator's information processing capacity. A diagnosis task is one of the most complex and mentally demanding tasks as well as a crucial part in maintaining the safe operation of NPPs. Diagnosis tasks refer to the overall tasks of finding the root of cause of the faults or accidents. In this

  8. The design of infrared information collection circuit based on embedded technology

    Science.gov (United States)

    Liu, Haoting; Zhang, Yicong

    2013-07-01

    S3C2410 processor is a 16/32 bit RISC embedded processor which based on ARM920T core and AMNA bus, and mainly for handheld devices, and high cost, low-power applications. This design introduces a design plan of the PIR sensor system, circuit and its assembling, debugging. The Application Circuit of the passive PIR alarm uses the invisibility of the infrared radiation well into the alarm system, and in order to achieve the anti-theft alarm and security purposes. When the body goes into the range of PIR sensor detection, sensors will detect heat sources and then the sensor will output a weak signal. The Signal should be amplified, compared and delayed; finally light emitting diodes emit light, playing the role of a police alarm.

  9. Embedded Leverage

    DEFF Research Database (Denmark)

    Frazzini, Andrea; Heje Pedersen, Lasse

    find that asset classes with embedded leverage offer low risk-adjusted returns and, in the cross-section, higher embedded leverage is associated with lower returns. A portfolio which is long low-embedded-leverage securities and short high-embedded-leverage securities earns large abnormal returns...

  10. How Uncertain Information on Service Capacity Influences the Intermodal Routing Decision: A Fuzzy Programming Perspective

    Directory of Open Access Journals (Sweden)

    Yan Sun

    2018-01-01

    Full Text Available Capacity uncertainty is a common issue in the transportation planning field. However, few studies discuss the intermodal routing problem with service capacity uncertainty. Based on our previous study on the intermodal routing under deterministic capacity consideration, we systematically explore how service capacity uncertainty influences the intermodal routing decision. First of all, we adopt trapezoidal fuzzy numbers to describe the uncertain information of the service capacity, and further transform the deterministic capacity constraint into a fuzzy chance constraint based on fuzzy credibility measure. We then integrate such fuzzy chance constraint into the mixed-integer linear programming (MILP model proposed in our previous study to develop a fuzzy chance-constrained programming model. To enable the improved model to be effectively programmed in the standard mathematical programming software and solved by exact solution algorithms, a crisp equivalent linear reformulation of the fuzzy chance constraint is generated. Finally, we modify the empirical case presented in our previous study by replacing the deterministic service capacities with trapezoidal fuzzy ones. Using the modified empirical case, we utilize sensitivity analysis and fuzzy simulation to analyze the influence of service capacity uncertainty on the intermodal routing decision, and summarize some interesting insights that are helpful for decision makers.

  11. Effects of Common Factors on Dynamics of Stocks Traded by Investors with Limited Information Capacity

    Directory of Open Access Journals (Sweden)

    Songtao Wu

    2017-01-01

    Full Text Available An artificial stock market with agent-based model is built to investigate effects of different information characteristics of common factors on the dynamics stock returns. Investors with limited information capacity update their beliefs based on the information they have obtained and processed and optimize portfolios based on beliefs. We find that with changing of concerned information characteristics the uncertainty of stock price returns rises and is higher than the uncertainty of intrinsic value returns. However, this increase is constrained by the limited information capacity of investors. At the same time, we also find that dependence between returns of stock prices also increased with the changing information environment. The uncertainty and dependency pertaining to prices show a positive relationship. However, the positive relationship is weakened when taking into account the features of intrinsic values, based on which prices are generated.

  12. Embedded Hardware

    CERN Document Server

    Ganssle, Jack G; Eady, Fred; Edwards, Lewin; Katz, David J; Gentile, Rick

    2007-01-01

    The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!. Circuit design using microcontrollers is both a science and an art. This book covers it all. It details all of the essential theory and facts to help an engineer design a robust embedded system. Processors, memory, and the hot topic of interconnects (I/O) are completely covered. Our authors bring a wealth of experience and ideas; thi

  13. Using information theory to assess the communicative capacity of circulating microRNA.

    Science.gov (United States)

    Finn, Nnenna A; Searles, Charles D

    2013-10-11

    The discovery of extracellular microRNAs (miRNAs) and their transport modalities (i.e., microparticles, exosomes, proteins and lipoproteins) has sparked theories regarding their role in intercellular communication. Here, we assessed the information transfer capacity of different miRNA transport modalities in human serum by utilizing basic principles of information theory. Zipf Statistics were calculated for each of the miRNA transport modalities identified in human serum. Our analyses revealed that miRNA-mediated information transfer is redundant, as evidenced by negative Zipf's Statistics with magnitudes greater than one. In healthy subjects, the potential communicative capacity of miRNA in complex with circulating proteins was significantly lower than that of miRNA encapsulated in circulating microparticles and exosomes. Moreover, the presence of coronary heart disease significantly lowered the communicative capacity of all circulating miRNA transport modalities. To assess the internal organization of circulating miRNA signals, Shannon's zero- and first-order entropies were calculated. Microparticles (MPs) exhibited the lowest Shannon entropic slope, indicating a relatively high capacity for information transfer. Furthermore, compared to the other miRNA transport modalities, MPs appeared to be the most efficient at transferring miRNA to cultured endothelial cells. Taken together, these findings suggest that although all transport modalities have the capacity for miRNA-based information transfer, MPs may be the simplest and most robust way to achieve miRNA-based signal transduction in sera. This study presents a novel method for analyzing the quantitative capacity of miRNA-mediated information transfer while providing insight into the communicative characteristics of distinct circulating miRNA transport modalities. Published by Elsevier Inc.

  14. Intrinsic information Security: Embedding security issues in the design process of telematics systems

    NARCIS (Netherlands)

    Tettero, Olaf; Tettero, O.

    This book presents a systematic approach to embed information security issues in the design process of telematics systems. The approach supports both designers and user organisations. We elaborate on the activities that designers should perform to design telematics systems in which information

  15. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-06-01

    Full Text Available Substantial changes have occurred in the Information Technology (IT sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  16. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  17. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  18. On the capacity of Rician fading channels with full channel state information at low SNR

    KAUST Repository

    Rezki, Zouheir

    2012-06-01

    The capacity of flat Rayleigh fading channels with full channel state information (CSI) at the transmitter and at the receiver at asymptotically low SNR has been recently shown to scale essentially as SNR log (1/SNR). In this paper, we investigate the Rician fading channel capacity with full CSI, and show that the capacity of this channel scales essentially as 1/1+K SNR log (1 /SNR), where K is the Rician factor. This characterization includes perfect CSI at both the transmitter and the receiver or noisy CSI at the transmitter and perfect CSI at the receiver. We also show that one-bit CSI at the transmitter is enough to achieve this asymptotic capacity using an On-Off power control scheme. Our framework may be seen as a generalization of previous works as it captures the Rayleigh fading channel as a special case by letting K goes to zero. © 2012 IEEE.

  19. Action-embedded transformational leadership in self-managing global information systems development teams

    NARCIS (Netherlands)

    Eseryel, U. Yeliz; Eseryel, Deniz

    While software development teams are becoming more and more distributed around the globe, most software development methodologies used by global teams prescribe self-managing teams. Transformational leadership is the key to successful information systems development and use for competitive

  20. How Employees' Perception of Information Technology Application and Their Knowledge Management Capacity Influence Organisational Performance

    Science.gov (United States)

    Kuo, Yen-Ku; Ye, Kung-Don

    2010-01-01

    This study investigates how workers' gender, work experience, designated division, and appointment affect (i) their perception of information technology (IT) within the organisation, (ii) their self-perceived capacity in knowledge management (KM), and (iii) their perception of organisational performance (OP). Furthermore, the study also examines…

  1. On the low SNR capacity of MIMO fading channels with imperfect channel state information

    KAUST Repository

    Benkhelifa, Fatma

    2014-06-01

    The capacity of multiple-input multiple-output (MIMO) Rayleigh fading channels with full knowledge of channel state information (CSI) at both the transmitter and the receiver (CSI-TR) has been shown recently to scale at low signal-to-noise ratio (SNR) essentially as SNR log(1/SNR), independently of the number of transmit and receive antennas. In this paper, we investigate the ergodic capacity of MIMO Rayleigh fading channel with estimated channel state information at the transmitter (CSI-T) and possibly imperfect channel state information at the receiver (CSI-R). Our framework can be seen as a generalization of previous works as it can capture the perfect CSI-TR as a special case when the estimation error variance goes to zero. In this paper, we mainly focus on the low SNR regime, and we show that the capacity scales as (1-α) SNR log(1/SNR), where α is the estimation error variance. This characterization shows the loss of performance due to error estimation over the perfect channel state information at both the transmitter and the receiver. As a by-product of our new analysis, we show that our framework can be also extended to characterize the capacity of MIMO Rician fading channels at low SNR with possibly imperfect CSI-T and CSI-R. © 1972-2012 IEEE.

  2. On the low SNR capacity of MIMO fading channels with imperfect channel state information

    KAUST Repository

    Benkhelifa, Fatma

    2014-05-01

    The capacity of Multiple Input Multiple Output (MIMO) Rayleigh fading channels with full knowledge of channel state information (CSI) at both the transmitter and the receiver (CSI-TR) has been shown recently to scale at low Signal-to-Noise Ratio (SNR) essentially as SNR log(1=SNR), independently of the number of transmit and receive antennas. In this paper, we investigate the ergodic capacity of MIMO Rayleigh fading channel with estimated channel state information at the transmitter (CSI-T) and possibly imperfect channel state information at the receiver (CSI-R). Our framework can be seen as a generalization of previous works as it can capture the perfect CSI-TR as a special case when the estimation error variance goes to zero. In our work, we mainly focus on the low SNR regime and we show that the capacity scales as (1-α) SNR log(1=SNR), where α is the estimation error variance. This characterization shows the loss of performance due to error estimation over the perfect channel state information at both the transmitter and the receiver. As a by-product of our new analysis, we show that our framework can also be extended to characterize the capacity of MIMO Rician fading channels at low SNR with possibly imperfect CSI-T and CSI-R. © 2014 IFIP.

  3. 76 FR 39153 - Agency Information Collection; Activity Under OMB Review; Report of Traffic and Capacity...

    Science.gov (United States)

    2011-07-05

    ... responsibilities relating to airline competition and consolidation. Traffic Forecasting The FAA uses traffic... FAA develops ways of increasing airport capacity at congested airports. Airline Industry Status... Seguin, Office of Airline Information, RTS-42, Room E34-418, RITA, BTS, 1200 New Jersey Avenue, SE...

  4. Embedding Term Similarity and Inverse Document Frequency into a Logical Model of Information Retrieval.

    Science.gov (United States)

    Losada, David E.; Barreiro, Alvaro

    2003-01-01

    Proposes an approach to incorporate term similarity and inverse document frequency into a logical model of information retrieval. Highlights include document representation and matching; incorporating term similarity into the measure of distance; new algorithms for implementation; inverse document frequency; and logical versus classical models of…

  5. Some Fundamental Limits on SAW RFID Tag Information Capacity and Collision Resolution

    Science.gov (United States)

    Barton, Richard J.

    2013-01-01

    In this paper, we apply results from multi-user information theory to study the limits of information capacity and collision resolution for SAW RFID tags. In particular, we derive bounds on the achievable data rate per tag as a function of fundamental parameters such as tag time-bandwidth product, tag signal-to-noise ratio (SNR), and number of tags in the environment. We also discuss the implications of these bounds for tag waveform design and tag interrogation efficiency

  6. Using Information Theory to Assess the Communicative Capacity of Circulating MicroRNA

    OpenAIRE

    Finn, Nnenna A.; Searles, Charles D.

    2013-01-01

    The discovery of extracellular microRNAs (miRNAs) and their transport modalities (i.e. microparticles, exosomes, proteins and lipoproteins) has sparked theories regarding their role in intercellular communication. Here, we assessed the information transfer capacity of different miRNA transport modalities in human serum by utilizing basic principles of information theory. Zipf Statistics were calculated for each of the miRNA transport modalities identified in human serum. Our analyses revealed...

  7. Decreased integration and information capacity in stroke measured by whole brain models of resting state activity.

    Science.gov (United States)

    Adhikari, Mohit H; Hacker, Carl D; Siegel, Josh S; Griffa, Alessandra; Hagmann, Patric; Deco, Gustavo; Corbetta, Maurizio

    2017-04-01

    While several studies have shown that focal lesions affect the communication between structurally normal regions of the brain, and that these changes may correlate with behavioural deficits, their impact on brain's information processing capacity is currently unknown. Here we test the hypothesis that focal lesions decrease the brain's information processing capacity, of which changes in functional connectivity may be a measurable correlate. To measure processing capacity, we turned to whole brain computational modelling to estimate the integration and segregation of information in brain networks. First, we measured functional connectivity between different brain areas with resting state functional magnetic resonance imaging in healthy subjects (n = 26), and subjects who had suffered a cortical stroke (n = 36). We then used a whole-brain network model that coupled average excitatory activities of local regions via anatomical connectivity. Model parameters were optimized in each healthy or stroke participant to maximize correlation between model and empirical functional connectivity, so that the model's effective connectivity was a veridical representation of healthy or lesioned brain networks. Subsequently, we calculated two model-based measures: 'integration', a graph theoretical measure obtained from functional connectivity, which measures the connectedness of brain networks, and 'information capacity', an information theoretical measure that cannot be obtained empirically, representative of the segregative ability of brain networks to encode distinct stimuli. We found that both measures were decreased in stroke patients, as compared to healthy controls, particularly at the level of resting-state networks. Furthermore, we found that these measures, especially information capacity, correlate with measures of behavioural impairment and the segregation of resting-state networks empirically measured. This study shows that focal lesions affect the brain's ability to

  8. On the capacity of multiaccess fading channels with full channel state information at low power regime

    KAUST Repository

    Rezki, Zouheir

    2013-06-01

    We study the throughput capacity region of the Gaussian multiaccess (MAC) fading channel with perfect channel state information (CSI) at the receiver (CSI-R) and at the transmitters (CSI-T), at low power regime. We show that it has a multidimensional rectangle structure and thus is simply characterized by single user capacity points. More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum rate maximizer and that the coordinates of this point coincide with single user capacity bounds. Inspired from this result, we propose an on-off scheme, compute its achievable rate, and provide a necessary condition on the fading channels under which this scheme achieves single user capacity bounds of the MAC channel at asymptotically low power regime. We argue that this necessary condition characterizes a class of fading that encompasses all known wireless channels, where the capacity region of the MAC channel has a simple expression in terms of users\\' average power constraints only. © 2013 IEEE.

  9. The data embedding method

    Energy Technology Data Exchange (ETDEWEB)

    Sandford, M.T. II; Bradley, J.N.; Handel, T.G.

    1996-06-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.

  10. Embedded systems handbook

    CERN Document Server

    Zurawski, Richard

    2005-01-01

    Embedded systems are nearly ubiquitous, and books on individual topics or components of embedded systems are equally abundant. Unfortunately, for those designers who thirst for knowledge of the big picture of embedded systems there is not a drop to drink. Until now. The Embedded Systems Handbook is an oasis of information, offering a mix of basic and advanced topics, new solutions and technologies arising from the most recent research efforts, and emerging trends to help you stay current in this ever-changing field.With preeminent contributors from leading industrial and academic institutions

  11. Embedding QR codes in tumor board presentations, enhancing educational content for oncology information management.

    Science.gov (United States)

    Siderits, Richard; Yates, Stacy; Rodriguez, Arelis; Lee, Tina; Rimmer, Cheryl; Roche, Mark

    2011-01-01

    Quick Response (QR) Codes are standard in supply management and seen with increasing frequency in advertisements. They are now present regularly in healthcare informatics and education. These 2-dimensional square bar codes, originally designed by the Toyota car company, are free of license and have a published international standard. The codes can be generated by free online software and the resulting images incorporated into presentations. The images can be scanned by "smart" phones and tablets using either the iOS or Android platforms, which link the device with the information represented by the QR code (uniform resource locator or URL, online video, text, v-calendar entries, short message service [SMS] and formatted text). Once linked to the device, the information can be viewed at any time after the original presentation, saved in the device or to a Web-based "cloud" repository, printed, or shared with others via email or Bluetooth file transfer. This paper describes how we use QR codes in our tumor board presentations, discusses the benefits, the different QR codes from Web links and how QR codes facilitate the distribution of educational content.

  12. Search for Expectancy-Inconsistent Information Reduces Uncertainty Better: The Role of Cognitive Capacity.

    Science.gov (United States)

    Strojny, Paweł; Kossowska, Małgorzata; Strojny, Agnieszka

    2016-01-01

    Motivation and cognitive capacity are key factors in people's everyday struggle with uncertainty. However, the exact nature of their interplay in various contexts still needs to be revealed. The presented paper reports on two experimental studies which aimed to examine the joint consequences of motivational and cognitive factors for preferences regarding incomplete information expansion. In Study 1 we demonstrate the interactional effect of motivation and cognitive capacity on information preference. High need for closure resulted in a stronger relative preference for expectancy-inconsistent information among non-depleted individuals, but the opposite among cognitively depleted ones. This effect was explained by the different informative value of questions in comparison to affirmative sentences and the potential possibility of assimilation of new information if it contradicts prior knowledge. In Study 2 we further investigated the obtained effect, showing that not only questions but also other kinds of incomplete information are subject to the same dependency. Our results support the expectation that, in face of incomplete information, motivation toward closure may be fulfilled efficiently by focusing on expectancy-inconsistent pieces of data. We discuss the obtained effect in the context of previous assumptions that high need for closure results in a simple processing style, advocating a more complex approach based on the character of the provided information.

  13. Capacity of cognitive radio under imperfect secondary and cross link channel state information

    KAUST Repository

    Sboui, Lokman

    2011-09-01

    In this paper, we study the ergodic capacity of secondary user channel in a spectrum sharing scenario in which the secondary transmitter is instantaneously aware of estimated versions of the cross link (between the secondary transmitter and the primary receiver) and the secondary link Channel State Information (CSI). The secondary link optimal power profile along with the ergodic capacity are derived for a class of fading channels, under an average power constraint and an instantaneous interference outage constraint. We also show that our framework is rather general as it encompasses several previously studied spectrum sharing settings as special cases. In order to gain some insights on the capacity behavior, numerical results are shown for independent Rayleigh fading channels where it is found for instance, that at low SNR regime, only the secondary channel estimation matters and that the cross link CSI has no effect on the ergodic capacity; whereas at high SNR regime, the capacity is rather driven by the cross link CSI. © 2011 IEEE.

  14. Determination of the Relationship between Information Capacity and Identification by Simulated Aerial Photography.

    Science.gov (United States)

    1978-06-27

    experiment by Frank Scott, Peter Hollanda , and Albert Harabedian 7 7Scott, F., Hollanda , P. A., and Harabedian, A., Phot. Sci. Eng., 14 1 pp 21-27...photographs of models of military tanks and trucks. The information capacity of these photos was varied by defocussing the taking camera and the simulated...photographic reconnaissance mission. This was done by photographing models of military targets, I processing and duplicating the resulting images, and

  15. Decline in mortality with the Belize Integrated Patient-Centred Country Wide Health Information System (BHIS) with embedded program management.

    Science.gov (United States)

    Graven, Michael; Allen, Peter; Smith, Ian; MacDonald, Noni E

    2013-10-01

    Belize deployed a country-wide fully integrated patient centred health information system with eight embedded disease management algorithms and simple analytics in 2007 for $4 (Cad)/citizen. This study evaluated BHIS uptake by health care workers, and pre and post BHIS deployment mortality in selected areas and public health care expenditures. BHIS encounter data were compared to encounter data from required Ministry of Health reports from licensed health care entities. De-identified vital statistics death data for the eight BHIS protocol disease domains and three non-protocol domains were compared from 2005 to 2011. Belize population data came from the Statistical Institute of Belize (2005-2009) and from Belize census (2010) and estimate (2011). Public health system expenditures were compared by fiscal years (2000-2012). BHIS captured over 90% healthcare encounters by year one, 95% by year two. Mortality rates decreased in the eight BHIS protocol domains (each 2005 vs. 2011, all p<0.02) vs. an increase or little change in the three domains without protocols. Hypertension related deaths dropped from 1st cause of death in 2003 to 9th by 2010. Public expenditures on healthcare steadily rose until 2009 but then declined slightly for the next 3 years. For modest investment, BHIS was well accepted nationwide and following deployment, mortality in the eight BHIS disease management algorithm domains declined significantly and expenditures on public healthcare stabilized. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  16. Building capacity for evidence informed decision making in public health: a case study of organizational change

    Directory of Open Access Journals (Sweden)

    Peirson Leslea

    2012-02-01

    Full Text Available Abstract Background Core competencies for public health in Canada require proficiency in evidence informed decision making (EIDM. However, decision makers often lack access to information, many workers lack knowledge and skills to conduct systematic literature reviews, and public health settings typically lack infrastructure to support EIDM activities. This research was conducted to explore and describe critical factors and dynamics in the early implementation of one public health unit's strategic initiative to develop capacity to make EIDM standard practice. Methods This qualitative case study was conducted in one public health unit in Ontario, Canada between 2008 and 2010. In-depth information was gathered from two sets of semi-structured interviews and focus groups (n = 27 with 70 members of the health unit, and through a review of 137 documents. Thematic analysis was used to code the key informant and document data. Results The critical factors and dynamics for building EIDM capacity at an organizational level included: clear vision and strong leadership, workforce and skills development, ability to access research (library services, fiscal investments, acquisition and development of technological resources, a knowledge management strategy, effective communication, a receptive organizational culture, and a focus on change management. Conclusion With leadership, planning, commitment and substantial investments, a public health department has made significant progress, within the first two years of a 10-year initiative, towards achieving its goal of becoming an evidence informed decision making organization.

  17. Building capacity for evidence informed decision making in public health: a case study of organizational change.

    Science.gov (United States)

    Peirson, Leslea; Ciliska, Donna; Dobbins, Maureen; Mowat, David

    2012-02-20

    Core competencies for public health in Canada require proficiency in evidence informed decision making (EIDM). However, decision makers often lack access to information, many workers lack knowledge and skills to conduct systematic literature reviews, and public health settings typically lack infrastructure to support EIDM activities. This research was conducted to explore and describe critical factors and dynamics in the early implementation of one public health unit's strategic initiative to develop capacity to make EIDM standard practice. This qualitative case study was conducted in one public health unit in Ontario, Canada between 2008 and 2010. In-depth information was gathered from two sets of semi-structured interviews and focus groups (n = 27) with 70 members of the health unit, and through a review of 137 documents. Thematic analysis was used to code the key informant and document data. The critical factors and dynamics for building EIDM capacity at an organizational level included: clear vision and strong leadership, workforce and skills development, ability to access research (library services), fiscal investments, acquisition and development of technological resources, a knowledge management strategy, effective communication, a receptive organizational culture, and a focus on change management. With leadership, planning, commitment and substantial investments, a public health department has made significant progress, within the first two years of a 10-year initiative, towards achieving its goal of becoming an evidence informed decision making organization.

  18. Politics of change: the discourses that inform organizational change and their capacity to silence.

    Science.gov (United States)

    McMillan, Kim

    2016-09-01

    Changes in healthcare organizations are inevitable and occurring at unprecedented rates. Such changes greatly impact nurses and their work, yet these experiences are rarely explored. Organizational change discourses remain grounded in perspectives that explore and explain systems, often not the people within them. Change processes in healthcare organizations informed by such organizational discourses validate only certain perspectives and forms of knowledge. This fosters exclusionary practices, limiting the capacity of certain individuals or groups of individuals to effectively contribute to change discourses and processes. The reliance on mainstream organizational discourses in healthcare organizations has left little room for the exploration of diverse perspectives on the subject of organizational change, particularly those of nurses. Michel Foucault's work challenges dominant discourse and suggest that strong reliance's on specific discourses effectively disqualify certain forms of knowledge. Foucault's writings on disqualified knowledge and parrhesia (truth telling and frank speech) facilitate the critical exploration of discourses that inform change in healthcare organizations and nurses capacities to contribute to organizational discourses. This paper explores the capacity of nurses to speak their truths within rapidly and continuously changing healthcare organizations when such changes are often driven by discourses not derived from nursing knowledge or experience. © 2016 John Wiley & Sons Ltd.

  19. Embedded engineering education

    CERN Document Server

    Kaštelan, Ivan; Temerinac, Miodrag; Barak, Moshe; Sruk, Vlado

    2016-01-01

    This book focuses on the outcome of the European research project “FP7-ICT-2011-8 / 317882: Embedded Engineering Learning Platform” E2LP. Additionally, some experiences and researches outside this project have been included. This book provides information about the achieved results of the E2LP project as well as some broader views about the embedded engineering education. It captures project results and applications, methodologies, and evaluations. It leads to the history of computer architectures, brings a touch of the future in education tools and provides a valuable resource for anyone interested in embedded engineering education concepts, experiences and material. The book contents 12 original contributions and will open a broader discussion about the necessary knowledge and appropriate learning methods for the new profile of embedded engineers. As a result, the proposed Embedded Computer Engineering Learning Platform will help to educate a sufficient number of future engineers in Europe, capable of d...

  20. Informant Report of Financial Capacity for Individuals With Chronic Acquired Brain Injury: An Assessment of Informant Accuracy.

    Science.gov (United States)

    Sunderaraman, Preeti; Cosentino, Stephanie; Lindgren, Karen; James, Angela; Schultheis, Maria

    2018-03-29

    Primarily, to investigate the association between informant report and objective performance on specific financial capacity (FC) tasks by adults with chronic, moderate to severe acquired brain injury, and to examine the nature of misestimates by the informants. Cross-sectional design. A postacute, community-based rehabilitation center. Data were obtained from 22 chronic acquired brain injury (CABI) adults, mean age of 46.6 years (SD = 8.67), mean years of education of 13.45 years (SD = 2.15), with moderate to severe acquired brain injury (86% had traumatic brain injury), with a mean postinjury period of 17.14 years (SD = 9.5). Whereas the CABI adults completed the Financial Competence Assessment Inventory interview-a combination of self-report and performance-based assessment, 22 informants completed a specifically designed parallel version of the interview. Pearson correlations and 1-sample t tests based on the discrepancy scores between informant report and CABI group's performance were used. The CABI group's performance was not associated with its informant's perceptions. One-sample t tests revealed that informants both underestimated and overestimated CABI group's performance. Results indicate lack of correspondence between self- and informant ratings. Further investigation revealed that misestimations by informants occurred in contrary directions with CABI adults' performance being inaccurately rated. These findings raise critical issues related to assuming that the informant report can be used as a "gold standard" for collecting functional data related to financial management, and the idea that obtaining objective data on financial tasks may represent a more valid method of assessing financial competency in adults with brain injury.

  1. A theory-informed approach to mental health care capacity building for pharmacists.

    Science.gov (United States)

    Murphy, Andrea L; Gardner, David M; Kutcher, Stan P; Martin-Misener, Ruth

    2014-01-01

    Pharmacists are knowledgeable, accessible health care professionals who can provide services that improve outcomes in mental health care. Various challenges and opportunities can exist in pharmacy practice to hinder or support pharmacists' efforts. We used a theory-informed approach to development and implementation of a capacity-building program to enhance pharmacists' roles in mental health care. Theories and frameworks including the Consolidated Framework for Implementation Research, the Theoretical Domains Framework, and the Behaviour Change Wheel were used to inform the conceptualization, development, and implementation of a capacity-building program to enhance pharmacists' roles in mental health care. The More Than Meds program was developed and implemented through an iterative process. The main program components included: an education and training day; use of a train-the-trainer approach from partnerships with pharmacists and people with lived experience of mental illness; development of a community of practice through email communications, a website, and a newsletter; and use of educational outreach delivered by pharmacists. Theories and frameworks used throughout the program's development and implementation facilitated a means to conceptualize the component parts of the program as well as its overall presence as a whole from inception through evolution in implementation. Using theoretical foundations for the program enabled critical consideration and understanding of issues related to trialability and adaptability of the program. Theory was essential to the underlying development and implementation of a capacity-building program for enhancing services by pharmacists for people with lived experience of mental illness. Lessons learned from the development and implementation of this program are informing current research and evolution of the program.

  2. Capacity region of the 3 receiver state dependent multilevel BC with noncausal state information

    Directory of Open Access Journals (Sweden)

    Viswanathan Ramachandran

    2017-09-01

    Full Text Available We consider a three receiver state dependent multilevel broadcast channel (BC, where the state information is known non-causally at the encoder as well as all the decoders. This is an extension of Nair and El Gamal’s three receiver multilevel BC (Nair and El Gamal, 2009, wherein two of the receivers decode only a common message while a third receiver decodes a private message as well. The objective is to characterize the rate tuples that are simultaneously achievable while ensuring negligible probability of error at each of the receivers. We characterize the capacity region of this setup in the paper.

  3. Transmitting Information by Propagation in an Ocean Waveguide: Computation of Acoustic Field Capacity

    Science.gov (United States)

    2015-06-17

    and optics literature [6, 7]. Primary motivation for the resurgence of interest in the study of fundamental relationships between (classical) wave...approximated by a finite number of degrees of freedom, and the information-theoretic analysis used for studying MIMO capacity can be applied to determine the...vectors are given by νm,n(ρ ′,z′,φ ′) = am, nun (z′)Jm(knρ ′)e−imφ ′ (42) with m,n corresponding to azimuthal and depth eigenvalue indices. Finally

  4. Ergodic Capacity of Cognitive Radio Under Imperfect Channel-State Information

    KAUST Repository

    Rezki, Zouheir; Alouini, Mohamed-Slim

    2012-01-01

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel-state information (CSI) of the secondary link but knows only the statistics and an estimated version of the secondary transmitter-primary receiver link is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels [with a continuous probability density function (pdf)] under the average and peak transmit power constraints and with respect to the following two different interference constraints: 1) an interference outage constraint and 2) a signal-to-interference outage constraint. When applied to Rayleigh fading channels, our results show, for example, that the interference constraint is harmful at the high-power regime, because the capacity does not increase with the power, whereas at the low-power regime, it has a marginal impact and no-interference performance, which corresponds to the ergodic capacity under average or peak transmit power constraint in the absence of the primary user, may be achieved. © 2012 IEEE.

  5. Ergodic Capacity of Cognitive Radio Under Imperfect Channel-State Information

    KAUST Repository

    Rezki, Zouheir

    2012-09-08

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel-state information (CSI) of the secondary link but knows only the statistics and an estimated version of the secondary transmitter-primary receiver link is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels [with a continuous probability density function (pdf)] under the average and peak transmit power constraints and with respect to the following two different interference constraints: 1) an interference outage constraint and 2) a signal-to-interference outage constraint. When applied to Rayleigh fading channels, our results show, for example, that the interference constraint is harmful at the high-power regime, because the capacity does not increase with the power, whereas at the low-power regime, it has a marginal impact and no-interference performance, which corresponds to the ergodic capacity under average or peak transmit power constraint in the absence of the primary user, may be achieved. © 2012 IEEE.

  6. Embedded systems handbook networked embedded systems

    CERN Document Server

    Zurawski, Richard

    2009-01-01

    Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area

  7. Fractional Gaussian noise-enhanced information capacity of a nonlinear neuron model with binary signal input

    Science.gov (United States)

    Gao, Feng-Yin; Kang, Yan-Mei; Chen, Xi; Chen, Guanrong

    2018-05-01

    This paper reveals the effect of fractional Gaussian noise with Hurst exponent H ∈(1 /2 ,1 ) on the information capacity of a general nonlinear neuron model with binary signal input. The fGn and its corresponding fractional Brownian motion exhibit long-range, strong-dependent increments. It extends standard Brownian motion to many types of fractional processes found in nature, such as the synaptic noise. In the paper, for the subthreshold binary signal, sufficient conditions are given based on the "forbidden interval" theorem to guarantee the occurrence of stochastic resonance, while for the suprathreshold binary signal, the simulated results show that additive fGn with Hurst exponent H ∈(1 /2 ,1 ) could increase the mutual information or bits count. The investigation indicated that the synaptic noise with the characters of long-range dependence and self-similarity might be the driving factor for the efficient encoding and decoding of the nervous system.

  8. Presentation of spatio-temporal data in the context of information capacity and visual suggestiveness

    Science.gov (United States)

    Cybulski, Paweł

    2014-12-01

    The aim of this article is to present the concept of information capacity and visual suggestiveness as a map characteristic on the example of two maps of human migration. From this viewpoint the literature study has been performed. Proposed by the author the features of cartographic visualization are an attempt to establish cartographic pragmatics and find the way to increase effectiveness of dynamic maps with large information capacity. Among the works on cartographic pragmatics, muliaspectuality of spatio-temporal data the proposed solution has not been taken so far, and refers to the map design problematic. Celem rozważań było podsumowanie wiedzy dotyczącej projektowania dynamicznych opracowań przestrzennych oraz ich klasyfi kacja ze względu na ilość zmiennych grafi cznych oraz dynamicznych, które mogą zostać użyte w procesie geowizualizacji. Zróżnicowanie ilości zmiennych grafi cznych i dynamicznych w przestrzennych wizualizacjach autor proponuje nazywać pojemnością wizualną prezentacji. Autor stawia również hipotezę, że im większą pojemność wizualną stosujemy tym bardziej sugestywne musi być to przestawienie, aby efektywność przekazywania informacji była zachowana

  9. A severe capacity limit in the consolidation of orientation information into visual short-term memory.

    Science.gov (United States)

    Becker, Mark W; Miller, James R; Liu, Taosheng

    2013-04-01

    Previous research has suggested that two color patches can be consolidated into visual short-term memory (VSTM) via an unlimited parallel process. Here we examined whether the same unlimited-capacity parallel process occurs for two oriented grating patches. Participants viewed two gratings that were presented briefly and masked. In blocks of trials, the gratings were presented either simultaneously or sequentially. In Experiments 1 and 2, the presentation of the stimuli was followed by a location cue that indicated the grating on which to base one's response. In Experiment 1, participants responded whether the target grating was oriented clockwise or counterclockwise with respect to vertical. In Experiment 2, participants indicated whether the target grating was oriented along one of the cardinal directions (vertical or horizontal) or was obliquely oriented. Finally, in Experiment 3, the location cue was replaced with a third grating that appeared at fixation, and participants indicated whether either of the two test gratings matched this probe. Despite the fact that these responses required fairly coarse coding of the orientation information, across all methods of responding we found superior performance for sequential over simultaneous presentations. These findings suggest that the consolidation of oriented gratings into VSTM is severely limited in capacity and differs from the consolidation of color information.

  10. Knowledge Translation Capacity of Arts-informed Dissemination: A Narrative Study

    Directory of Open Access Journals (Sweden)

    Jennifer L Lapum

    2016-07-01

    Full Text Available Background: Arts-informed dissemination is an expanding approach to enhancing knowledge translation in the health sciences. Problematic is the minimal evaluation studies and the rare reporting of the influencing factors of knowledge translation. “The 7,024th Patient” is a research-derived art installation created to disseminate findings about patients’ experiences of heart surgery and the importance of humanistic patient-centred care approaches. The current study’s purpose was to explore how arts-informed dissemination (i.e., “The 7,024th Patient” influenced healthcare practitioners’ delivery of care. Methods: An arts-informed narrative study was guided by the Promoting Action on Research Implementation in Health Services framework. The sample included a multi-disciplinary group of 19 individuals who worked with patients undergoing and recovering from heart surgery. Two interviews were conducted with each participant at the time of viewing the installation and 6 months later. A narrative analysis was conducted using Pictorial Narrative Mapping techniques. Results: Study findings indicated that the arts as a form of evidence provide an experiential and aesthetic encounter, which stimulated reflective practice. Participants’ accounts reflected cognitive and behavioral modifications related to empathy, holistic approaches and relational care. However, the complexities associated with the interpretive process and the influencing knowledge translation elements indicated a need to dialogue about the translation process, including deconstructing the evidence within the context of one’s own practice. Conclusions: Art is not just works of beauty or eccentric paintings. There is an imaginative and aesthetic capacity that can be cultivated with diligence, creativity, and rigour in the world of healthcare research and knowledge translation. Next steps require the examination of the knowledge translation capacity of different art forms with

  11. Cumulative Impact Assessment: Approaching Environmental Capacity in Development Area Using Environmental Impact Assessment Information

    Science.gov (United States)

    Cho, N.; Lee, M. J.; Maeng, J. H.

    2017-12-01

    Environmental impact assessment estimates the impact of development as a business unit and establishes mitigation plan. If the development is done, its economic effects can spread to the nearby areas. So that various developments can be distributed at different time intervals. The impact of the new developments can be combined with existing environmental impacts and can have a larger impact. That is, Cumulative impact assessment is needed to consider the environmental capacity of the Nearby area. Cumulative impact assessments require policy tools such as environmental impact assessment information and cumulative impact estimation models. In Korea, environmental information (water quality, air quality, etc.) of the development site is measured for environmental impact assessment and monitored for a certain period (generally 5 years) after the project. In addition, by constructing the environmental information as a spatial database, it is possible to express the environmental impact on a regional basis spatially and to intuitively use it for development site selection. Utilizing a composite model of environmental impact assessment information and Remote Sensing data for cumulative impact estimation, That can be used as a policy decision support tool that provides quantitative information for development area management, such as time series effect and sprawl phenomenon.

  12. FePO4 nanoparticles embedded in a large mesoporous carbon matrix as a high-capacity and high-rate cathode for lithium-ion batteries

    International Nuclear Information System (INIS)

    Chen, Lian; Wu, Ping; Xie, Kongwei; Li, Jianping; Xu, Bin; Cao, Gaoping; Chen, Yu; Tang, Yawen; Zhou, Yiming; Lu, Tianhong; Yang, Yusheng

    2013-01-01

    Highlights: ► Self-made nano-CaCO 3 templated LMC as a novel supporting matrix for FePO 4 cathode. ► The 3D porous structure of LMC is well retained in LMC–FePO 4 nanohybrid. ► Its reaction kinetics of lithium insertion/extraction is significantly improved. ► Markedly higher capacities and rate capability by virtue of its structure superiority. -- Abstract: By using large mesoporous carbon (LMC) as a novel host matrix, LMC–FePO 4 nanohybrid has been synthesized through a facile homogeneous precipitation process and subsequent annealing approach. When evaluated as a cathode for lithium-ion batteries (LIBs), the LMC–FePO 4 nanohybrid exhibits higher specific capacities, improved rate capability, and better cycling performance by virtue of its unique structural characteristics

  13. Hazard, Vulnerability and Capacity Mapping for Landslides Risk Analysis using Geographic Information System (GIS)

    Science.gov (United States)

    Sari, D. A. P.; Innaqa, S.; Safrilah

    2017-06-01

    This research analyzed the levels of disaster risk in the Citeureup sub-District, Bogor Regency, West Java, based on its potential hazard, vulnerability and capacity, using map to represent the results, then Miles and Huberman analytical techniques was used to analyze the qualitative interviews. The analysis conducted in this study is based on the concept of disaster risk by Wisner. The result shows that the Citeureup sub-District has medium-low risk of landslides. Of the 14 villages, three villages have a moderate risk level, namely Hambalang, Tajur, and Tangkil, or 49.58% of the total land area. Eleven villages have a low level of risk, namely Pasir Mukti, Sanja, Tarikolot, Gunung Sari, Puspasari, East Karang Asem, Citeureup, Leuwinutug, Sukahati, West Karang Asem West and Puspanegara, or 48.68% of the total land area, for high-risk areas only around 1.74%, which is part of Hambalang village. The analysis using Geographic Information System (GIS) prove that areas with a high risk potential does not necessarily have a high level of risk. The capacity of the community plays an important role to minimize the risk of a region. Disaster risk reduction strategy is done by creating a safe condition, which intensified the movement of disaster risk reduction.

  14. On the capacity of cognitive radio under limited channel state information

    KAUST Repository

    Rezki, Zouheir

    2010-09-01

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel state information (CSI) of the secondary link, but knows only the statistics of the secondary transmitter-primary receiver link, is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels (with continuous probability density function) under average and peak transmit-power constraints and with respect to two different interference constraints: an interference outage constraint and a signal-to-interference (SI) outage constraint. When applied to Rayleigh fading channels, our results show that the interference constraint is harmful at high-power regime, whereas at lowpower regime, it has a marginal impact and no-interference performance may be achieved. © 2010 IEEE.

  15. On the capacity of cognitive radio under limited channel state information over fading channels

    KAUST Repository

    Rezki, Zouheir

    2011-06-01

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel state information (CSI) of the secondary link, but knows only the statistics and an estimated version of the secondary transmitter-primary receiver (ST-PR) link, is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels (with continuous probability density function) under average and peak transmit-power constraints and with respect to two different interference constraints: an interference outage constraint and a signal-to-interference (SI) outage constraint. When applied to Rayleigh fading channels, our results show, for instance, that the interference constraint is harmful at high-power regime, whereas at low-power regime, it has a marginal impact and no-interference performance may be achieved. © 2011 IEEE.

  16. On the secrecy capacity of the broadcast wiretap channel with imperfect channel state information

    KAUST Repository

    Hyadi, Amal

    2014-12-01

    In this paper, we consider secure broadcasting over fast fading channels. Assuming imperfect main channel state information (CSI) at the transmitter, we first provide an upper and a lower bounds on the ergodic secrecy capacity when a common message is broadcasted to multiple legitimate receivers in the presence of one eavesdropper. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link. Then, we present an expression for the achievable secrecy sum-rate when each legitimate receiver is interested in an independent message. The special cases of high SNR, perfect and no-main CSI are also analyzed. Numerical results are presented to illustrate the obtained results for the case of independent but not necessarily identically distributed Rayleigh fading channels.

  17. Pseudoalteromonas spp. serve as initial bacterial attractants in mesocosms of coastal waters but have subsequent antifouling capacity in mesocosms and when embedded in paint.

    Science.gov (United States)

    Bernbom, Nete; Ng, Yoke Yin; Olsen, Stefan Møller; Gram, Lone

    2013-11-01

    The purpose of the present study was to determine if the monoculture antifouling effect of several pigmented pseudoalteromonads was retained in in vitro mesocosm systems using natural coastal seawater and when the bacteria were embedded in paint used on surfaces submerged in coastal waters. Pseudoalteromonas piscicida survived on a steel surface and retained antifouling activity for at least 53 days in sterile seawater, whereas P. tunicata survived and had antifouling activity for only 1 week. However, during the first week, all Pseudoalteromonas strains facilitated rather than prevented bacterial attachment when used to coat stainless steel surfaces and submerged in mesocosms with natural seawater. The bacterial density on surfaces coated with sterile growth medium was 10(5) cells/cm(2) after 7 days, whereas counts on surfaces precoated with Pseudoalteromonas were significantly higher, at 10(6) to 10(8) cells/cm(2). However, after 53 days, seven of eight Pseudoalteromonas strains had reduced total bacterial adhesion compared to the control. P. piscicida, P. antarctica, and P. ulvae remained on the surface, at levels similar to those in the initial coating, whereas P. tunicata could not be detected. Larger fouling organisms were observed on all plates precoated with Pseudoalteromonas; however, plates coated only with sterile growth medium were dominated by a bacterial biofilm. Suspensions of a P. piscicida strain and a P. tunicata strain were incorporated into ship paints (Hempasil x3 87500 and Hempasil 77500) used on plates that were placed at the Hempel A/S test site in Jyllinge Harbor. For the first 4 months, no differences were observed between control plates and treated plates, but after 5 to 6 months, the control plates were more fouled than the plates with pseudoalteromonad-based paint. Our study demonstrates that no single laboratory assay can predict antifouling effects and that a combination of laboratory and real-life methods must be used to determine

  18. On the capacity of multiaccess fading channels with full channel state information at low power regime

    KAUST Repository

    Rezki, Zouheir; Alouini, Mohamed-Slim

    2013-01-01

    multidimensional rectangle structure and thus is simply characterized by single user capacity points. More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum rate maximizer

  19. Towards an Informed Mexican and Mexican-American Citizenry: Bridging the Gap to Increase Human Capacity and Information Dissemination

    Science.gov (United States)

    Ramirez, M. D.; Ramirez, D. M.

    2008-12-01

    The research translation and community outreach goal of The University of Arizona's (UA) Superfund Basic Research Program and U.S.-Mexico Binational Center for Environmental Sciences and Toxicology is to increase human capacity and information dissemination to diverse stakeholders, including federal, state, and local government agencies as well as northern Mexican and border community stakeholders. Due to Arizona's demographic characteristics and the UA's proximity to the U.S. - Mexico border, activities target primarily Mexican and Mexican-American populations. With this in mind, a model has been established that pulls from human capital, community-based participatory research and public participation theories. The theories applied to our target population have resulted in the creation of a successful model that is used in both research translation and community outreach work. The model contains four components: community needs (participation), science translation (information), engagement (outreach), and training (education). Examples of how this model operates for various stakeholders involved in environmental science and health issues will be discussed. A case in point of how this model has been applied effectively is the partnership with promotoras (community health advocates) to do environmental science and health trainings to increase the knowledge base of specific populations disproportionately exposed to contaminants of concern. Additional case studies and methodologies used to develop innovative communicative tools (that takes into consideration cultural idiosyncrasies) for stakeholders at all levels in Arizona, the border, and Mexico will be highlighted, such as: 1) information sheets regarding local environmental issues for communities neighboring contaminated sites, 2) SciTransfer Bulletins targeting professional level stakeholders such as Project Managers, Community Involvement Coordinators and the general public, 3) coordinating technical and

  20. Embedded defects

    International Nuclear Information System (INIS)

    Barriola, M.; Vachaspati, T.; Bucher, M.

    1994-01-01

    We give a prescription for embedding classical solutions and, in particular, topological defects in field theories which are invariant under symmetry groups that are not necessarily simple. After providing examples of embedded defects in field theories based on simple groups, we consider the electroweak model and show that it contains the Z string and a one-parameter family of strings called the W(α) string. It is argued that although the members of this family are gauge equivalent when considered in isolation, each member becomes physically distinct when multistring configurations are considered. We then turn to the issue of stability of embedded defects and demonstrate the instability of a large class of such solutions in the absence of bound states or condensates. The Z string is shown to be unstable for all values of the Higgs boson mass when θ W =π/4. W strings are also shown to be unstable for a large range of parameters. Embedded monopoles suffer from the Brandt-Neri-Coleman instability. Finally, we connect the electroweak string solutions to the sphaleron

  1. A tool to increase information-processing capacity for consumer water meter data

    Directory of Open Access Journals (Sweden)

    Heinz E. Jacobs

    2012-06-01

    Objective: The objective of this research article was to describe the development of Swift, a locally developed software tool for analysing water meter data from an information management perspective, which engineers in the water field generally use, and to assess critically the influence of Swift on published research and industry. This article focuses on water usage and the challenge of data interchange and extraction as issues that various industries face. Method: This article presents the first detailed report on Swift. It uses a detailed knowledge review and presents and summarises the findings chronologically. Results: The water meter data flow path used to be quite simple. The risk of breaches in confidentiality was limited. Technological advances over the years have led to additional knowledge coming from the same water meter readings with subsequent research outputs. However, there are also complicated data flow paths and increased risks. Users have used Swift to analyse more than two million consumers’ water meter readings to date. Studies have culminated in 10 peer-reviewed journal articles using the data. Seven of them were in the last five years. Conclusion: Swift-based data was the basis of various research studies in the past decade. Practical guidelines in the civil engineering fraternity for estimating water use in South Africa have incorporated knowledge from these studies. Developments after 1995 have increased the information processing capacity for water meter data.

  2. On the capacity of multiple access and broadcast fading Channels with full channel state information at low power regime

    KAUST Repository

    Rezki, Zouheir

    2013-07-01

    We study the throughput capacity region of the Gaussian multi-access (MAC) fading channel with perfect channel state information (CSI) at the receiver and at the transmitters (CSI-TR), at low power regime. We show that it has a multidimensional rectangle structure and thus is simply characterized by single user capacity points. More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum-rate maximizer and that the coordinates of this point coincide with single user capacity bounds. Using the duality of Gaussian MAC and broadcast channels (BC), we provide a simple characterization of the BC capacity region at low power regime. © 2013 IEEE.

  3. Scaling the Information Load of Occupations: Preliminary Findings of the Fit between Individual Capacities and Environmental Demands

    Science.gov (United States)

    Haase, Richard F.; Ferreira, Joaquim Armando G. A.; Santos, Eduardo J. R.; Aguayo, Gina M.; Fallon, Melissa M.

    2008-01-01

    Person-Environment (P-E) fit models provide a conceptually powerful way to think about career development, vocational choice, and occupational success. The work reported here focuses on yet another pair of P-E criteria: self-reported individual capacity for information processing (the ability to tolerate information overload from a variety of…

  4. Koszul Information Geometry and Souriau Geometric Temperature/Capacity of Lie Group Thermodynamics

    Directory of Open Access Journals (Sweden)

    Frédéric Barbaresco

    2014-08-01

    Full Text Available The François Massieu 1869 idea to derive some mechanical and thermal properties of physical systems from “Characteristic Functions”, was developed by Gibbs and Duhem in thermodynamics with the concept of potentials, and introduced by Poincaré in probability. This paper deals with generalization of this Characteristic Function concept by Jean-Louis Koszul in Mathematics and by Jean-Marie Souriau in Statistical Physics. The Koszul-Vinberg Characteristic Function (KVCF on convex cones will be presented as cornerstone of “Information Geometry” theory, defining Koszul Entropy as Legendre transform of minus the logarithm of KVCF, and Fisher Information Metrics as hessian of these dual functions, invariant by their automorphisms. In parallel, Souriau has extended the Characteristic Function in Statistical Physics looking for other kinds of invariances through co-adjoint action of a group on its momentum space, defining physical observables like energy, heat and momentum as pure geometrical objects. In covariant Souriau model, Gibbs equilibriums states are indexed by a geometric parameter, the Geometric (Planck Temperature, with values in the Lie algebra of the dynamical Galileo/Poincaré groups, interpreted as a space-time vector, giving to the metric tensor a null Lie derivative. Fisher Information metric appears as the opposite of the derivative of Mean “Moment map” by geometric temperature, equivalent to a Geometric Capacity or Specific Heat. We will synthetize the analogies between both Koszul and Souriau models, and will reduce their definitions to the exclusive Cartan “Inner Product”. Interpreting Legendre transform as Fourier transform in (Min,+ algebra, we conclude with a definition of Entropy given by a relation mixing Fourier/Laplace transforms: Entropy = (minus Fourier(Min,+ o Log o Laplace(+,X.

  5. A tool to increase information-processing capacity for consumer water meter data

    Directory of Open Access Journals (Sweden)

    Heinz E. Jacobs

    2012-02-01

    increased the information processing capacity for water meter data.

  6. Fuel cycle covariance of plutonium and americium separations to repository capacity using information theoretic measures

    International Nuclear Information System (INIS)

    Scopatz, Anthony; Schneider, Erich; Li, Jun; Yim, Man-Sung

    2011-01-01

    A light water reactor, fast reactor symbiotic fuel cycle scenario was modeled and parameterized based on thirty independent inputs. Simultaneously and stochastically choosing different values for each of these inputs and performing the associated fuel cycle mass-balance calculation, the fuel cycle itself underwent Monte Carlo simulation. A novel information theoretic metric is postulated as a measure of system-wide covariance. This metric is the coefficient of variation of the set of uncertainty coefficients generated from 2D slices of a 3D contingency table. It is then applied to the fuel cycle, taking fast reactor used fuel plutonium and americium separations as independent variables and the capacity of a fully-loaded tuff repository as the response. This set of parameters is known from prior studies to have a strong covariance. When measured with all 435 other input parameters possible, the fast reactor plutonium and americium separations pair was found to be ranked the second most covariant. This verifies that the coefficient of variation metric captures the desired sensitivity of sensitivity effects in the nuclear fuel cycle. (author)

  7. An Information Technology Framework for the Development of an Embedded Computer System for the Remote and Non-Destructive Study of Sensitive Archaeology Sites

    Directory of Open Access Journals (Sweden)

    Iliya Georgiev

    2017-04-01

    Full Text Available The paper proposes an information technology framework for the development of an embedded remote system for non-destructive observation and study of sensitive archaeological sites. The overall concept and motivation are described. The general hardware layout and software configuration are presented. The paper concentrates on the implementation of the following informational technology components: (a a geographically unique identification scheme supporting a global key space for a key-value store; (b a common method for octree modeling for spatial geometrical models of the archaeological artifacts, and abstract object representation in the global key space; (c a broadcast of the archaeological information as an Extensible Markup Language (XML stream over the Web for worldwide availability; and (d a set of testing methods increasing the fault tolerance of the system. This framework can serve as a foundation for the development of a complete system for remote archaeological exploration of enclosed archaeological sites like buried churches, tombs, and caves. An archaeological site is opened once upon discovery, the embedded computer system is installed inside upon a robotic platform, equipped with sensors, cameras, and actuators, and the intact site is sealed again. Archaeological research is conducted on a multimedia data stream which is sent remotely from the system and conforms to necessary standards for digital archaeology.

  8. On the capacity of multiple access and broadcast fading channels with full channel state information at low SNR

    KAUST Repository

    Rezki, Zouheir

    2014-01-01

    We study the throughput capacity region of the Gaussian multi-access (MAC) fading channel with perfect channel state information (CSI) at the receiver and at the transmitters, at low power regime. We show that it has a multidimensional rectangle structure and thus is simply characterized by single user capacity points.More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum rate maximizer and that the coordinates of this point coincide with single user capacity bounds. Inspired from this result, we propose an on-off scheme, compute its achievable rate, and show that this scheme achieves single user capacity bounds of the MAC channel for a wide class of fading channels at asymptotically low power regime. We argue that this class of fading encompasses all known wireless channels for which the capacity region of the MAC channel has even a simpler expression in terms of users\\' average power constraints only. Using the duality of Gaussian MAC and broadcast channels (BC), we deduce a simple characterization of the BC capacity region at low power regime and show that for a class of fading channels (including Rayleigh fading), time-sharing is asymptotically optimal. © 2014 IEEE.

  9. On the low SNR capacity of maximum ratio combining over rician fading channels with full channel state information

    KAUST Repository

    Benkhelifa, Fatma

    2013-04-01

    In this letter, we study the ergodic capacity of a maximum ratio combining (MRC) Rician fading channel with full channel state information (CSI) at the transmitter and at the receiver. We focus on the low Signal-to-Noise Ratio (SNR) regime and we show that the capacity scales as L ΩK+L SNRx log(1SNR), where Ω is the expected channel gain per branch, K is the Rician fading factor, and L is the number of diversity branches. We show that one-bit CSI feedback at the transmitter is enough to achieve this capacity using an on-off power control scheme. Our framework can be seen as a generalization of recently established results regarding the fading-channels capacity characterization in the low-SNR regime. © 2012 IEEE.

  10. On the low SNR capacity of maximum ratio combining over rician fading channels with full channel state information

    KAUST Repository

    Benkhelifa, Fatma; Rezki, Zouheir; Alouini, Mohamed-Slim

    2013-01-01

    In this letter, we study the ergodic capacity of a maximum ratio combining (MRC) Rician fading channel with full channel state information (CSI) at the transmitter and at the receiver. We focus on the low Signal-to-Noise Ratio (SNR) regime and we show that the capacity scales as L ΩK+L SNRx log(1SNR), where Ω is the expected channel gain per branch, K is the Rician fading factor, and L is the number of diversity branches. We show that one-bit CSI feedback at the transmitter is enough to achieve this capacity using an on-off power control scheme. Our framework can be seen as a generalization of recently established results regarding the fading-channels capacity characterization in the low-SNR regime. © 2012 IEEE.

  11. On the capacity of nakagami-m fading Channels with full channel state information at low SNR

    KAUST Repository

    Rezki, Zouheir

    2012-06-01

    The capacity of flat Rayleigh fading channels with full channel state information (CSI) at the transmitter and at the receiver at asymptotically low SNR has been recently shown to scale essentially as SNR log(1/SNR)}. In this paper, we investigate the Nakagami-m fading channel capacity with full CSI, and show that the capacity of this channel scales essentially as m/ Omega SNR log(1/SNR), where m is the Nakagami-m fading parameter and where Ω is the channel mean-square. We also show that one-bit CSI at the transmitter is enough to achieve this asymptotic capacity using an On-Off power control scheme. Our framework may be seen as a generalization of previous works as it captures the Rayleigh fading channel as a special case by taking m=1. © 2012 IEEE.

  12. Capacity building for health inequality monitoring in Indonesia: enhancing the equity orientation of country health information system.

    Science.gov (United States)

    Hosseinpoor, Ahmad Reza; Nambiar, Devaki; Tawilah, Jihane; Schlotheuber, Anne; Briot, Benedicte; Bateman, Massee; Davey, Tamzyn; Kusumawardani, Nunik; Myint, Theingi; Nuryetty, Mariet Tetty; Prasetyo, Sabarinah; Suparmi; Floranita, Rustini

    Inequalities in health represent a major problem in many countries, including Indonesia. Addressing health inequality is a central component of the Sustainable Development Goals and a priority of the World Health Organization (WHO). WHO provides technical support for health inequality monitoring among its member states. Following a capacity-building workshop in the WHO South-East Asia Region in 2014, Indonesia expressed interest in incorporating health-inequality monitoring into its national health information system. This article details the capacity-building process for national health inequality monitoring in Indonesia, discusses successes and challenges, and how this process may be adapted and implemented in other countries/settings. We outline key capacity-building activities undertaken between April 2016 and December 2017 in Indonesia and present the four key outcomes of this process. The capacity-building process entailed a series of workshops, meetings, activities, and processes undertaken between April 2016 and December 2017. At each stage, a range of stakeholders with access to the relevant data and capacity for data analysis, interpretation and reporting was engaged with, under the stewardship of state agencies. Key steps to strengthening health inequality monitoring included capacity building in (1) identification of the health topics/areas of interest, (2) mapping data sources and identifying gaps, (3) conducting equity analyses using raw datasets, and (4) interpreting and reporting inequality results. As a result, Indonesia developed its first national report on the state of health inequality. A number of peer-reviewed manuscripts on various aspects of health inequality in Indonesia have also been developed. The capacity-building process undertaken in Indonesia is designed to be adaptable to other contexts. Capacity building for health inequality monitoring among countries is a critical step for strengthening equity-oriented national health

  13. Native American Women Leaders' Use of Information and Communication Technologies (ICTs) for Work-Life Balance (WLB) and Capacity Building

    Science.gov (United States)

    Jensen, Crystal C.

    2013-01-01

    Native American women's leadership, information communication technologies (ICTs), work-life balance (WLB) and human capacity building (HCB) are grounded in social justice issues due to their long history of overall cultural decimation, inequitable access to technology, monetary resources, and social power (agency), and influence. Currently, there…

  14. Capacity Building: Data- and Research-Informed Development of Schools and Teaching Practices in Denmark and Norway

    Science.gov (United States)

    Qvortrup, Lars

    2016-01-01

    Based on experiences from a number of large scale data- and research-informed school development projects in Denmark and Norway, led by the author, three hypotheses are discussed: that an effective way of linking research and practice is achieved (1) using a capacity building approach, that is, to collaborate in the practical school context…

  15. 76 FR 6694 - Disclosure of Medical Information to the Surrogate of a Patient Who Lacks Decision-Making Capacity

    Science.gov (United States)

    2011-02-08

    ... pertaining to the release of information from VA records. We are adding definitions of ``decision-making... lacks decision-making capacity.'' Because the existing definition of ``surrogate'' is substantively... sections. 0 2. Amend Sec. 1.460 by adding, in alphabetical order, the definitions of ``decision-making...

  16. Effective capacity of Nakagami-m fading channels with full channel state information in the low power regime

    KAUST Repository

    Benkhelifa, Fatma; Rezki, Zouheir; Alouini, Mohamed-Slim

    2013-01-01

    information (CSI) at both the transmitter and at the receiver. We focus on the low Signal-to-Noise Ratio (SNR) regime. We show that the effective capacity for any arbitrary but finite statistically delay Quality of Service (QoS) exponent θ, scales essentially

  17. Assessment of Land Surface Complexity In Relation To Information Capacity and the Fractal Dimension in Different Landform Regions Using Landsat Data

    International Nuclear Information System (INIS)

    Hong, Wang Xu; Huijie, Qin; Zhe, Zhang; Fei, Li

    2014-01-01

    Remote sensing images are highly structured, and contiguous pixels of space domain have strong correlations that contain abundant information on land surface structure features and land surface electromagnetic radiation features. The information capacity model, which is a quality evaluation model based on a multi-dimensional histogram, includes local correlations within different pixels. Thus, the information capacity can illustrate land surface structural information more objectively and effectively than other single-pixel calculation models. Our results reveal that the information capacity value correlates well with the meaningful grey level of remote sensing imagery. This high correlation is related to the complexity of terrestrial surface landscapes. Therefore, information capacity, as applied to geoscience, is introduced in this study to demonstrate the spatial differentiation of information capacity of different landform regions. Generally, the information capacity of a mountain is large and is followed in decreasing order by those of the hills and the plains. Moreover, the correlation between information capacity and the fractal dimension is analysed. Based on the results of this study, it can be concluded that the level of correlation for information capacity and the fractal dimension is high, and the correlation coefficient for the basic landform areas and the loess landform areas is 0.874 and 0.825, respectively. Finally, this paper proposes that information capacity be used as a new reference index for geoscientific analysis in quantitative research on the characteristics of land surface complexity

  18. Embedding capacity estimation of reversible watermarking schemes

    Indian Academy of Sciences (India)

    pre-computable tree based implementation which is conceptually similar to the co- occurrence based method ..... requires an offline stage and some additional memory. ...... Recall that s ∈ S here represents s1 ∈ Sξ1 ,s2 ∈ Sξ2 ,··· ,sN ∈ SξN .

  19. Improving Nigerian health policymakers' capacity to access and utilize policy relevant evidence: outcome of information and communication technology training workshop.

    Science.gov (United States)

    Uneke, Chigozie Jesse; Ezeoha, Abel Ebeh; Uro-Chukwu, Henry; Ezeonu, Chinonyelum Thecla; Ogbu, Ogbonnaya; Onwe, Friday; Edoga, Chima

    2015-01-01

    Information and communication technology (ICT) tools are known to facilitate communication and processing of information and sharing of knowledge by electronic means. In Nigeria, the lack of adequate capacity on the use of ICT by health sector policymakers constitutes a major impediment to the uptake of research evidence into the policymaking process. The objective of this study was to improve the knowledge and capacity of policymakers to access and utilize policy relevant evidence. A modified "before and after" intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point likert scale according to the degree of adequacy; 1 = grossly inadequate, 4 = very adequate was employed. This study was conducted in Ebonyi State, south-eastern Nigeria and the participants were career health policy makers. A two-day intensive ICT training workshop was organized for policymakers who had 52 participants in attendance. Topics covered included: (i). intersectoral partnership/collaboration; (ii). Engaging ICT in evidence-informed policy making; use of ICT for evidence synthesis; (iv) capacity development on the use of computer, internet and other ICT. The pre-workshop mean of knowledge and capacity for use of ICT ranged from 2.19-3.05, while the post-workshop mean ranged from 2.67-3.67 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 8.3%-39.1%. Findings of this study suggest that policymakers' ICT competence relevant to evidence-informed policymaking can be enhanced through training workshop.

  20. The development of ORACLe: a measure of an organisation's capacity to engage in evidence-informed health policy.

    Science.gov (United States)

    Makkar, Steve R; Turner, Tari; Williamson, Anna; Louviere, Jordan; Redman, Sally; Haynes, Abby; Green, Sally; Brennan, Sue

    2016-01-14

    Evidence-informed policymaking is more likely if organisations have cultures that promote research use and invest in resources that facilitate staff engagement with research. Measures of organisations' research use culture and capacity are needed to assess current capacity, identify opportunities for improvement, and examine the impact of capacity-building interventions. The aim of the current study was to develop a comprehensive system to measure and score organisations' capacity to engage with and use research in policymaking, which we entitled ORACLe (Organisational Research Access, Culture, and Leadership). We used a multifaceted approach to develop ORACLe. Firstly, we reviewed the available literature to identify key domains of organisational tools and systems that may facilitate research use by staff. We interviewed senior health policymakers to verify the relevance and applicability of these domains. This information was used to generate an interview schedule that focused on seven key domains of organisational capacity. The interview was pilot-tested within four Australian policy agencies. A discrete choice experiment (DCE) was then undertaken using an expert sample to establish the relative importance of these domains. This data was used to produce a scoring system for ORACLe. The ORACLe interview was developed, comprised of 23 questions addressing seven domains of organisational capacity and tools that support research use, including (1) documented processes for policymaking; (2) leadership training; (3) staff training; (4) research resources (e.g. database access); and systems to (5) generate new research, (6) undertake evaluations, and (7) strengthen relationships with researchers. From the DCE data, a conditional logit model was estimated to calculate total scores that took into account the relative importance of the seven domains. The model indicated that our expert sample placed the greatest importance on domains (2), (3) and (4). We utilised

  1. On the capacity of Rician fading channels with full channel state information at low SNR

    KAUST Repository

    Rezki, Zouheir; Alouini, Mohamed-Slim

    2012-01-01

    or noisy CSI at the transmitter and perfect CSI at the receiver. We also show that one-bit CSI at the transmitter is enough to achieve this asymptotic capacity using an On-Off power control scheme. Our framework may be seen as a generalization of previous

  2. 76 FR 4994 - Agency Information Collection: Activity Under OMB Review; Report of Traffic and Capacity...

    Science.gov (United States)

    2011-01-27

    ... Department uses T-100 data in carrying out its responsibilities relating to airline competition and... as used by the FAA, airport managers, the airlines and others in the air travel industry as planning... capacity at congested airports. Airline Industry Status Evaluations The Department apprizes Congress, the...

  3. Effective capacity of Nakagami-m fading channels with full channel state information in the low power regime

    KAUST Repository

    Benkhelifa, Fatma

    2013-09-01

    The effective capacity have been introduced by Wu and Neji as a link-layer model supporting statistical delay QoS requirements. In this paper, we propose to study the effective capacity of a Nakagami-m fading channel with full channel state information (CSI) at both the transmitter and at the receiver. We focus on the low Signal-to-Noise Ratio (SNR) regime. We show that the effective capacity for any arbitrary but finite statistically delay Quality of Service (QoS) exponent θ, scales essentially as S NRlog(1/SNR) exactly as the ergodic capacity, independently of any QoS constraint. We also characterize the minimum energy required for reliable communication, and the wideband slope to show that our results are in agreement with results established recently by Gursoy et al. We also propose an on-off power control scheme that achieves the capacity asymptotically using only one bit CSI feedback at the transmitter. Finally, some numerical results are presented to show the accuracy of our asymptotic results. © 2013 IEEE.

  4. Clicking to Learn: A Case Study of Embedding Radio-Frequency Based Clickers in an Introductory Management Information Systems Course

    Science.gov (United States)

    Nelson, Matthew L.; Hauck, Roslin V.

    2008-01-01

    The challenges associated with teaching a core introductory management information systems (MIS) course are well known (large class sizes serving a majority of non-MIS majors, sustaining student interests, encouraging class participation, etc.). This study offers a mechanism towards managing these challenges through the use of a simple and…

  5. Umbrella project for Bangladesh: strengthening NGO capacity and linkages to improve reproductive health service and information. RAS/98/P55.

    Science.gov (United States)

    1999-06-01

    In Bangladesh, the UN Population Fund is working to strengthen nongovernmental organization (NGO) capacity and linkages to improve reproductive health services and information. Specifically, the aim is to strengthen the technical and human resource capacity of participating NGOs and the functional linkages between national NGOs and relevant government agencies to help harmonize and standardize the delivery of reproductive health information and services. This umbrella project collaborates with RHI-participating NGOs in a policy paper on adolescent reproductive health, and will maintain contact with the regional dimension project to collaborate its activities. Programs implemented by partner NGOs are being reviewed and monitored, and linkages among national NGOs and government agencies are being developed. The main activities of the project are enumerated.

  6. Scenario-informed multiple criteria analysis for prioritizing investments in electricity capacity expansion

    International Nuclear Information System (INIS)

    Martinez, Lauro J.; Lambert, James H.; Karvetski, Christopher W.

    2011-01-01

    Planning the expansion and energy security of electricity capacity for a national electricity utility is a complex task in almost any economy. Planning is usually an iterative activity and can involve the use of large scale planning optimization systems accompanied by assessment of uncertain scenarios emerging from economic, technological, environmental, and regulatory developments. This paper applies a multiple criteria decision analysis to prioritize investment portfolios in capacity expansion and energy security while principally studying the robustness of the prioritization to multiple uncertain and emergent scenarios. The scenarios are identified through interaction with decision makers and stakeholders. The approach finds which scenarios most affect the prioritization of the portfolios and which portfolios have the greatest upside and downside potential across scenarios. The approach fosters innovation in the use of robust and efficient technologies, renewable energy sources, and cleaner energy fuels. A demonstration is provided for assessing the performance of technology portfolios constructed from investments in nine electricity generation technologies in Mexico.

  7. Feedback-Capacity of Degraded Gaussian Vector BC using Directed Information and Concave Envelopes

    OpenAIRE

    Ramachandran, Viswanathan

    2017-01-01

    It is known that the capacity region of a two user physically degraded discrete memoryless (DM) broadcastchannel (BC) is not enlarged by feedback. An identical result holds true for a physically degraded Gaussian BC,established later using a variant of the Entropy Power Inequality (EPI). In this paper, we extend the latter resultto a physically degraded Gaussian Vector BC (PD-GVBC). However, the extension is not EPI based, but employs arecent result on the factorization of concave envelopes. ...

  8. An embedded checklist in the Anesthesia Information Management System improves pre-anaesthetic induction setup: a randomised controlled trial in a simulation setting.

    Science.gov (United States)

    Wetmore, Douglas; Goldberg, Andrew; Gandhi, Nishant; Spivack, John; McCormick, Patrick; DeMaria, Samuel

    2016-10-01

    Anaesthesiologists work in a high stress, high consequence environment in which missed steps in preparation may lead to medical errors and potential patient harm. The pre-anaesthetic induction period has been identified as a time in which medical errors can occur. The Anesthesia Patient Safety Foundation has developed a Pre-Anesthetic Induction Patient Safety (PIPS) checklist. We conducted this study to test the effectiveness of this checklist, when embedded in our institutional Anesthesia Information Management System (AIMS), on resident performance in a simulated environment. Using a randomised, controlled, observer-blinded design, we compared performance of anaesthesiology residents in a simulated operating room under production pressure using a checklist in completing a thorough pre-anaesthetic induction evaluation and setup with that of residents with no checklist. The checklist was embedded in the simulated operating room's electronic medical record. Data for 38 anaesthesiology residents shows a statistically significant difference in performance in pre-anaesthetic setup and evaluation as scored by blinded raters (maximum score 22 points), with the checklist group performing better by 7.8 points (p<0.01). The effects of gender and year of residency on total score were not significant. Simulation duration (time to anaesthetic agent administration) was increased significantly by the use of the checklist. Required use of a pre-induction checklist improves anaesthesiology resident performance in a simulated environment. The PIPS checklist as an integrated part of a departmental AIMS warrant further investigation as a quality measure. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  9. A metric space approach to the information capacity of spike trains

    OpenAIRE

    HOUGHTON, CONOR JAMES; GILLESPIE, JAMES

    2010-01-01

    PUBLISHED Classical information theory can be either discrete or continuous, corresponding to discrete or continuous random variables. However, although spike times in a spike train are described by continuous variables, the information content is usually calculated using discrete information theory. This is because the number of spikes, and hence, the number of variables, varies from spike train to spike train, making the continuous theory difficult to apply.It is possible to avoid ...

  10. Utilization of information communication technology (ICT) - Based training / learning for capacity building in radiation protection framework

    International Nuclear Information System (INIS)

    Oluyemi, I.O.D.

    2008-01-01

    Full text: Radiation protection is the science of protecting people and the environment from the harmful effects of ionizing radiation, which includes both particle radiation and high energy electromagnetic radiation. It includes occupational radiation protection, which is the protection of workers; medical radiation protection, which is the protection of patients; and public radiation protection, which is about protection of individual members of the public, and of the population as a whole. ICT has made possible the development of e-learning and several Virtual Learning Environments (VLEs) which can support a wide range of capacity building requirements, ranging from under-graduate and post-graduate programmes, continuing professional development courses, right through to short subject specific and research courses, thereby eliminating the problems of conventional forms of training / learning, some of which are: limited access, cost effectiveness and language / cultural barriers. This paper focuses on the utilization of these ICT-based training / learning for capacity building in radiation protection framework and concludes with suggestions on implementation strategies. (author)

  11. Embedded Processor Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Embedded Processor Laboratory provides the means to design, develop, fabricate, and test embedded computers for missile guidance electronics systems in support...

  12. DNA MemoChip: Long-Term and High Capacity Information Storage and Select Retrieval.

    Science.gov (United States)

    Stefano, George B; Wang, Fuzhou; Kream, Richard M

    2018-02-26

    Over the course of history, human beings have never stopped seeking effective methods for information storage. From rocks to paper, and through the past several decades of using computer disks, USB sticks, and on to the thin silicon "chips" and "cloud" storage of today, it would seem that we have reached an era of efficiency for managing innumerable and ever-expanding data. Astonishingly, when tracing this technological path, one realizes that our ancient methods of informational storage far outlast paper (10,000 vs. 1,000 years, respectively), let alone the computer-based memory devices that only last, on average, 5 to 25 years. During this time of fast-paced information generation, it becomes increasingly difficult for current storage methods to retain such massive amounts of data, and to maintain appropriate speeds with which to retrieve it, especially when in demand by a large number of users. Others have proposed that DNA-based information storage provides a way forward for information retention as a result of its temporal stability. It is now evident that DNA represents a potentially economical and sustainable mechanism for storing information, as demonstrated by its decoding from a 700,000 year-old horse genome. The fact that the human genome is present in a cell, containing also the varied mitochondrial genome, indicates DNA's great potential for large data storage in a 'smaller' space.

  13. Implementation of generalized quantum measurements: Superadditive quantum coding, accessible information extraction, and classical capacity limit

    International Nuclear Information System (INIS)

    Takeoka, Masahiro; Fujiwara, Mikio; Mizuno, Jun; Sasaki, Masahide

    2004-01-01

    Quantum-information theory predicts that when the transmission resource is doubled in quantum channels, the amount of information transmitted can be increased more than twice by quantum-channel coding technique, whereas the increase is at most twice in classical information theory. This remarkable feature, the superadditive quantum-coding gain, can be implemented by appropriate choices of code words and corresponding quantum decoding which requires a collective quantum measurement. Recently, an experimental demonstration was reported [M. Fujiwara et al., Phys. Rev. Lett. 90, 167906 (2003)]. The purpose of this paper is to describe our experiment in detail. Particularly, a design strategy of quantum-collective decoding in physical quantum circuits is emphasized. We also address the practical implication of the gain on communication performance by introducing the quantum-classical hybrid coding scheme. We show how the superadditive quantum-coding gain, even in a small code length, can boost the communication performance of conventional coding techniques

  14. Conceptualizing Embedded Configuration

    DEFF Research Database (Denmark)

    Oddsson, Gudmundur Valur; Hvam, Lars; Lysgaard, Ole

    2006-01-01

    and services. The general idea can be named embedded configuration. In this article we intend to conceptualize embedded configuration, what it is and is not. The difference between embedded configuration, sales configuration and embedded software is explained. We will look at what is needed to make embedded...... configuration systems. That will include requirements to product modelling techniques. An example with consumer electronics will illuminate the elements of embedded configuration in settings that most can relate to. The question of where embedded configuration would be relevant is discussed, and the current...

  15. Optimal nonlinear information processing capacity in delay-based reservoir computers

    Science.gov (United States)

    Grigoryeva, Lyudmila; Henriques, Julie; Larger, Laurent; Ortega, Juan-Pablo

    2015-09-01

    Reservoir computing is a recently introduced brain-inspired machine learning paradigm capable of excellent performances in the processing of empirical data. We focus in a particular kind of time-delay based reservoir computers that have been physically implemented using optical and electronic systems and have shown unprecedented data processing rates. Reservoir computing is well-known for the ease of the associated training scheme but also for the problematic sensitivity of its performance to architecture parameters. This article addresses the reservoir design problem, which remains the biggest challenge in the applicability of this information processing scheme. More specifically, we use the information available regarding the optimal reservoir working regimes to construct a functional link between the reservoir parameters and its performance. This function is used to explore various properties of the device and to choose the optimal reservoir architecture, thus replacing the tedious and time consuming parameter scannings used so far in the literature.

  16. Biometric feature embedding using robust steganography technique

    Science.gov (United States)

    Rashid, Rasber D.; Sellahewa, Harin; Jassim, Sabah A.

    2013-05-01

    This paper is concerned with robust steganographic techniques to hide and communicate biometric data in mobile media objects like images, over open networks. More specifically, the aim is to embed binarised features extracted using discrete wavelet transforms and local binary patterns of face images as a secret message in an image. The need for such techniques can arise in law enforcement, forensics, counter terrorism, internet/mobile banking and border control. What differentiates this problem from normal information hiding techniques is the added requirement that there should be minimal effect on face recognition accuracy. We propose an LSB-Witness embedding technique in which the secret message is already present in the LSB plane but instead of changing the cover image LSB values, the second LSB plane will be changed to stand as a witness/informer to the receiver during message recovery. Although this approach may affect the stego quality, it is eliminating the weakness of traditional LSB schemes that is exploited by steganalysis techniques for LSB, such as PoV and RS steganalysis, to detect the existence of secrete message. Experimental results show that the proposed method is robust against PoV and RS attacks compared to other variants of LSB. We also discussed variants of this approach and determine capacity requirements for embedding face biometric feature vectors while maintain accuracy of face recognition.

  17. Knowledge Translation Capacity of Arts-informed Dissemination: A Narrative Study

    OpenAIRE

    Jennifer L Lapum; Linda Liu; Kathryn Church; Sarah Hume; Bailey Harding; Siyuan Wang; Megan Nguyen; Gideon Cohen; Terrence M Yau

    2016-01-01

    Background: Arts-informed dissemination is an expanding approach to enhancing knowledge translation in the health sciences. Problematic is the minimal evaluation studies and the rare reporting of the influencing factors of knowledge translation. “The 7,024th Patient” is a research-derived art installation created to disseminate findings about patients’ experiences of heart surgery and the importance of humanistic patient-centred care approaches. The current study’s purpose was to explor...

  18. RELATION BETWEEN ORGANIZATIONAL - AND INFORMATION RESILIENCE: A WAY FOR IMPROVEMENT OF SYSTEM CAPACITY

    Directory of Open Access Journals (Sweden)

    Slavko Arsovski

    2010-09-01

    Full Text Available In today's business conditions, organizations worldwide operate with the transactions executed and communications received immediately after they are initiated. Tolerance in every aspect is shrinking and many organizations are outsourcing dependable. Disruption in business has widened, it includes traditional natural disaster and any event that disturbs this fast-paced operational flow - from an acquisition or organization growth to a new government regulation or to a scheduled system upgrade. This resulted in a new business paradigm organizational resilience. Impact of Information Systems (IS on organizational resilience is through: (1 higher level of knowledge and transparency of business processes, (2 higher level of flexibility, agility and sustainability of organization, (3 enhancement of key competiveness forces, (4 enhancements of awareness about business risks and vulnerability of organizations, (5 enhancement of speed of organization recovery, (6 enhancement of organizational culture and awareness about resilience and (7 supporting the organization sustainability. Each possible impact of IS varies and depends upon two sides and their relations: (1 characteristics of IS which is related to ICT characteristics and (2 characteristics of organization. Because that, authors contribution in this paper is to make clear different approaches to IS - and organizational resilience and establish the model for simulation of this impact. This model is evaluated on an example and presented as a case study.

  19. Strengthening capacity for local evidence to inform local responders to HIV in a remote Solomon Island health service

    Directory of Open Access Journals (Sweden)

    David MacLaren

    2015-04-01

    Full Text Available Background: Documenting specific knowledge and attitudes about HIV in the culturally diverse nation of Solomon Islands is essential to inform locally targeted public health responses. As part of a large capacity-strengthening project at Atoifi Adventist Hospital in East Kwaio, Solomon Islands, researchers, using a ‘learn-by-doing’ process, worked with participants in public health research methods. Methods: Overall, 43 people attended research capacity building workshops in 2011; eight joined the HIV study group. A cross-sectional survey including semi-structured interviews on HIV was conducted by the group. In February 2014, a hospital administrator was interviewed about how the 2011 study informed local HIV responses. Results: Of the 53 survey participants, 64% self-assessed as having little or no HIV knowledge, but 90% knew HIV could be transmitted between men and women during sex. Less than 50% knew HIV could be transmitted between two men having sex, 45% thought HIV could be transmitted by mosquitoes and 55% agreed condoms help protect from HIV. Most participants reported negative attitudes towards people with HIV. Three years later the health administrator reported ad hoc responses to HIV because of low HIV prevalence, increasing noncommunicable diseases, staff turnover and resource shortages. Discussion: This HIV study was used to strengthen research skills in local health professionals and community members in Solomon Islands. It showed that community members require accurate information about HIV transmission and that entrenched stigma is an issue. Although results provided local evidence for local response, ongoing health system challenges and little local HIV transmission meant HIV services remain rudimentary.

  20. Essays in energy policy and planning modeling under uncertainty: Value of information, optimistic biases, and simulation of capacity markets

    Science.gov (United States)

    Hu, Ming-Che

    Optimization and simulation are popular operations research and systems analysis tools for energy policy modeling. This dissertation addresses three important questions concerning the use of these tools for energy market (and electricity market) modeling and planning under uncertainty. (1) What is the value of information and cost of disregarding different sources of uncertainty for the U.S. energy economy? (2) Could model-based calculations of the performance (social welfare) of competitive and oligopolistic market equilibria be optimistically biased due to uncertainties in objective function coefficients? (3) How do alternative sloped demand curves perform in the PJM capacity market under economic and weather uncertainty? How does curve adjustment and cost dynamics affect the capacity market outcomes? To address the first question, two-stage stochastic optimization is utilized in the U.S. national MARKAL energy model; then the value of information and cost of ignoring uncertainty are estimated for three uncertainties: carbon cap policy, load growth and natural gas prices. When an uncertainty is important, then explicitly considering those risks when making investments will result in better performance in expectation (positive expected cost of ignoring uncertainty). Furthermore, eliminating the uncertainty would improve strategies even further, meaning that improved forecasts of future conditions are valuable ( i.e., a positive expected value of information). Also, the value of policy coordination shows the difference between a strategy developed under the incorrect assumption of no carbon cap and a strategy correctly anticipating imposition of such a cap. For the second question, game theory models are formulated and the existence of optimistic (positive) biases in market equilibria (both competitive and oligopoly markets) are proved, in that calculated social welfare and producer profits will, in expectation, exceed the values that will actually be received

  1. Unsteady Flame Embedding

    KAUST Repository

    El-Asrag, Hossam A.

    2011-01-01

    Direct simulation of all the length and time scales relevant to practical combustion processes is computationally prohibitive. When combustion processes are driven by reaction and transport phenomena occurring at the unresolved scales of a numerical simulation, one must introduce a dynamic subgrid model that accounts for the multiscale nature of the problem using information available on a resolvable grid. Here, we discuss a model that captures unsteady flow-flame interactions- including extinction, re-ignition, and history effects-via embedded simulations at the subgrid level. The model efficiently accounts for subgrid flame structure and incorporates detailed chemistry and transport, allowing more accurate prediction of the stretch effect and the heat release. In this chapter we first review the work done in the past thirty years to develop the flame embedding concept. Next we present a formulation for the same concept that is compatible with Large Eddy Simulation in the flamelet regimes. The unsteady flame embedding approach (UFE) treats the flame as an ensemble of locally one-dimensional flames, similar to the flamelet approach. However, a set of elemental one-dimensional flames is used to describe the turbulent flame structure directly at the subgrid level. The calculations employ a one-dimensional unsteady flame model that incorporates unsteady strain rate, curvature, and mixture boundary conditions imposed by the resolved scales. The model is used for closure of the subgrid terms in the context of large eddy simulation. Direct numerical simulation (DNS) data from a flame-vortex interaction problem is used for comparison. © Springer Science+Business Media B.V. 2011.

  2. Informational Capacity of the Financial Statements of Brazilian Banks: An Analysis from the Perspective of Liquidity Risk

    Directory of Open Access Journals (Sweden)

    Orleans Silva Martins

    2012-12-01

    Full Text Available This study aims to analyze the financial statements of Brazilian banks, from the perspective of liquidity risk by exploring whether the Statements of Cash Flows and Notes to these companies meet the requirements concerning the dissemination of liquidity risk demands by IFRS 7 and the principles of the Basel Committee. Additionally, we investigated whether the coefficients of box cover these companies, calculated from the DFC, show some respect to compliance with those requirements. For that, was raised a theoretical framework about liquidity and liquidity risk, and the role of DFC and Notes before the disclosure of information relating to liquidity. Accordingly, an exploratory study was conducted with the 28 companies that comprise the Banks segment of the BM&F Bovespa, through its financial statements for the year 2009. The main results indicate a low capacity of these informative statements about the situation and liquidity risk, given that only 60.71% of the requirements contained in the standards were met. Still, we conclude that the mere fact that it has good cash coverage ratios is not a necessary condition to be among the companies that meet the disclosure requirements of the situation and liquidity risk, or vice versa. Thus, even when companies have good liquidity indicators, the information required by the IASB and the BCBS has not been disclosed in its financial statements.

  3. Building capacity for in-situ phenological observation data to support integrated biodiversity information at local to national scales

    Science.gov (United States)

    Weltzin, J. F.

    2016-12-01

    Earth observations from a variety of platforms and across a range of scales are required to support research, natural resource management, and policy- and decision-making in a changing world. Integrated earth observation data provides multi-faceted information critical to decision support, vulnerability and change detection, risk assessments, early warning and modeling, simulation and forecasting in the natural resource societal benefit area. The USA National Phenology Network (USA-NPN; www.usanpn.org) is a national-scale science and monitoring initiative focused on phenology - the study of seasonal life-cycle events such as leafing, flowering, reproduction, and migration - as a tool to understand the response of biodiversity to environmental variation and change. USA-NPN provides a hierarchical, national monitoring framework that enables other organizations to leverage the capacity of the Network for their own applications - minimizing investment and duplication of effort - while promoting interoperability and sustainability. Over the last decade, the network has focused on the development of a centralized database for in-situ (ground based) observations of plants and animals, now with 8 M records for the period 1954-present. More recently, we have developed a workflow for the production and validation of spatially gridded phenology products based on models that couple the organismal data with climatological and meteorological data at daily time-steps and relatively fine spatial resolutions ( 2.5 km to 4 km). These gridded data are now ripe for integration with other modeled or earth observation gridded data, e.g., indices of drought impact or land surface reflectance. This greatly broadens capacity to scale organismal observational data to landscapes and regions, and enables novel investigations of biophysical interactions at unprecedented scales, e.g., continental-scale migrations. Sustainability emerges from identification of stakeholder needs, segmentation of

  4. Polymorphic Embedding of DSLs

    DEFF Research Database (Denmark)

    Hofer, Christian; Ostermann, Klaus; Rendel, Tillmann

    2008-01-01

    propose polymorphic embedding of DSLs, where many different interpretations of a DSL can be provided as reusable components, and show how polymorphic embedding can be realized in the programming language Scala. With polymorphic embedding, the static type-safety, modularity, composability and rapid...

  5. On the capacity of multiple access and broadcast fading channels with full channel state information at low SNR

    KAUST Repository

    Rezki, Zouheir; Alouini, Mohamed-Slim

    2014-01-01

    structure and thus is simply characterized by single user capacity points.More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum rate maximizer

  6. On the capacity of multiple access and broadcast fading Channels with full channel state information at low power regime

    KAUST Repository

    Rezki, Zouheir; Alouini, Mohamed-Slim

    2013-01-01

    rectangle structure and thus is simply characterized by single user capacity points. More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum-rate maximizer

  7. Evidence-informed capacity building for setting health priorities in low- and middle-income countries: A framework and recommendations for further research.

    Science.gov (United States)

    Li, Ryan; Ruiz, Francis; Culyer, Anthony J; Chalkidou, Kalipso; Hofman, Karen J

    2017-01-01

    Priority-setting in health is risky and challenging, particularly in resource-constrained settings. It is not simply a narrow technical exercise, and involves the mobilisation of a wide range of capacities among stakeholders - not only the technical capacity to "do" research in economic evaluations. Using the Individuals, Nodes, Networks and Environment (INNE) framework, we identify those stakeholders, whose capacity needs will vary along the evidence-to-policy continuum. Policymakers and healthcare managers require the capacity to commission and use relevant evidence (including evidence of clinical and cost-effectiveness, and of social values); academics need to understand and respond to decision-makers' needs to produce relevant research. The health system at all levels will need institutional capacity building to incentivise routine generation and use of evidence. Knowledge brokers, including priority-setting agencies (such as England's National Institute for Health and Care Excellence, and Health Interventions and Technology Assessment Program, Thailand) and the media can play an important role in facilitating engagement and knowledge transfer between the various actors. Especially at the outset but at every step, it is critical that patients and the public understand that trade-offs are inherent in priority-setting, and careful efforts should be made to engage them, and to hear their views throughout the process. There is thus no single approach to capacity building; rather a spectrum of activities that recognises the roles and skills of all stakeholders. A range of methods, including formal and informal training, networking and engagement, and support through collaboration on projects, should be flexibly employed (and tailored to specific needs of each country) to support institutionalisation of evidence-informed priority-setting. Finally, capacity building should be a two-way process; those who build capacity should also attend to their own capacity

  8. Evidence-informed capacity building for setting health priorities in low- and middle-income countries: A framework and recommendations for further research [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Ryan Li

    2017-03-01

    Full Text Available Priority-setting in health is risky and challenging, particularly in resource-constrained settings. It is not simply a narrow technical exercise, and involves the mobilisation of a wide range of capacities among stakeholders – not only the technical capacity to “do” research in economic evaluations. Using the Individuals, Nodes, Networks and Environment (INNE framework, we identify those stakeholders, whose capacity needs will vary along the evidence-to-policy continuum. Policymakers and healthcare managers require the capacity to commission and use relevant evidence (including evidence of clinical and cost-effectiveness, and of social values; academics need to understand and respond to decision-makers’ needs to produce relevant research. The health system at all levels will need institutional capacity building to incentivise routine generation and use of evidence. Knowledge brokers, including priority-setting agencies (such as England’s National Institute for Health and Care Excellence, and Health Interventions and Technology Assessment Program, Thailand and the media can play an important role in facilitating engagement and knowledge transfer between the various actors. Especially at the outset but at every step, it is critical that patients and the public understand that trade-offs are inherent in priority-setting, and careful efforts should be made to engage them, and to hear their views throughout the process. There is thus no single approach to capacity building; rather a spectrum of activities that recognises the roles and skills of all stakeholders. A range of methods, including formal and informal training, networking and engagement, and support through collaboration on projects, should be flexibly employed (and tailored to specific needs of each country to support institutionalisation of evidence-informed priority-setting. Finally, capacity building should be a two-way process; those who build capacity should also attend to

  9. The anterior-ventrolateral temporal lobe contributes to boosting visual working memory capacity for items carrying semantic information.

    Science.gov (United States)

    Chiou, Rocco; Lambon Ralph, Matthew A

    2018-04-01

    Working memory (WM) is a buffer that temporarily maintains information, be it visual or auditory, in an active state, caching its contents for online rehearsal or manipulation. How the brain enables long-term semantic knowledge to affect the WM buffer is a theoretically significant issue awaiting further investigation. In the present study, we capitalise on the knowledge about famous individuals as a 'test-case' to study how it impinges upon WM capacity for human faces and its neural substrate. Using continuous theta-burst transcranial stimulation combined with a psychophysical task probing WM storage for varying contents, we provide compelling evidence that (1) faces (regardless of familiarity) continued to accrue in the WM buffer with longer encoding time, whereas for meaningless stimuli (colour shades) there was little increment; (2) the rate of WM accrual was significantly more efficient for famous faces, compared to unknown faces; (3) the right anterior-ventrolateral temporal lobe (ATL) causally mediated this superior WM storage for famous faces. Specifically, disrupting the ATL (a region tuned to semantic knowledge including person identity) selectively hinders WM accrual for celebrity faces while leaving the accrual for unfamiliar faces intact. Further, this 'semantically-accelerated' storage is impervious to disruption of the right middle frontal gyrus and vertex, supporting the specific and causative contribution of the right ATL. Our finding advances the understanding of the neural architecture of WM, demonstrating that it depends on interaction with long-term semantic knowledge underpinned by the ATL, which causally expands the WM buffer when visual content carries semantic information. Copyright © 2018 The Authors. Published by Elsevier Inc. All rights reserved.

  10. Embedding beyond electrostatics

    DEFF Research Database (Denmark)

    Nåbo, Lina J.; Olsen, Jógvan Magnus Haugaard; Holmgaard List, Nanna

    2016-01-01

    We study excited states of cholesterol in solution and show that, in this specific case, solute wave-function confinement is the main effect of the solvent. This is rationalized on the basis of the polarizable density embedding scheme, which in addition to polarizable embedding includes non-electrostatic...... repulsion that effectively confines the solute wave function to its cavity. We illustrate how the inclusion of non-electrostatic repulsion results in a successful identification of the intense π → π∗ transition, which was not possible using an embedding method that only includes electrostatics....... This underlines the importance of non-electrostatic repulsion in quantum-mechanical embedding-based methods....

  11. Web Server Embedded System

    Directory of Open Access Journals (Sweden)

    Adharul Muttaqin

    2014-07-01

    Full Text Available Abstrak Embedded sistem saat ini menjadi perhatian khusus pada teknologi komputer, beberapa sistem operasi linux dan web server yang beraneka ragam juga sudah dipersiapkan untuk mendukung sistem embedded, salah satu aplikasi yang dapat digunakan dalam operasi pada sistem embedded adalah web server. Pemilihan web server pada lingkungan embedded saat ini masih jarang dilakukan, oleh karena itu penelitian ini dilakukan dengan menitik beratkan pada dua buah aplikasi web server yang tergolong memiliki fitur utama yang menawarkan “keringanan” pada konsumsi CPU maupun memori seperti Light HTTPD dan Tiny HTTPD. Dengan menggunakan parameter thread (users, ramp-up periods, dan loop count pada stress test embedded system, penelitian ini menawarkan solusi web server manakah diantara Light HTTPD dan Tiny HTTPD yang memiliki kecocokan fitur dalam penggunaan embedded sistem menggunakan beagleboard ditinjau dari konsumsi CPU dan memori. Hasil penelitian menunjukkan bahwa dalam hal konsumsi CPU pada beagleboard embedded system lebih disarankan penggunaan Light HTTPD dibandingkan dengan tiny HTTPD dikarenakan terdapat perbedaan CPU load yang sangat signifikan antar kedua layanan web tersebut Kata kunci: embedded system, web server Abstract Embedded systems are currently of particular concern in computer technology, some of the linux operating system and web server variegated also prepared to support the embedded system, one of the applications that can be used in embedded systems are operating on the web server. Selection of embedded web server on the environment is still rarely done, therefore this study was conducted with a focus on two web application servers belonging to the main features that offer a "lightness" to the CPU and memory consumption as Light HTTPD and Tiny HTTPD. By using the parameters of the thread (users, ramp-up periods, and loop count on a stress test embedded systems, this study offers a solution of web server which between the Light

  12. What's your poison? Impact of individual repair capacity on the outcomes of genotoxic therapies in cancer. Part II - information content and validity of biomarkers for individual repair capacity in the assessment of outcomes of anticancer therapy.

    Science.gov (United States)

    Petkova, Rumena; Chelenkova, Pavlina; Georgieva, Elena; Chakarov, Stoian

    2014-01-02

    The individual variance in the efficiency of repair of damage induced by genotoxic therapies may be an important factor in the assessment of eligibility for different anticancer treatments, the outcomes of various treatments and the therapy-associated complications, including acute and delayed toxicity and acquired drug resistance. The second part of this paper analyses the currently available information about the possibilities of using experimentally obtained knowledge about individual repair capacity for the purposes of personalised medicine and healthcare.

  13. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where ve...

  14. Feature-based component model for design of embedded systems

    Science.gov (United States)

    Zha, Xuan Fang; Sriram, Ram D.

    2004-11-01

    An embedded system is a hybrid of hardware and software, which combines software's flexibility and hardware real-time performance. Embedded systems can be considered as assemblies of hardware and software components. An Open Embedded System Model (OESM) is currently being developed at NIST to provide a standard representation and exchange protocol for embedded systems and system-level design, simulation, and testing information. This paper proposes an approach to representing an embedded system feature-based model in OESM, i.e., Open Embedded System Feature Model (OESFM), addressing models of embedded system artifacts, embedded system components, embedded system features, and embedded system configuration/assembly. The approach provides an object-oriented UML (Unified Modeling Language) representation for the embedded system feature model and defines an extension to the NIST Core Product Model. The model provides a feature-based component framework allowing the designer to develop a virtual embedded system prototype through assembling virtual components. The framework not only provides a formal precise model of the embedded system prototype but also offers the possibility of designing variation of prototypes whose members are derived by changing certain virtual components with different features. A case study example is discussed to illustrate the embedded system model.

  15. Embedded multiprocessors scheduling and synchronization

    CERN Document Server

    Sriram, Sundararajan

    2009-01-01

    Techniques for Optimizing Multiprocessor Implementations of Signal Processing ApplicationsAn indispensable component of the information age, signal processing is embedded in a variety of consumer devices, including cell phones and digital television, as well as in communication infrastructure, such as media servers and cellular base stations. Multiple programmable processors, along with custom hardware running in parallel, are needed to achieve the computation throughput required of such applications. Reviews important research in key areas related to the multiprocessor implementation of multi

  16. Corrosion Monitors for Embedded Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Robinson, Alex L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pfeifer, Kent B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Casias, Adrian L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Howell, Stephen W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sorensen, Neil R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Missert, Nancy A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-05-01

    We have developed and characterized novel in-situ corrosion sensors to monitor and quantify the corrosive potential and history of localized environments. Embedded corrosion sensors can provide information to aid health assessments of internal electrical components including connectors, microelectronics, wires, and other susceptible parts. When combined with other data (e.g. temperature and humidity), theory, and computational simulation, the reliability of monitored systems can be predicted with higher fidelity.

  17. Embedded Linux in het onderwijs

    NARCIS (Netherlands)

    Dr Ruud Ermers

    2008-01-01

    Embedded Linux wordt bij steeds meer grote bedrijven ingevoerd als embedded operating system. Binnen de opleiding Technische Informatica van Fontys Hogeschool ICT is Embedded Linux geïntroduceerd in samenwerking met het lectoraat Architectuur van Embedded Systemen. Embedded Linux is als vakgebied

  18. Depressive thoughts limit working memory capacity in dysphoria.

    Science.gov (United States)

    Hubbard, Nicholas A; Hutchison, Joanna L; Turner, Monroe; Montroy, Janelle; Bowles, Ryan P; Rypma, Bart

    2016-01-01

    Dysphoria is associated with persistence of attention on mood-congruent information. Longer time attending to mood-congruent information for dysphoric individuals (DIs) detracts from goal-relevant information processing and should reduce working memory (WM) capacity. Study 1 showed that DIs and non-DIs have similar WM capacities. Study 2 embedded depressive information into a WM task. Compared to non-DIs, DIs showed significantly reduced WM capacity for goal-relevant information in this task. Study 3 replicated results from Studies 1 and 2, and further showed that DIs had a significantly greater association between processing speed and recall on the depressively modified WM task compared to non-DIs. The presence of inter-task depressive information leads to DI-related decreased WM capacity. Results suggest dysphoria-related WM capacity deficits when depressive thoughts are present. WM capacity deficits in the presence of depressive thoughts are a plausible mechanism to explain day-to-day memory and concentration difficulties associated with depressed mood.

  19. Brauer type embedding problems

    CERN Document Server

    Ledet, Arne

    2005-01-01

    This monograph is concerned with Galois theoretical embedding problems of so-called Brauer type with a focus on 2-groups and on finding explicit criteria for solvability and explicit constructions of the solutions. The advantage of considering Brauer type embedding problems is their comparatively simple condition for solvability in the form of an obstruction in the Brauer group of the ground field. This book presupposes knowledge of classical Galois theory and the attendant algebra. Before considering questions of reducing the embedding problems and reformulating the solvability criteria, the

  20. Time-dependent embedding

    OpenAIRE

    Inglesfield, J. E.

    2007-01-01

    A method of solving the time-dependent Schr\\"odinger equation is presented, in which a finite region of space is treated explicitly, with the boundary conditions for matching the wave-functions on to the rest of the system replaced by an embedding term added on to the Hamiltonian. This time-dependent embedding term is derived from the Fourier transform of the energy-dependent embedding potential, which embeds the time-independent Schr\\"odinger equation. Results are presented for a one-dimensi...

  1. Electronics for embedded systems

    CERN Document Server

    Bindal, Ahmet

    2017-01-01

    This book provides semester-length coverage of electronics for embedded systems, covering most common analog and digital circuit-related issues encountered while designing embedded system hardware. It is written for students and young professionals who have basic circuit theory background and want to learn more about passive circuits, diode and bipolar transistor circuits, the state-of-the-art CMOS logic family and its interface with older logic families such as TTL, sensors and sensor physics, operational amplifier circuits to condition sensor signals, data converters and various circuits used in electro-mechanical device control in embedded systems. The book also provides numerous hardware design examples by integrating the topics learned in earlier chapters. The last chapter extensively reviews the combinational and sequential logic design principles to be able to design the digital part of embedded system hardware.

  2. Embedded Fragments Registry (EFR)

    Data.gov (United States)

    Department of Veterans Affairs — In 2009, the Department of Defense estimated that approximately 40,000 service members who served in OEF/OIF may have embedded fragment wounds as the result of small...

  3. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very...... specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention...... and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generation. Describes tools and programming models for multicore embedded systems Emphasizes throughout performance per watt scalability Discusses realistic limits of software parallelization Enables...

  4. STEGO TRANSFORMATION OF SPATIAL DOMAIN OF COVER IMAGE ROBUST AGAINST ATTACKS ON EMBEDDED MESSAGE

    Directory of Open Access Journals (Sweden)

    Kobozeva A.

    2014-04-01

    Full Text Available One of the main requirements to steganografic algorithm to be developed is robustness against disturbing influences, that is, to attacks against the embedded message. It was shown that guaranteeing the stego algorithm robustness does not depend on whether the additional information is embedded into the spatial or transformation domain of the cover image. Given the existing advantages of the spatial domain of the cover image in organization of embedding and extracting processes, a sufficient condition for ensuring robustness of such stego transformation was obtained in this work. It was shown that the amount of brightness correction related to the pixels of the cover image block is similar to the amount of correction related to the maximum singular value of the corresponding matrix of the block in case of embedding additional data that ensures robustness against attacks on the embedded message. Recommendations were obtained for selecting the size of the cover image block used in stego transformation as one of the parameters determining the calculation error of stego message. Given the inversely correspondence between the stego capacity of the stego channel being organized and the size of the cover image block, l=8 value was recommended.

  5. StegNet: Mega Image Steganography Capacity with Deep Convolutional Network

    Directory of Open Access Journals (Sweden)

    Pin Wu

    2018-06-01

    Full Text Available Traditional image steganography often leans interests towards safely embedding hidden information into cover images with payload capacity almost neglected. This paper combines recent deep convolutional neural network methods with image-into-image steganography. It successfully hides the same size images with a decoding rate of 98.2% or bpp (bits per pixel of 23.57 by changing only 0.76% of the cover image on average. Our method directly learns end-to-end mappings between the cover image and the embedded image and between the hidden image and the decoded image. We further show that our embedded image, while with mega payload capacity, is still robust to statistical analysis.

  6. Liquid-Embedded Elastomer Electronics

    Science.gov (United States)

    Kramer, Rebecca; Majidi, Carmel; Park, Yong-Lae; Paik, Jamie; Wood, Robert

    2012-02-01

    Hyperelastic sensors are fabricated by embedding a silicone rubber film with microchannels of conductive liquid. In the case of soft tactile sensors, pressing the surface of the elastomer will deform the cross-section of underlying channels and change their electrical resistance. Soft pressure sensors may be employed in a variety of applications. For example, a network of pressure sensors can serve as artificial skin by yielding detailed information about contact pressures. This concept was demonstrated in a hyperelastic keypad, where perpendicular conductive channels form a quasi-planar network within an elastomeric matrix that registers the location, intensity and duration of applied pressure. In a second demonstration, soft curvature sensors were used for joint angle proprioception. Because the sensors are soft and stretchable, they conform to the host without interfering with the natural mechanics of motion. This marked the first use of liquid-embedded elastomer electronics to monitor human or robotic motion. Finally, liquid-embedded elastomers may be implemented as conductors in applications that call for flexible or stretchable circuitry, such as robotic origami.

  7. Crop advisors as climate information brokers: Building the capacity of US farmers to adapt to climate change

    Directory of Open Access Journals (Sweden)

    Maria Carmen Lemos

    2014-01-01

    Full Text Available This paper examines the role of crop advisors as brokers of climate information to support US corn farmers to adapt to climatic change. It uses quantitative data collected from a broad survey of crop advisors in the US Corn Belt to examine the factors that shape advisors’ use of (and willingness to provide climate information to their clients. Building upon a general model of climate information usability we argue that advisors’ willingness to provide climate advice to farmers is influenced by three main factors: their information seeking habits and behavior, their experience with innovation in the past, and how climate information interplays with other kinds of information that they provide—especially agronomic advice. We find that advisors’ willingness to provide climate related information depends both on factors at the individual and organizational level and on the type of advice they provide. First, at the individual and organizational levels, advisors who work in supportive organizations and who collaborate with other advisors are more likely to provide climate information. Second, advisors are more likely to provide climate information if it does not interfere with their main profit making business (e.g. provision of agronomic advice. Third, there is a significant positive relationship between trust in a greater number or sources of information and use of climate information. Fourth, the way advisors perceive short- and long-term risk also influences their willingness to provide climate information; the more concerned they are about long-term climate-related risks to farming, the more likely they are to provide (or want to provide advice based on climate information. Differently from other empirical work in the literature, our analytical model suggests that neither negative experiences with climate information in the past nor the high level of uncertainty characteristic of climate information appear to influence advisors

  8. Embedded Systems Design: Optimization Challenges

    DEFF Research Database (Denmark)

    Pop, Paul

    2005-01-01

    Summary form only given. Embedded systems are everywhere: from alarm clocks to PDAs, from mobile phones to cars, almost all the devices we use are controlled by embedded systems. Over 99% of the microprocessors produced today are used in embedded systems, and recently the number of embedded systems...

  9. Enhancing the Capacity of Policy-Makers to Develop Evidence-Informed Policy Brief on Infectious Diseases of Poverty in Nigeria

    Directory of Open Access Journals (Sweden)

    Chigozie Jesse Uneke

    2015-09-01

    Full Text Available Background The lack of effective use of research evidence in policy-making is a major challenge in most low- and middle-income countries (LMICs. There is need to package research data into effective policy tools that will help policy-makers to make evidence-informed policy regarding infectious diseases of poverty (IDP. The objective of this study was to assess the usefulness of training workshops and mentoring to enhance the capacity of Nigerian health policy-makers to develop evidence-informed policy brief on the control of IDP. Methods A modified “before and after” intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point Likert scale according to the degree of adequacy; 1 = “grossly inadequate,” 4 = “very adequate” was employed. The main parameter measured was participants’ perceptions of their own knowledge/understanding. This study was conducted at subnational level and the participants were the career health policy-makers drawn from Ebonyi State in the South-Eastern Nigeria. A oneday evidence-to-policy workshop was organized to enhance the participants’ capacity to develop evidence-informed policy brief on IDP in Ebonyi State. Topics covered included collaborative initiative; preparation and use of policy briefs; policy dialogue; ethics in health policy-making; and health policy and politics. Results The preworkshop mean of knowledge and capacity ranged from 2.49-3.03, while the postworkshop mean ranged from 3.42–3.78 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 20.10%–45%. Participants were divided into 3 IDP mentorship groups (malaria, schistosomiasis, lymphatic filariasis [LF] and were mentored to identify potential policy options/recommendations for control of the diseases for the policy briefs. These policy options were subjected to research

  10. Enhancing the Capacity of Policy-Makers to Develop Evidence-Informed Policy Brief on Infectious Diseases of Poverty in Nigeria

    Science.gov (United States)

    Uneke, Chigozie Jesse; Ezeoha, Abel Ebeh; Uro-Chukwu, Henry; Ezeonu, Chinonyelum Thecla; Ogbu, Ogbonnaya; Onwe, Friday; Edoga, Chima

    2015-01-01

    Background: The lack of effective use of research evidence in policy-making is a major challenge in most low- and middle-income countries (LMICs). There is need to package research data into effective policy tools that will help policy-makers to make evidence-informed policy regarding infectious diseases of poverty (IDP). The objective of this study was to assess the usefulness of training workshops and mentoring to enhance the capacity of Nigerian health policy-makers to develop evidence-informed policy brief on the control of IDP. Methods: A modified "before and after" intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point Likert scale according to the degree of adequacy; 1 = "grossly inadequate," 4 = "very adequate" was employed. The main parameter measured was participants’ perceptions of their own knowledge/understanding. This study was conducted at subnational level and the participants were the career health policy-makers drawn from Ebonyi State in the South-Eastern Nigeria. A one-day evidence-to-policy workshop was organized to enhance the participants’ capacity to develop evidence-informed policy brief on IDP in Ebonyi State. Topics covered included collaborative initiative; preparation and use of policy briefs; policy dialogue; ethics in health policy-making; and health policy and politics. Results: The preworkshop mean of knowledge and capacity ranged from 2.49-3.03, while the postworkshop mean ranged from 3.42–3.78 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 20.10%–45%. Participants were divided into 3 IDP mentorship groups (malaria, schistosomiasis, lymphatic filariasis [LF]) and were mentored to identify potential policy options/recommendations for control of the diseases for the policy briefs. These policy options were subjected to research evidence synthesis by each

  11. Smart multicore embedded systems

    CERN Document Server

    Bertels, Koen; Karlsson, Sven; Pacull, François

    2014-01-01

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very often they are forced to rewrite sequential programs into parallel software, taking into account all the low level features and peculiarities of the underlying platforms. Readers will benefit from these authors’ approach, which takes into account both the application requirements and the platform specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generati...

  12. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Steinmann, Casper; Ruud, Kenneth

    2015-01-01

    We present a new QM/QM/MM-based model for calculating molecular properties and excited states of solute-solvent systems. We denote this new approach the polarizable density embedding (PDE) model and it represents an extension of our previously developed polarizable embedding (PE) strategy. The PDE...... model is a focused computational approach in which a core region of the system studied is represented by a quantum-chemical method, whereas the environment is divided into two other regions: an inner and an outer region. Molecules belonging to the inner region are described by their exact densities...

  13. Ontologiczne aspekty ucieleśnienia i realizacji informacji w umyśle (Ontological aspects of how information is embodied and embedded within the mind

    Directory of Open Access Journals (Sweden)

    Marek Hetmański

    2010-06-01

    Full Text Available The main aim of this paper is to explain how one can talk about information asfunctioning ontologically within the mind. From the cybernetic point of view,coding is essential to such functioning-transforming information from one systemof symbols of signs into another. Information coding takes place within the body(brain, in human use of instruments and tools, as well as in the manifold relationsbetween humans and the environment. Using the work of Arbib, Gibson, Batesonand Dennett, this paper present a model of the manifold functioning of informationwithin the human mind, with particular stress placed upon its signifi cance forpractical-cognitive behaviour.

  14. The capacity of the consumer to process information and make informed choices in the digital internal market (Deliverable 5.4)

    OpenAIRE

    Sybe de Vries; Marie-Pierre Granger; Silvia Adamo; Andrea Bianculli; Anne-Marie van den Bossche

    2016-01-01

    If we assume that market integration serves the interest of citizens in their capacity as consumers and optimizes consumer welfare, then the EU rules on free movement and competition could, according to Weatherill, be seen as a form of consumer policy.[1] Since national consumer protection law may impede free movement, which in itself is thus designed to advance the consumer interest, the European Court of Justice (hereafter: ECJ or Court), has developed its own notion of consumer interest.[2...

  15. Promoting Recruitment using Information Management Efficiently (PRIME): a stepped-wedge, cluster randomised trial of a complex recruitment intervention embedded within the REstart or Stop Antithrombotics Randomised Trial.

    Science.gov (United States)

    Maxwell, Amy E; Parker, Richard A; Drever, Jonathan; Rudd, Anthony; Dennis, Martin S; Weir, Christopher J; Al-Shahi Salman, Rustam

    2017-12-28

    Few interventions are proven to increase recruitment in clinical trials. Recruitment to RESTART, a randomised controlled trial of secondary prevention after stroke due to intracerebral haemorrhage, has been slower than expected. Therefore, we sought to investigate an intervention to boost recruitment to RESTART. We conducted a stepped-wedge, cluster randomised trial of a complex intervention to increase recruitment, embedded within the RESTART trial. The primary objective was to investigate if the PRIME complex intervention (a recruitment co-ordinator who conducts a recruitment review, provides access to bespoke stroke audit data exports, and conducts a follow-up review after 6 months) increases the recruitment rate to RESTART. We included 72 hospital sites located in England, Wales, or Scotland that were active in RESTART in June 2015. All sites began in the control state and were allocated using block randomisation stratified by hospital location (Scotland versus England/Wales) to start the complex intervention in one of 12 different months. The primary outcome was the number of patients randomised into RESTART per month per site. We quantified the effect of the complex intervention on the primary outcome using a negative binomial, mixed model adjusting for site, December/January months, site location, and background time trends in recruitment rate. We recruited and randomised 72 sites and recorded their monthly recruitment to RESTART over 24 months (March 2015 to February 2017 inclusive), providing 1728 site-months of observations for the primary analysis. The adjusted rate ratio for the number of patients randomised per month after allocation to the PRIME complex intervention versus control time before allocation to the PRIME complex intervention was 1.06 (95% confidence interval 0.55 to 2.03, p = 0.87). Although two thirds of respondents to the 6-month follow-up questionnaire agreed that the audit reports were useful, only six patients were reported to

  16. Early experience with formalin-fixed paraffin-embedded (FFPE) based commercial clinical genomic profiling of gliomas-robust and informative with caveats.

    Science.gov (United States)

    Movassaghi, Masoud; Shabihkhani, Maryam; Hojat, Seyed A; Williams, Ryan R; Chung, Lawrance K; Im, Kyuseok; Lucey, Gregory M; Wei, Bowen; Mareninov, Sergey; Wang, Michael W; Ng, Denise W; Tashjian, Randy S; Magaki, Shino; Perez-Rosendahl, Mari; Yang, Isaac; Khanlou, Negar; Vinters, Harry V; Liau, Linda M; Nghiemphu, Phioanh L; Lai, Albert; Cloughesy, Timothy F; Yong, William H

    2017-08-01

    Commercial targeted genomic profiling with next generation sequencing using formalin-fixed paraffin embedded (FFPE) tissue has recently entered into clinical use for diagnosis and for the guiding of therapy. However, there is limited independent data regarding the accuracy or robustness of commercial genomic profiling in gliomas. As part of patient care, FFPE samples of gliomas from 71 patients were submitted for targeted genomic profiling to one commonly used commercial vendor, Foundation Medicine. Genomic alterations were determined for the following grades or groups of gliomas; Grade I/II, Grade III, primary glioblastomas (GBMs), recurrent primary GBMs, and secondary GBMs. In addition, FFPE samples from the same patients were independently assessed with conventional methods such as immunohistochemistry (IHC), Quantitative real-time PCR (qRT-PCR), or Fluorescence in situ hybridization (FISH) for three genetic alterations: IDH1 mutations, EGFR amplification, and EGFRvIII expression. A total of 100 altered genes were detected by the aforementioned targeted genomic profiling assay. The number of different genomic alterations was significantly different between the five groups of gliomas and consistent with the literature. CDKN2A/B, TP53, and TERT were the most common genomic alterations seen in primary GBMs, whereas IDH1, TP53, and PIK3CA were the most common in secondary GBMs. Targeted genomic profiling demonstrated 92.3%-100% concordance with conventional methods. The targeted genomic profiling report provided an average of 5.5 drugs, and listed an average of 8.4 clinical trials for the 71 glioma patients studied but only a third of the trials were appropriate for glioma patients. In this limited comparison study, this commercial next generation sequencing based-targeted genomic profiling showed a high concordance rate with conventional methods for the 3 genetic alterations and identified mutations expected for the type of glioma. While it may not be feasible to

  17. NASA's Indigenous Capacity Building Initiative: Balancing Traditional Knowledge and Existing Remote Sensing Training to Inform Management Decisions

    Science.gov (United States)

    McCullum, A. J. K.; Schmidt, C.; Palacios, S. L.; Ly, V.

    2017-12-01

    NASA's Indigenous Capacity Building Initiative is aimed to provide remote sensing training, mentoring, and research opportunities to the indigenous community. A key programmatic goal is the co-production of place-based trainings where participants have the opportunity to address specific natural resource research and management issues facing their tribal lands. Three primary strategies have been adopted to engage with our tribal partners, these include: (1) the use of existing tribal networks and conferences such as the National Tribal GIS Conference, (2) coordination with other federal agencies such as the Bureau of Indian Affairs (BIA) and tribal liaisons at regional Climate Science Centers, and (3) connecting with tribes directly. Regional partner visits with tribes, such as meetings with the Samish Indian Nation, are integral to cultivate trusting, collaborative, and sustained partnerships and an understanding of how Earth Observations can be applied to the unique set of challenges and goals each tribe faces. As the program continues to grow, we aim to increase our incorporation of Traditional Ecological Knowledge (TEK) into technical methods and to develop trainings tailored to thematic areas of interest to specific tribes. Engagement and feedback are encouraged to refine our approaches to increase capacity within the indigenous community to utilize NASA Earth Observations.

  18. Embedding JIT into MRP

    NARCIS (Netherlands)

    Flapper, S.D.P.; Miltenburg, G.J.; Wijngaard, J.

    1991-01-01

    Today many companies who are using MRP production control systems are investigating how they can produce some or all of their products using just-in time (JIT) principles. They wonder to what extent MRP can provide support for JIT production. This paper describes how JIT can be embedded into MRP. A

  19. Embedded Multimaterial Extrusion Bioprinting

    NARCIS (Netherlands)

    Rocca, Marco; Fragasso, Alessio; Liu, Wanjun; Heinrich, Marcel A.; Zhang, Yu Shrike

    Embedded extrusion bioprinting allows for the generation of complex structures that otherwise cannot be achieved with conventional layer-by-layer deposition from the bottom, by overcoming the limits imposed by gravitational force. By taking advantage of a hydrogel bath, serving as a sacrificial

  20. Embedded data representations

    DEFF Research Database (Denmark)

    Willett, Wesley; Jansen, Yvonne; Dragicevic, Pierre

    2017-01-01

    We introduce embedded data representations, the use of visual and physical representations of data that are deeply integrated with the physical spaces, objects, and entities to which the data refers. Technologies like lightweight wireless displays, mixed reality hardware, and autonomous vehicles...

  1. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Reinholdt, Peter; Kongsted, Jacob; Olsen, Jógvan Magnus Haugaard

    2017-01-01

    We analyze the performance of the polarizable density embedding (PDE) model-a new multiscale computational approach designed for prediction and rationalization of general molecular properties of large and complex systems. We showcase how the PDE model very effectively handles the use of large...

  2. Embedded enzymes catalyse capture

    Science.gov (United States)

    Kentish, Sandra

    2018-05-01

    Membrane technologies for carbon capture can offer economic and environmental advantages over conventional amine-based absorption, but can suffer from limited gas flux and selectivity to CO2. Now, a membrane based on enzymes embedded in hydrophilic pores is shown to exhibit combined flux and selectivity that challenges the state of the art.

  3. A novel edge based embedding in medical images based on unique key generated using sudoku puzzle design.

    Science.gov (United States)

    Santhi, B; Dheeptha, B

    2016-01-01

    The field of telemedicine has gained immense momentum, owing to the need for transmitting patients' information securely. This paper puts forth a unique method for embedding data in medical images. It is based on edge based embedding and XOR coding. The algorithm proposes a novel key generation technique by utilizing the design of a sudoku puzzle to enhance the security of the transmitted message. The edge blocks of the cover image alone, are utilized to embed the payloads. The least significant bit of the pixel values are changed by XOR coding depending on the data to be embedded and the key generated. Hence the distortion in the stego image is minimized and the information is retrieved accurately. Data is embedded in the RGB planes of the cover image, thus increasing its embedding capacity. Several measures including peak signal noise ratio (PSNR), mean square error (MSE), universal image quality index (UIQI) and correlation coefficient (R) are the image quality measures that have been used to analyze the quality of the stego image. It is evident from the results that the proposed technique outperforms the former methodologies.

  4. Reversible and Embedded Watermarking of Medical Images for Telemedicine

    Directory of Open Access Journals (Sweden)

    Chung-Yen Su

    2015-08-01

    Full Text Available In this paper, we propose a new reversible watermarking of medical images for the applications in telemedicine. By using a bit-stream insertion scheme, the patient’s information can be treated as a watermark and can be embedded into the bit-stream of a cover image for remote transmission. The proposed method simplifies the design of traditional image coding after a reversible watermarking. Experimental results show that the compression ratio can be achieved up to 3.025. The watermarking capacity can be obtained over 0.75 bpp for some common images. In addition, the watermark can be extracted exactly and the cover image can be reconstructed either in a lossless way or a lossy way. The obtained results also show the improvement with respect to previous works.

  5. Pullout capacity of batter pile in sand.

    Science.gov (United States)

    Nazir, Ashraf; Nasr, Ahmed

    2013-03-01

    Many offshore structures are subjected to overturning moments due to wind load, wave pressure, and ship impacts. Also most of retaining walls are subjected to horizontal forces and bending moments, these forces are due to earth pressure. For foundations in such structures, usually a combination of vertical and batter piles is used. Little information is available in the literature about estimating the capacity of piles under uplift. In cases where these supporting piles are not vertical, the behavior under axial pullout is not well established. In order to delineate the significant variables affecting the ultimate uplift shaft resistance of batter pile in dry sand, a testing program comprising 62 pullout tests was conducted. The tests are conducted on model steel pile installed in loose, medium, and dense sand to an embedded depth ratio, L/d, vary from 7.5 to 30 and with various batter angles of 0°, 10°, 20°, and 30°. Results indicate that the pullout capacity of a batter pile constructed in dense and/or medium density sand increases with the increase of batter angle attains maximum value and then decreases, the maximum value of Pα occurs at batter angle approximately equal to 20°, and it is about 21-31% more than the vertical pile capacity, while the pullout capacity for batter pile that constructed in loose sand decreases with the increase of pile inclination. The results also indicated that the circular pile is more resistant to pullout forces than the square and rectangular pile shape. The rough model piles tested is experienced 18-75% increase in capacity compared with the smooth model piles. The suggested relations for the pullout capacity of batter pile regarding the vertical pile capacity are well predicted.

  6. Pullout capacity of batter pile in sand

    Directory of Open Access Journals (Sweden)

    Ashraf Nazir

    2013-03-01

    Full Text Available Many offshore structures are subjected to overturning moments due to wind load, wave pressure, and ship impacts. Also most of retaining walls are subjected to horizontal forces and bending moments, these forces are due to earth pressure. For foundations in such structures, usually a combination of vertical and batter piles is used. Little information is available in the literature about estimating the capacity of piles under uplift. In cases where these supporting piles are not vertical, the behavior under axial pullout is not well established. In order to delineate the significant variables affecting the ultimate uplift shaft resistance of batter pile in dry sand, a testing program comprising 62 pullout tests was conducted. The tests are conducted on model steel pile installed in loose, medium, and dense sand to an embedded depth ratio, L/d, vary from 7.5 to 30 and with various batter angles of 0°, 10°, 20°, and 30°. Results indicate that the pullout capacity of a batter pile constructed in dense and/or medium density sand increases with the increase of batter angle attains maximum value and then decreases, the maximum value of Pα occurs at batter angle approximately equal to 20°, and it is about 21–31% more than the vertical pile capacity, while the pullout capacity for batter pile that constructed in loose sand decreases with the increase of pile inclination. The results also indicated that the circular pile is more resistant to pullout forces than the square and rectangular pile shape. The rough model piles tested is experienced 18–75% increase in capacity compared with the smooth model piles. The suggested relations for the pullout capacity of batter pile regarding the vertical pile capacity are well predicted.

  7. IFKIS - ten years of experience with the intercantonal early warning and crisis information system as a good-practice example for local capacity building

    Science.gov (United States)

    Bründl, M.; Stoffel, L.

    2012-04-01

    As a consequence of the avalanche winter in January/February 1999 in Switzerland the project "intercantonal early warning and crisis information system" (IFKIS) was initialised. The goal of this project was to close the gaps recognised in the event analysis of this one-month avalanche period, which caused 17 fatalities and over 600 million CHF of damage [1,2]. Whereas the system of integral avalanche protection consisting of technical measures, land use planning and protection forests proved to be successful, the most important gaps were found to be in the organisational part. Especially communities who did not have an every-winter-experience had faced problems in managing the extraordinary event. The main deficiencies were less experienced or even missing local avalanche safety services and missing information and communication. The results of the IFKIS project embrace a concept for education courses, a concept for compulsory booklets and a guideline for the daily work in local avalanche safety services, and the information system IFKIS-InfoManager improving the two-way communication between the national avalanche warning service and the local services on the one side and enhancing the communication between local and regional avalanche services (IFKIS-MIS) on the other side [3]. The results of the project IFKIS are implemented in practice since 10 years. Since 2000 every winter two to three courses were conducted at two levels either in German, French and Italian. Since 2000 about thousand participants completed the courses. Feedback from participants and observations made by cantonal authorities and the national avalanche warning centre SLF revealed that these education courses greatly improved the local capacity for dealing with critical avalanche situations. The system of regular avalanches courses at the community level served meanwhile as a good-practice example for comparable courses initialised by the Federal Office for the Environment (FOEN) as a

  8. Improving Aboriginal maternal and infant health services in the 'Top End' of Australia; synthesis of the findings of a health services research program aimed at engaging stakeholders, developing research capacity and embedding change.

    Science.gov (United States)

    Barclay, Lesley; Kruske, Sue; Bar-Zeev, Sarah; Steenkamp, Malinda; Josif, Cathryn; Narjic, Concepta Wulili; Wardaguga, Molly; Belton, Suzanne; Gao, Yu; Dunbar, Terry; Kildea, Sue

    2014-06-02

    Health services research is a well-articulated research methodology and can be a powerful vehicle to implement sustainable health service reform. This paper presents a summary of a five-year collaborative program between stakeholders and researchers that led to sustainable improvements in the maternity services for remote-dwelling Aboriginal women and their infants in the Top End (TE) of Australia. A mixed-methods health services research program of work was designed, using a participatory approach. The study area consisted of two large remote Aboriginal communities in the Top End of Australia and the hospital in the regional centre (RC) that provided birth and tertiary care for these communities. The stakeholders included consumers, midwives, doctors, nurses, Aboriginal Health Workers (AHW), managers, policy makers and support staff. Data were sourced from: hospital and health centre records; perinatal data sets and costing data sets; observations of maternal and infant health service delivery and parenting styles; formal and informal interviews with providers and women and focus groups. Studies examined: indicator sets that identify best care, the impact of quality of care and remoteness on health outcomes, discrepancies in the birth counts in a range of different data sets and ethnographic studies of 'out of hospital' or health centre birth and parenting. A new model of maternity care was introduced by the health service aiming to improve care following the findings of our research. Some of these improvements introduced during the five-year research program of research were evaluated. Cost effective improvements were made to the acceptability, quality and outcomes of maternity care. However, our synthesis identified system-wide problems that still account for poor quality of infant services, specifically, unacceptable standards of infant care and parent support, no apparent relationship between volume and acuity of presentations and staff numbers with the

  9. Evaluation of guardrail embedded lighting system in Trinidad, Colorado.

    Science.gov (United States)

    2014-02-01

    This report provides information on the design considerations of the embedded highway lighting : design on Interstate-25 in Trinidad, Colorado, in terms of visibility. The information is based on : visibility characterizations of small targets using ...

  10. Effect of embedment on the plastic behaviour of Bucket Foundations

    DEFF Research Database (Denmark)

    Ibsen, Lars Bo; Barari, Amin; Larsen, Kim André

    2015-01-01

    studies have indicated the possibility of defining foundation response using plasticity theory. Results of multiple loading tests addressing the effect of embedment on the strain-hardening behavior of shallow bucket foundations under combined loading are reported. The kinematic mechanisms accompanying pre......-failure are presented. It is argued that the drained capacity of offshore bucket foundations and the ratio of plastic increments are largely influenced by embedment depth and the preload ratio V/Vpeak....

  11. INFORMATION TECHNOLOGY CAPACITIES AND THE BORN GLOBAL COMPANIES DOI: 10.5585/riae.v8i1.1629

    Directory of Open Access Journals (Sweden)

    María Soledad Etchebarne López

    2009-08-01

    Full Text Available International business transactions have increased in recent years, triggered by the opening up of markets and the development of information technologies and communications, especially in the cases of small and medium enterprises. In this context, a new type of company is emerging: the so-called 'born global' companies. These organizations have an international profile since their birth, and have not gone through the traditional evolutionary pattern of internationalization.  This article describes the theories that explain this new phenomenon, the main features of these new companies and their relationship with information technology (IT, which allows them to generate competitive advantages when entering the international market.

  12. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  13. Embedding in thermosetting resins

    International Nuclear Information System (INIS)

    Buzonniere, A. de

    1985-01-01

    Medium activity waste coming either from nuclear power plants in operation such as evaporator concentrates, spent resins, filter cartridges or the dismantling of installations are embedded in order to obtain a product suitable for long term disposal. Embedding in thermosetting resins (polyester or epoxy) is one among currently used techniques; it is being developed by the CEA (Commissariat a l'Energie Atomique) and Technicatome (subsidiary of CEA and EDF). The process is easy to operate and yields excellent results particularly as far as volume reduction and radioelement containment (cesium particularly) are concerned. The process has already been in operation in four stationary plants for several years. Extension of the process to mobile units has been completed by Technicatome in collaboration with the CEA [fr

  14. Post-upgrade testing on a radiotherapy oncology information system with an embedded record and verify system following the IAEA Human Health Report No. 7 recommendations.

    Science.gov (United States)

    Nyathi, Thulani; Colyer, Christopher; Bhardwaj, Anup Kumar; Rijken, James; Morton, Jason

    2016-06-01

    Record and verify (R&V) systems have proven that their application in radiotherapy clinics leads to a significant reduction in mis-treatments of patients. The purpose of this technical note is to share our experience of acceptance testing, commissioning and setting up a quality assurance programme for the MOSAIQ® oncology information system and R&V system after upgrading from software version 2.41 to 2.6 in a multi-vendor, multi-site environment. Testing was guided primarily by the IAEA Human Report No. 7 recommendations, but complemented by other departmental workflow specific tests. To the best of our knowledge, this is the first time successful implementation of the IAEA Human Health Report Series No. 7 recommendations have been reported in the literature. Copyright © 2016 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  15. Embedding Multiple Literacies into STEM Curricula

    Science.gov (United States)

    Soules, Aline; Nielsen, Sarah; LeDuc, Danika; Inouye, Caron; Singley, Jason; Wildy, Erica; Seitz, Jeff

    2014-01-01

    In fall 2012, an interdisciplinary team of science, English, and library faculty embedded reading, writing, and information literacy strategies in Science, Technology, Engineering, and Mathematics (STEM) curricula as a first step in improving student learning and retention in science courses and aligning them with the Next Generation Science and…

  16. Is Embedded Librarianship Right for Your Institution?

    Science.gov (United States)

    Muir, Gordon; Heller-Ross, Holly

    2010-01-01

    Embedded librarians, connected with students and faculty inside the classroom, lab and studio, have new opportunities for preparing students for research and for collaborating with faculty on course-integrated information literacy, research assignment design, teaching, assignment interpretation, and timely student assistance. What makes embedded…

  17. Public and private maternal health service capacity and patient flows in Southern Tanzania: using a geographic information system to link hospital and national census data.

    Science.gov (United States)

    Tabatabai, Patrik; Henke, Stefanie; Sušac, Katharina; Kisanga, Oberlin M E; Baumgarten, Inge; Kynast-Wolf, Gisela; Ramroth, Heribert; Marx, Michael

    2014-01-01

    Strategies to improve maternal health in low-income countries are increasingly embracing partnership approaches between public and private stakeholders in health. In Tanzania, such partnerships are a declared policy goal. However, implementation remains challenging as unfamiliarity between partners and insufficient recognition of private health providers prevail. This hinders cooperation and reflects the need to improve the evidence base of private sector contribution. To map and analyse the capacities of public and private hospitals to provide maternal health care in southern Tanzania and the population reached with these services. A hospital questionnaire was applied in all 16 hospitals (public n=10; private faith-based n=6) in 12 districts of southern Tanzania. Areas of inquiry included selected maternal health service indicators (human resources, maternity/delivery beds), provider-fees for obstetric services and patient turnover (antenatal care, births). Spatial information was linked to the 2002 Population Census dataset and a geographic information system to map patient flows and socio-geographic characteristics of service recipients. The contribution of faith-based organizations (FBOs) to hospital maternal health services is substantial. FBO hospitals are primarily located in rural areas and their patient composition places a higher emphasis on rural populations. Also, maternal health service capacity was more favourable in FBO hospitals. We approximated that 19.9% of deliveries in the study area were performed in hospitals and that the proportion of c-sections was 2.7%. Mapping of patient flows demonstrated that women often travelled far to seek hospital care and where catchment areas of public and FBO hospitals overlap. We conclude that the important contribution of FBOs to maternal health services and capacity as well as their emphasis on serving rural populations makes them promising partners in health programming. Inclusive partnerships could increase

  18. Co-emergence of multi-scale cortical activities of irregular firing, oscillations and avalanches achieves cost-efficient information capacity.

    Directory of Open Access Journals (Sweden)

    Dong-Ping Yang

    2017-02-01

    Full Text Available The brain is highly energy consuming, therefore is under strong selective pressure to achieve cost-efficiency in both cortical connectivities and activities. However, cost-efficiency as a design principle for cortical activities has been rarely studied. Especially it is not clear how cost-efficiency is related to ubiquitously observed multi-scale properties: irregular firing, oscillations and neuronal avalanches. Here we demonstrate that these prominent properties can be simultaneously observed in a generic, biologically plausible neural circuit model that captures excitation-inhibition balance and realistic dynamics of synaptic conductance. Their co-emergence achieves minimal energy cost as well as maximal energy efficiency on information capacity, when neuronal firing are coordinated and shaped by moderate synchrony to reduce otherwise redundant spikes, and the dynamical clusterings are maintained in the form of neuronal avalanches. Such cost-efficient neural dynamics can be employed as a foundation for further efficient information processing under energy constraint.

  19. Robust Multivariable Estimation of the Relevant Information Coming from a Wheel Speed Sensor and an Accelerometer Embedded in a Car under Performance Tests

    Directory of Open Access Journals (Sweden)

    Wilmar Hernandez

    2005-11-01

    Full Text Available In the present paper, in order to estimate the response of both a wheel speedsensor and an accelerometer placed in a car under performance tests, robust and optimalmultivariable estimation techniques are used. In this case, the disturbances and noisescorrupting the relevant information coming from the sensors’ outputs are so dangerous thattheir negative influence on the electrical systems impoverish the general performance of thecar. In short, the solution to this problem is a safety related problem that deserves our fullattention. Therefore, in order to diminish the negative effects of the disturbances and noiseson the car’s electrical and electromechanical systems, an optimum observer is used. Theexperimental results show a satisfactory improvement in the signal-to-noise ratio of therelevant signals and demonstrate the importance of the fusion of several intelligent sensordesign techniques when designing the intelligent sensors that today’s cars need.

  20. Embedded librarianship what every academic librarian should know

    CERN Document Server

    Russo, Michael F

    2013-01-01

    Is the embedded librarian an equal partner in the course, or is the librarian perceived as a "value-added" extra? What is the place of technology in this effort? Is there a line librarians should not cross? Taking into account both theory and practice to discuss multiple facets of the subject, Embedded Librarianship: What Every Academic Librarian Should Know thoroughly examines these questions and more from the perspectives of experienced embedded librarian contributors who have worked in higher education settings. The chapters illuminate the benefits and challenges of embedding, explain the planning required to set up an embedded course, identify the different forms of embedding, and consider information literacy instruction in various contexts. Readers who will benefit from this work include not only academic librarians but any professor who wants their students to be able to do better research in their fields.

  1. Introduction to embedded system design using field programmable gate arrays

    CERN Document Server

    Dubey, Rahul

    2009-01-01

    Offers information on the use of field programmable gate arrays (FPGAs) in the design of embedded systems. This text considers a hypothetical robot controller as an embedded application and weaves around it related concepts of FPGA-based digital design. It is suitable for both students and designers who have worked with microprocessors.

  2. Steganographic embedding in containers-images

    Science.gov (United States)

    Nikishova, A. V.; Omelchenko, T. A.; Makedonskij, S. A.

    2018-05-01

    Steganography is one of the approaches to ensuring the protection of information transmitted over the network. But a steganographic method should vary depending on a used container. According to statistics, the most widely used containers are images and the most common image format is JPEG. Authors propose a method of data embedding into a frequency area of images in format JPEG 2000. It is proposed to use the method of Benham-Memon- Yeo-Yeung, in which instead of discrete cosine transform, discrete wavelet transform is used. Two requirements for images are formulated. Structure similarity is chosen to obtain quality assessment of data embedding. Experiments confirm that requirements satisfaction allows achieving high quality assessment of data embedding.

  3. Embedded and real-time operating systems

    CERN Document Server

    Wang, K C

    2017-01-01

    This book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems. It includes all the foundational and background information on ARM architecture, ARM instructions and programming, toolchain for developing programs, virtual machines for software implementation and testing, program execution image, function call conventions, run-time stack usage and link C programs with assembly code. It describes the design and implementation of a complete OS for embedded systems in incremental steps, explaining the design principles and implementation techniques. For Symmetric Multiprocessing (SMP) embedded systems, the author examines the ARM MPcore processors, which include the SCU and GIC for interrupts routing and interprocessor communication and synchronization by Software Generated Interrupts (SGIs). Throughout the book, complete working sample systems demonstrate the design principles and...

  4. IDE Support of String-Embedded Languages

    Directory of Open Access Journals (Sweden)

    S. Grigorev

    2014-01-01

    Full Text Available Complex information systems are often implemented by using more than one programming language. Sometimes this variety takes a form of one host and one or few string-embedded languages. Textual representation of clauses in a string-embedded language is built at run time by a host program and then analyzed, compiled or interpreted by a dedicated runtime component (database, web browser etc. Most general-purpose programming languages may play the role of the host; one of the most evident examples of the string-embedded language is the dynamic SQL which was specified in ISO SQL standard and is supported by the majority of DBMS. Standard IDE functionality such as code completion or syntax highlighting can really helps the developers who use this technique. There are several tools providing this functionality, but they all process only one concrete string-embedded language and cannot be easily extended for supporting another language. We present a platform which allows to easily create tools for string-embedded language processing.

  5. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  6. Embedded Academic Librarianship: A Review of the Literature

    Directory of Open Access Journals (Sweden)

    Stephanie J. Schulte

    2012-12-01

    Full Text Available Objectives – The purpose of this review is to examine the development of embedded librarianship, its multiple meanings, and activities in practice. The review will also report on published outcomes and future research needs of embedded librarian programs.Methods – A search of current literature was conducted and summarized searching PubMed, CINAHL, Library, Information Science & Technology Abstracts (EBSCO, Academic Search Complete, and ERIC (EBSCO through August 23, 2012. Articles wereselected for inclusion in the review if they reported research findings related to embedded librarianship, if they provided unique case reports about embedded librarian programs, or if they provided substantive editorial comments on the topic. Relevant study findings were assessed for quality and presented in tabular and narrative form.Results – Currently, there is disparity in how embedded librarianship is being definedand used in common practice, ranging from embedding an online component into asingle course to full physical and cultural integration into an academic college orbusiness unit of an organization. Activities of embedded librarians include creatingcourse integrated instruction modules for either face-to-face or online courses, providingin depth research assistance to students or faculty, and co-locating within colleges orcustomer units via office hours for a few hours to all hours per week. Several case reports exist in the recent literature. Few high quality research studies reporting outcomes of librarians or library programs labeled as embedded exist at this point. Some evidence suggests that embedded librarians are effective with regards to student learning of information literacy objectives. Surveys suggest that both students and faculty appreciate embedded librarian services.Conclusion – Most published accounts discuss librarians embedding content and ready access to services in an online course management system. A few notable cases

  7. The development of entrepreneurial capacity and business activity of students of educational establishments using information and communication technologies

    Directory of Open Access Journals (Sweden)

    L. A. Danchenok

    2016-01-01

    Full Text Available The article is devoted to problems of organizational and methodical process modeling of the entrepreneurial potential and business activity of students of educational institutions through the use of Smart-technologies. It is noted that the successful implementation of enterprise and business projects are the basis of economic development of society, with the main factor for the development of entrepreneurship in the country in the long term is to develop the entrepreneurial mindset of young people. Entrepreneurial younger generation reserve created for the period of study, will provide the subsequent decades of business operation, incomenot only to the owner, but also the composition of personnel of the company and, in general, the country. The specifics of perception of the new generation of knowledge, learning and the formation of professional skills is that their effectiveness depends, sometimes completely determined by the degree of use of information and communication technologies, not only in the preparation and implementation of knowledge by the learners, but also in the work themselves teachers. Therefore, an effective and modern instrument for achieving the development goals of the business potential and business students to provide such forms of work with students, which would stimulate their interest in entrepreneurship through the active use of information technologies. The organizational and methodological training model and a set of measures aimed at developing the entrepreneurial potential and business activity of the young generation. To a large extent the elements of our model successfully implemented in REU them. GV Plekhanov at the Faculty of “Marketing Business School and Entrepreneurship”, to carry out training business technologies in relevant areas of knowledge for the information society and the modern state of the economy – business intelligence, innovation and creative business, crisis and risk management

  8. Embedded microcontroller interfacing

    CERN Document Server

    Gupta, Gourab Sen

    2010-01-01

    Mixed-Signal Embedded Microcontrollers are commonly used in integrating analog components needed to control non-digital electronic systems. They are used in automatically controlled devices and products, such as automobile engine control systems, wireless remote controllers, office machines, home appliances, power tools, and toys. Microcontrollers make it economical to digitally control even more devices and processes by reducing the size and cost, compared to a design that uses a separate microprocessor, memory, and input/output devices. In many undergraduate and post-graduate courses, teachi

  9. Embedded Multimaterial Extrusion Bioprinting.

    Science.gov (United States)

    Rocca, Marco; Fragasso, Alessio; Liu, Wanjun; Heinrich, Marcel A; Zhang, Yu Shrike

    2018-04-01

    Embedded extrusion bioprinting allows for the generation of complex structures that otherwise cannot be achieved with conventional layer-by-layer deposition from the bottom, by overcoming the limits imposed by gravitational force. By taking advantage of a hydrogel bath, serving as a sacrificial printing environment, it is feasible to extrude a bioink in freeform until the entire structure is deposited and crosslinked. The bioprinted structure can be subsequently released from the supporting hydrogel and used for further applications. Combining this advanced three-dimensional (3D) bioprinting technique with a multimaterial extrusion printhead setup enables the fabrication of complex volumetric structures built from multiple bioinks. The work described in this paper focuses on the optimization of the experimental setup and proposes a workflow to automate the bioprinting process, resulting in a fast and efficient conversion of a virtual 3D model into a physical, extruded structure in freeform using the multimaterial embedded bioprinting system. It is anticipated that further development of this technology will likely lead to widespread applications in areas such as tissue engineering, pharmaceutical testing, and organs-on-chips.

  10. Learning optimal embedded cascades.

    Science.gov (United States)

    Saberian, Mohammad Javad; Vasconcelos, Nuno

    2012-10-01

    The problem of automatic and optimal design of embedded object detector cascades is considered. Two main challenges are identified: optimization of the cascade configuration and optimization of individual cascade stages, so as to achieve the best tradeoff between classification accuracy and speed, under a detection rate constraint. Two novel boosting algorithms are proposed to address these problems. The first, RCBoost, formulates boosting as a constrained optimization problem which is solved with a barrier penalty method. The constraint is the target detection rate, which is met at all iterations of the boosting process. This enables the design of embedded cascades of known configuration without extensive cross validation or heuristics. The second, ECBoost, searches over cascade configurations to achieve the optimal tradeoff between classification risk and speed. The two algorithms are combined into an overall boosting procedure, RCECBoost, which optimizes both the cascade configuration and its stages under a detection rate constraint, in a fully automated manner. Extensive experiments in face, car, pedestrian, and panda detection show that the resulting detectors achieve an accuracy versus speed tradeoff superior to those of previous methods.

  11. Station Capacity

    DEFF Research Database (Denmark)

    Landex, Alex

    2011-01-01

    the probability of conflicts and the minimum headway times into account. The last method analyzes how optimal platform tracks are used by examining the arrival and departure pattern of the trains. The developed methods can either be used separately to analyze specific characteristics of the capacity of a station......Stations are often limiting the capacity of railway networks. This is due to extra need of tracks when trains stand still, trains turning around, and conflicting train routes. Although stations are often the capacity bottlenecks, most capacity analysis methods focus on open line capacity. Therefore...... for platform tracks and the probability that arriving trains will not get a platform track immediately at arrival. The third method is a scalable method that analyzes the conflicts in the switch zone(s). In its simplest stage, the method just analyzes the track layout while the more advanced stages also take...

  12. Informing the scale-up of Kenya’s nursing workforce: a mixed methods study of factors affecting pre-service training capacity and production

    Science.gov (United States)

    2014-01-01

    Background Given the global nursing shortage and investments to scale-up the workforce, this study evaluated trends in annual student nurse enrolment, pre-service attrition between enrolment and registration, and factors that influence nurse production in Kenya. Methods This study used a mixed methods approach with data from the Regulatory Human Resources Information System (tracks initial student enrolment through registration) and the Kenya Health Workforce Information System (tracks deployment and demographic information on licensed nurses) for the quantitative analyses and qualitative data from key informant interviews with nurse training institution educators and/or administrators. Trends in annual student nurse enrolment from 1999 to 2010 were analyzed using regulatory and demographic data. To assess pre-service attrition between training enrolment and registration with the nursing council, data for a cohort that enrolled in training from 1999 to 2004 and completed training by 2010 was analyzed. Multivariate logistic regression was used to test for factors that significantly affected attrition. To assess the capacity of nurse training institutions for scale-up, qualitative data was obtained through key informant interviews. Results From 1999 to 2010, 23,350 students enrolled in nurse training in Kenya. While annual new student enrolment doubled between 1999 (1,493) and 2010 (3,030), training institutions reported challenges in their capacity to accommodate the increased numbers. Key factors identified by the nursing faculty included congestion at clinical placement sites, limited clinical mentorship by qualified nurses, challenges with faculty recruitment and retention, and inadequate student housing, transportation and classroom space. Pre-service attrition among the cohort that enrolled between 1999 and 2004 and completed training by 2010 was found to be low (6%). Conclusion To scale-up the nursing workforce in Kenya, concurrent investments in expanding the

  13. The Innovative Capacity of Institutional Entrepreneurs

    OpenAIRE

    Boxenbaum, Eva; Battilana, Julie

    2006-01-01

    The notion of institutional entrepreneur (DiMaggio, 1988) has given rise to a controversy in neo-institutional theory around the ability of actors to distance themselves from institutional pressures, envision alternative institutional patterns, and act strategically to change institutions in which they are embedded. This paper empirically examines the ability of embedded actors to envision alternative institutional patterns, that is, their innovative capacity. We analyze the role that an indi...

  14. Poincaré Embeddings for Learning Hierarchical Representations

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Abstracts: Representation learning has become an invaluable approach for learning from symbolic data such as text and graphs. However, while complex symbolic datasets often exhibit a latent hierarchical structure, state-of-the-art methods typically do not account for this property. In this talk, I will discuss a new approach for learning hierarchical representations of symbolic data by embedding them into hyperbolic space -- or more precisely into an n-dimensional Poincaré ball. Due to the underlying hyperbolic geometry, this allows us to learn parsimonious representations of symbolic data by simultaneously capturing hierarchy and similarity. We introduce an efficient algorithm to learn the embeddings based on Riemannian optimization and show experimentally that Poincaré embeddings outperform Euclidean embeddings significantly on data with latent hierarchies, both in terms of representation capacity and in terms of generalization ability.      &...

  15. Spatially Embedded Inequality

    DEFF Research Database (Denmark)

    Holck, Lotte

    2016-01-01

    /methodology/approach: – The (re)production of inequality is explored by linking research on organizational space with HRM diversity management. Data from an ethnographic study undertaken in a Danish municipal center illustrates how a substructure of inequality is spatially upheld alongside a formal diversity policy. Archer...... and ethnification of job categories. However, the same spatial structures allows for a variety of opposition and conciliation strategies among minority employees, even though the latter tend to prevail in a reproduction rather than a transformation of the organizational opportunity structures. Research limitations...... the more subtle, spatially embedded forms of inequality. Originality/value: – Theoretical and empirical connections between research on organizational space and HRM diversity management have thus far not been systematically studied. This combination might advance knowledge on the persistence of micro...

  16. Embedded sensor systems

    CERN Document Server

    Agrawal, Dharma Prakash

    2017-01-01

    This inspiring textbook provides an introduction to wireless technologies for sensors, explores potential use of sensors for numerous applications, and utilizes probability theory and mathematical methods as a means of embedding sensors in system design. It discusses the need for synchronization and underlying limitations, inter-relation between given coverage and connectivity to number of sensors needed, and the use of geometrical distance to determine location of the base station for data collection and explore use of anchor nodes for relative position determination of sensors. The book explores energy conservation, communication using TCP, the need for clustering and data aggregation, and residual energy determination and energy harvesting. It covers key topics of sensor communication like mobile base stations and relay nodes, delay-tolerant sensor networks, and remote sensing and possible applications. The book defines routing methods and do performance evaluation for random and regular sensor topology an...

  17. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  18. Advances in embedded computer vision

    CERN Document Server

    Kisacanin, Branislav

    2014-01-01

    This illuminating collection offers a fresh look at the very latest advances in the field of embedded computer vision. Emerging areas covered by this comprehensive text/reference include the embedded realization of 3D vision technologies for a variety of applications, such as stereo cameras on mobile devices. Recent trends towards the development of small unmanned aerial vehicles (UAVs) with embedded image and video processing algorithms are also examined. The authoritative insights range from historical perspectives to future developments, reviewing embedded implementation, tools, technolog

  19. Embedded Systems Design with FPGAs

    CERN Document Server

    Pnevmatikatos, Dionisios; Sklavos, Nicolas

    2013-01-01

    This book presents methodologies for modern applications of embedded systems design, using field programmable gate array (FPGA) devices.  Coverage includes state-of-the-art research from academia and industry on a wide range of topics, including advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, dynamic reconfiguration and applications. Describes a variety of methodologies for modern embedded systems design;  Implements methodologies presented on FPGAs; Covers a wide variety of applications for reconfigurable embedded systems, including Bioinformatics, Communications and networking, Application acceleration, Medical solutions, Experiments for high energy physics, Astronomy, Aerospace, Biologically inspired systems and Computational fluid dynamics (CFD).

  20. Embedding Complementarity in HCI Methods

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    2007-01-01

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded in the tec......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...

  1. Intelligence for embedded systems a methodological approach

    CERN Document Server

    Alippi, Cesare

    2014-01-01

    Addressing current issues of which any engineer or computer scientist should be aware, this monograph is a response to the need to adopt a new computational paradigm as the methodological basis for designing pervasive embedded systems with sensor capabilities. The requirements of this paradigm are to control complexity, to limit cost and energy consumption, and to provide adaptation and cognition abilities allowing the embedded system to interact proactively with the real world. The quest for such intelligence requires the formalization of a new generation of intelligent systems able to exploit advances in digital architectures and in sensing technologies. The book sheds light on the theory behind intelligence for embedded systems with specific focus on: ·        robustness (the robustness of a computational flow and its evaluation); ·        intelligence (how to mimic the adaptation and cognition abilities of the human brain), ·        the capacity to learn in non-stationary and evolv...

  2. Embedding potentials for excited states of embedded species

    International Nuclear Information System (INIS)

    Wesolowski, Tomasz A.

    2014-01-01

    Frozen-Density-Embedding Theory (FDET) is a formalism to obtain the upper bound of the ground-state energy of the total system and the corresponding embedded wavefunction by means of Euler-Lagrange equations [T. A. Wesolowski, Phys. Rev. A 77(1), 012504 (2008)]. FDET provides the expression for the embedding potential as a functional of the electron density of the embedded species, electron density of the environment, and the field generated by other charges in the environment. Under certain conditions, FDET leads to the exact ground-state energy and density of the whole system. Following Perdew-Levy theorem on stationary states of the ground-state energy functional, the other-than-ground-state stationary states of the FDET energy functional correspond to excited states. In the present work, we analyze such use of other-than-ground-state embedded wavefunctions obtained in practical calculations, i.e., when the FDET embedding potential is approximated. Three computational approaches based on FDET, that assure self-consistent excitation energy and embedded wavefunction dealing with the issue of orthogonality of embedded wavefunctions for different states in a different manner, are proposed and discussed

  3. Embedded Librarians: Just-in-Time or Just-in-Case? A Research Study

    Science.gov (United States)

    Heathcock, Kristin

    2015-01-01

    Embedded librarians in online courses provide a wealth of service and information to students. Though students indicate that these services are valuable, the librarians providing embedded services frequently note that these projects are very time consuming. This study examines the provision of a less time-intensive model of embedded librarianship…

  4. Wide sense one-dependent processes with embedded Harris chains and their applications in inventory management

    NARCIS (Netherlands)

    E.M. Bazsa-Oldenkamp; P. den Iseger

    2003-01-01

    textabstractIn this paper we consider stochastic processes with an embedded Harris chain. The embedded Harris chain describes the dependence structure of the stochastic process. That is, all the relevant information of the past is contained in the state of the embedded Harris chain. For these

  5. Using information communication technologies to increase the institutional capacity of local health organisations in Africa: a case study of the Kenya Civil Society Portal for Health.

    Science.gov (United States)

    Juma, Charles; Sundsmo, Aaron; Maket, Boniface; Powell, Richard; Aluoch, Gilbert

    2015-01-01

    Achieving the healthcare components of the United Nations' Millennium Development Goals is significantly premised on effective service delivery by civil society organisations (CSOs). However, many CSOs across Africalack the necessary capacity to perform this role robustly. This paper reports on an evaluation of the use, and perceived impact, of aknowledge management tool upon institutional strengthening among CSOs working in Kenya's health sector. Three methods were used: analytics data; user satisfaction surveys; and a furtherkey informant survey. Satisfaction with the portal was consistently high, with 99% finding the quality and relevance of the content very good or good for institutional strengthening standards, governance, and planning and resource mobilisation. Critical facilitators to the success of knowledge management for CSO institutional strengthening were identified as people/culture (developed resources and organisational narratives) and technology (easily accessible, enabling information exchange, tools/resources available, access to consultants/partners). Critical barriers were identified as people/culture (database limitations, materials limitations, and lack of active users), and process (limited access, limited interactions, and limited approval process). This pilot study demonstrated the perceived utility of a web-based knowledge management portal among developing nations' CSOs, with widespread satisfaction across multiple domains, which increased over time. Providing increased opportunities for collective mutual learning, promoting a culture of data use for decision making, and encouraging all health organisations to be learning institutions should be a priority for those interested in promoting sustainable long-term solutions for Africa.

  6. Modeling of Embedded Human Systems

    Science.gov (United States)

    2013-07-01

    ISAT study [7] for DARPA in 20051 concretized the notion of an embedded human, who is a necessary component of the system. The proposed work integrates...Technology, IEEE Transactions on, vol. 16, no. 2, pp. 229–244, March 2008. [7] C. J. Tomlin and S. S. Sastry, “Embedded humans,” tech. rep., DARPA ISAT

  7. Embedded Ultrasonics for SHM of Space Applications

    Science.gov (United States)

    2012-07-30

    information on material properties and other forms of damage such as cracks, structural fatigue and/or impact events. This synergistic aspect of the embedded...larger the phase shift. However, high excitation levels could contribute to sensor fatigue and levels in a range 15 to 20 (110 to 130 volts) are...joints each featuring three bolts. Piezoelectric wafers ( PZT ) with UNF electrodes were bonded to the isogrid panels using 3M 2216 epoxy

  8. Building capacity for information and communication technology use in global health research and training in China: a qualitative study among Chinese health sciences faculty members.

    Science.gov (United States)

    Wang, Jie; Abdullah, Abu S; Ma, Zhenyu; Fu, Hua; Huang, Kaiyong; Yu, Hongping; Wang, Jiaji; Cai, Le; He, Huimin; Xiao, Jian; Quintiliani, Lisa; Friedman, Robert H; Yang, Li

    2017-06-28

    The demand to use information and communications technology (ICT) in education and research has grown fast among researchers and educators working in global health. However, access to ICT resources and the capacity to use them in global health research remains limited among developing country faculty members. In order to address the global health needs and to design an ICT-related training course, we herein explored the Chinese health science faculty members' perceptions and learning needs for ICT use. Nine focus groups discussions (FGDs) were conducted during December 2015 to March 2016, involving 63 faculty members working in areas of health sciences from six universities in China. All FGDs were audio recorded and analysed thematically. The findings suggest that the understandings of ICT were not clear among many researchers; some thought that the concept of ICT was too wide and ambiguous. Most participants were able to cite examples of ICT application in their research and teaching activities. Positive attitudes and high needs of ICT use and training were common among most participants. Recommendations for ICT training included customised training programmes focusing on a specific specialty, maintaining a balance between theories and practical applications, more emphasis on the application of ICT, and skills in finding the required information from the bulk information available in the internet. Suggestions regarding the format and offering of training included short training programmes, flexible timing, lectures with practicum opportunities, and free of charge or with very minimal cost to the participants. Two participants suggested the linking of ICT-related training courses with faculty members' year-end assessment and promotion. This study among health sciences faculty members in China demonstrated a high level of need and interest in learning about ICT use in research and training. The results have important implications for the design and implementation of

  9. Carrying Capacity

    DEFF Research Database (Denmark)

    Schroll, Henning; Andersen, Jan; Kjærgård, Bente

    2012-01-01

    A spatial planning act was introduced inIndonesia 1992 and renewed in 2008. It emphasised the planning role of decentralised authorities. The spatial planning act covers both spatial and environmental issues. It defines the concept of carrying capacity and includes definitions of supportive....../cities. Four different sectors (water, food production, waste, and forests) were selected as core areas for decentralised spatial planning. Indicators for SCC and ACC were identified and assessed with regard to relevance and quantifiability. For each of the indicators selected, a legal threshold or guiding...... was introduced inIndonesia 1992 and renewed in 2008. It emphasised the planning role of decentralised authorities. The spatial planning act covers both spatial and environmental issues. It defines the concept of carrying capacity and includes definitions of supportive carrying capacity (SCC) and assimilative...

  10. OLP embedment design method research for AP1000 nuclear plant

    International Nuclear Information System (INIS)

    Li Cheng; Li Shaoping; Liu Jianwei

    2013-01-01

    Background: One of the most advanced nuclear power technology, the first AP1000 reactor is under construction in China. Modularization is one of the main characteristics for AP1000 nuclear plant building. Module wall with steel face plate is used instead of reinforced concrete structure wall. A number of OLP embedments need to be installed into the module wall to connect other structures such as pipes, equipment, operation platforms and any other component attached to the module wall. Therefore, the design of embedment is very important in AP1000 structural design. Purpose: A finite element analysis method and tool for embedment design is needed for convenience. Methods: This paper applies the self-developed GTStrudl command template and VBA macro program for embedment capacity calculation and evaluation based on Microsoft Excel to the embedment design. Results: A Microsoft Excel template for embedment design is developed. Conclusions: The analysis method and template brings reasonable results and may provide some help and use for reference for the engineering practice. (authors)

  11. Evaluation of depth of field in SEM images in terms of the information-passing capacity (IPC) and contrast gradient in SEM image

    International Nuclear Information System (INIS)

    Sato, Mitsugu; Ishitani, Tohru; Watanabe, Shunya; Nakagawa, Mine

    2004-01-01

    The depth of field (DoF) in scanning electron microscope (SEM) images has been determined by estimating the change of image sharpness or resolution near the exact focus position. The image sharpness or resolution along the optical axis is determined by calculating the information-passing capacity (IPC) of an optical system taking into account the effect of pixel size of the image. The change of image sharpness near the exact focus position is determined by measuring the slope gradient of the line profile in SEM images obtained at various focal positions of beam. The change of image sharpness along the optical axis determined by the IPC agrees well with those determined by the slope gradient of line profiles in SEM images when a Gaussian distribution having radius 0.86L p (L p : pixel size in image) at which the intensity has fallen to 1/e of the maximum is applied to the IPC calculation for each pixel intensity. The change of image sharpness near the exact focus position has also been compared with those determined by the CG (Contrast-to-Gradient) method. The CG method slightly underestimates the change of image sharpness compared with those determined by the IPC method

  12. Wavelet techniques for reversible data embedding into images

    NARCIS (Netherlands)

    L. Kamstra; H.J.A.M. Heijmans (Henk)

    2004-01-01

    textabstractThe proliferation of digital information in our society has enticed a lot of research into data embedding techniques that add information to digital content like images, audio and video. This additional information can be used for various purposes and different applications place

  13. Phylogenetic trees and Euclidean embeddings.

    Science.gov (United States)

    Layer, Mark; Rhodes, John A

    2017-01-01

    It was recently observed by de Vienne et al. (Syst Biol 60(6):826-832, 2011) that a simple square root transformation of distances between taxa on a phylogenetic tree allowed for an embedding of the taxa into Euclidean space. While the justification for this was based on a diffusion model of continuous character evolution along the tree, here we give a direct and elementary explanation for it that provides substantial additional insight. We use this embedding to reinterpret the differences between the NJ and BIONJ tree building algorithms, providing one illustration of how this embedding reflects tree structures in data.

  14. Tensor Train Neighborhood Preserving Embedding

    Science.gov (United States)

    Wang, Wenqi; Aggarwal, Vaneet; Aeron, Shuchin

    2018-05-01

    In this paper, we propose a Tensor Train Neighborhood Preserving Embedding (TTNPE) to embed multi-dimensional tensor data into low dimensional tensor subspace. Novel approaches to solve the optimization problem in TTNPE are proposed. For this embedding, we evaluate novel trade-off gain among classification, computation, and dimensionality reduction (storage) for supervised learning. It is shown that compared to the state-of-the-arts tensor embedding methods, TTNPE achieves superior trade-off in classification, computation, and dimensionality reduction in MNIST handwritten digits and Weizmann face datasets.

  15. Unsteady Flame Embedding

    KAUST Repository

    El-Asrag, Hossam A.; Ghoniem, Ahmed F.

    2011-01-01

    simulation, one must introduce a dynamic subgrid model that accounts for the multiscale nature of the problem using information available on a resolvable grid. Here, we discuss a model that captures unsteady flow-flame interactions- including extinction, re

  16. Exerting Capacity.

    Science.gov (United States)

    Leger, J Michael; Phillips, Carolyn A

    2017-05-01

    Patient safety has been at the forefront of nursing research since the release of the Institute of Medicine's report estimating the number of preventable adverse events in hospital settings; yet no research to date has incorporated the perspectives of bedside nurses using classical grounded theory (CGT) methodology. This CGT study explored the perceptions of bedside registered nurses regarding patient safety in adult acute care hospitals. Data analysis used three techniques unique to CGT-the constant comparative method, coding, and memoing-to explore the values, realities, and beliefs of bedside nurses about patient safety. The analysis resulted in a substantive theory, Exerting Capacity, which explained how bedside nurses balance the demands of keeping their patients safe. Exerting Capacity has implications for health care organization leaders, nursing leaders, and bedside nurses; it also has indications for future research into the concept of patient safety.

  17. Parametric embedding for class visualization.

    Science.gov (United States)

    Iwata, Tomoharu; Saito, Kazumi; Ueda, Naonori; Stromsten, Sean; Griffiths, Thomas L; Tenenbaum, Joshua B

    2007-09-01

    We propose a new method, parametric embedding (PE), that embeds objects with the class structure into a low-dimensional visualization space. PE takes as input a set of class conditional probabilities for given data points and tries to preserve the structure in an embedding space by minimizing a sum of Kullback-Leibler divergences, under the assumption that samples are generated by a gaussian mixture with equal covariances in the embedding space. PE has many potential uses depending on the source of the input data, providing insight into the classifier's behavior in supervised, semisupervised, and unsupervised settings. The PE algorithm has a computational advantage over conventional embedding methods based on pairwise object relations since its complexity scales with the product of the number of objects and the number of classes. We demonstrate PE by visualizing supervised categorization of Web pages, semisupervised categorization of digits, and the relations of words and latent topics found by an unsupervised algorithm, latent Dirichlet allocation.

  18. Embedded System for Biometric Identification

    OpenAIRE

    Rosli, Ahmad Nasir Che

    2010-01-01

    This chapter describes the design and implementation of an Embedded System for Biometric Identification from hardware and software perspectives. The first part of the chapter describes the idea of biometric identification. This includes the definition of

  19. Hardware Support for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2012-01-01

    The general Java runtime environment is resource hungry and unfriendly for real-time systems. To reduce the resource consumption of Java in embedded systems, direct hardware support of the language is a valuable option. Furthermore, an implementation of the Java virtual machine in hardware enables...... worst-case execution time analysis of Java programs. This chapter gives an overview of current approaches to hardware support for embedded and real-time Java....

  20. Molecular Properties through Polarizable Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2011-01-01

    We review the theory related to the calculation of electric and magnetic molecular properties through polarizable embedding. In particular, we derive the expressions for the response functions up to the level of cubic response within the density functional theory-based polarizable embedding (PE......-DFT) formalism. In addition, we discuss some illustrative applications related to the calculation of nuclear magnetic resonance parameters, nonlinear optical properties, and electronic excited states in solution....

  1. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...... be answered affirmatively for an idealized Haskell-like language and discuss to which extent Haskell can be used as a meta-language....

  2. Unsupervised Document Embedding With CNNs

    OpenAIRE

    Liu, Chundi; Zhao, Shunan; Volkovs, Maksims

    2017-01-01

    We propose a new model for unsupervised document embedding. Leading existing approaches either require complex inference or use recurrent neural networks (RNN) that are difficult to parallelize. We take a different route and develop a convolutional neural network (CNN) embedding model. Our CNN architecture is fully parallelizable resulting in over 10x speedup in inference time over RNN models. Parallelizable architecture enables to train deeper models where each successive layer has increasin...

  3. Bandwidth Extension of Telephone Speech Aided by Data Embedding

    Directory of Open Access Journals (Sweden)

    Sagi Ariel

    2007-01-01

    Full Text Available A system for bandwidth extension of telephone speech, aided by data embedding, is presented. The proposed system uses the transmitted analog narrowband speech signal as a carrier of the side information needed to carry out the bandwidth extension. The upper band of the wideband speech is reconstructed at the receiving end from two components: a synthetic wideband excitation signal, generated from the narrowband telephone speech and a wideband spectral envelope, parametrically represented and transmitted as embedded data in the telephone speech. We propose a novel data embedding scheme, in which the scalar Costa scheme is combined with an auditory masking model allowing high rate transparent embedding, while maintaining a low bit error rate. The signal is transformed to the frequency domain via the discrete Hartley transform (DHT and is partitioned into subbands. Data is embedded in an adaptively chosen subset of subbands by modifying the DHT coefficients. In our simulations, high quality wideband speech was obtained from speech transmitted over a telephone line (characterized by spectral magnitude distortion, dispersion, and noise, in which side information data is transparently embedded at the rate of 600 information bits/second and with a bit error rate of approximately . In a listening test, the reconstructed wideband speech was preferred (at different degrees over conventional telephone speech in of the test utterances.

  4. Bandwidth Extension of Telephone Speech Aided by Data Embedding

    Directory of Open Access Journals (Sweden)

    David Malah

    2007-01-01

    Full Text Available A system for bandwidth extension of telephone speech, aided by data embedding, is presented. The proposed system uses the transmitted analog narrowband speech signal as a carrier of the side information needed to carry out the bandwidth extension. The upper band of the wideband speech is reconstructed at the receiving end from two components: a synthetic wideband excitation signal, generated from the narrowband telephone speech and a wideband spectral envelope, parametrically represented and transmitted as embedded data in the telephone speech. We propose a novel data embedding scheme, in which the scalar Costa scheme is combined with an auditory masking model allowing high rate transparent embedding, while maintaining a low bit error rate. The signal is transformed to the frequency domain via the discrete Hartley transform (DHT and is partitioned into subbands. Data is embedded in an adaptively chosen subset of subbands by modifying the DHT coefficients. In our simulations, high quality wideband speech was obtained from speech transmitted over a telephone line (characterized by spectral magnitude distortion, dispersion, and noise, in which side information data is transparently embedded at the rate of 600 information bits/second and with a bit error rate of approximately 3⋅10−4. In a listening test, the reconstructed wideband speech was preferred (at different degrees over conventional telephone speech in 92.5% of the test utterances.

  5. Capacity and willingness of patients with chronic noncommunicable diseases to use information technology to help manage their condition: a cross-sectional study.

    Science.gov (United States)

    Afshar, Arash Ehteshami; Weaver, Robert G; Lin, Meng; Allan, Michael; Ronksley, Paul E; Sanmartin, Claudia; Lewanczuk, Richard; Rosenberg, Mark; Manns, Braden; Hemmelgarn, Brenda; Tonelli, Marcello

    2014-04-01

    Health care providers have shown considerable interest in using information technologies such as email, text messages and video conferencing to facilitate the management of chronic noncommunicable diseases such as hypertension, diabetes mellitus and vascular disease. We sought to determine whether these technologies are available and appealing to the target population. We analyzed cross-sectional data from a computer-assisted telephone survey, conducted by Statistics Canada in February and March 2012, of western Canadian adults with at least 1 chronic condition. Survey respondents were asked about their capacity (e.g., "Do you own a mobile phone?") and willingness to use each of 3 information technologies (email, text messages and video conferencing) to interact with health care providers. For all analyses, Statistics Canada's calibrated design weights and bootstrap weights were used to obtain population-level point estimates for proportions and odds ratios. In total, 1849 (79.8%) of 2316 eligible people participated. Of the 1849 participants, 81.9% had hypertension, 26.2% had diabetes, 21.4% had heart disease, and 7.9% had stroke; 32.2% had more than 1 of the 4 chronic conditions of interest. High proportions of respondents owned a computer with Internet access (76.4%, 95% confidence interval [CI] 73.3%-79.3%) or a mobile phone (73.9%, 95% CI 70.7%-76.8%). About two-thirds of respondents were interested in using email to interact with a specialist (66.3%, 95% CI 63.0%-69.5%); respondents were less enthusiastic about using text messages (44.9%, 95% CI 41.2%-48.7%). Enthusiasm for video conferencing was more pronounced among those residing further from medical specialists than among those living closer. Among respondents who were potentially interested in video conferencing, almost 50% of remote dwellers would use this technology if it saved more than 60 minutes of travel time. Many people were interested in using electronic technologies, especially video

  6. Capacity Building

    International Nuclear Information System (INIS)

    Molloy, Brian; Mallick, Shahid

    2014-01-01

    Outcomes & Recommendations: • Significant increase needed in the nuclear workforce both to replace soon-to-retire current generation and to staff large numbers of new units planned • Key message, was the importance of an integrated approach to workforce development. • IAEA and other International Organisations were asked to continue to work on Knowledge Management, Networks and E&T activities • IAEA requested to conduct Global Survey of HR needs – survey initiated but only 50% of operating countries (30% of capacity) took part, so results inconclusive

  7. Algorithmic complexity of quantum capacity

    Science.gov (United States)

    Oskouei, Samad Khabbazi; Mancini, Stefano

    2018-04-01

    We analyze the notion of quantum capacity from the perspective of algorithmic (descriptive) complexity. To this end, we resort to the concept of semi-computability in order to describe quantum states and quantum channel maps. We introduce algorithmic entropies (like algorithmic quantum coherent information) and derive relevant properties for them. Then we show that quantum capacity based on semi-computable concept equals the entropy rate of algorithmic coherent information, which in turn equals the standard quantum capacity. Thanks to this, we finally prove that the quantum capacity, for a given semi-computable channel, is limit computable.

  8. Secure Embedded Systems

    Science.gov (United States)

    2016-02-26

    enables each subsystem with a key management (KM) function and an Advanced Encryption Standard ( AES ) encryption and decryption function. Subsystem A...off, flies to its destination, and then collects video data. Video data containing target information are encrypted and broadcast to authorized ground...select these devices on the basis of their ability to encrypt and authenticate configuration bitstreams, incorporate security monitors to detect attacks

  9. Competence building capacity shortage

    International Nuclear Information System (INIS)

    Doorman, Gerard; Wangensteen, Ivar; Bakken, Bjoern

    2005-02-01

    1990 and if the availability of Danish import and hydropower is normal. Finally, an analysis was done of Capacity Subscription, a model where consumers pay for the capacity they use during system peak load. It was shown how this model can be embedded in the Nordic market solution. However, given the present situation which is not seen as critical, a prospective introduction of this model would lie some years into the future. Further research with respect to technological solutions and market communication should be undertaken to learn more about these central issues for this model. (author)

  10. Embedded Linux projects using Yocto project cookbook

    CERN Document Server

    González, Alex

    2015-01-01

    If you are an embedded developer learning about embedded Linux with some experience with the Yocto project, this book is the ideal way to become proficient and broaden your knowledge with examples that are immediately applicable to your embedded developments. Experienced embedded Yocto developers will find new insight into working methodologies and ARM specific development competence.

  11. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  12. Do aging and dual-tasking impair the capacity to store and retrieve visuospatial information needed to guide perturbation-evoked reach-to-grasp reactions?

    Directory of Open Access Journals (Sweden)

    Kenneth C Cheng

    Full Text Available A recent study involving young adults showed that rapid perturbation-evoked reach-to-grasp balance-recovery reactions can be guided successfully with visuospatial-information (VSI retained in memory despite: 1 a reduction in endpoint accuracy due to recall-delay (time between visual occlusion and perturbation-onset, PO and 2 slowing of the reaction when performing a concurrent cognitive task during the recall-delay interval. The present study aimed to determine whether this capacity is compromised by effects of aging. Ten healthy older adults were tested with the previous protocol and compared with the previously-tested young adults. Reactions to recover balance by grasping a small handhold were evoked by unpredictable antero-posterior platform-translation (barriers deterred stepping reactions, while using liquid-crystal goggles to occlude vision post-PO and for varying recall-delay times (0-10 s prior to PO (the handhold was moved unpredictably to one of four locations 2 s prior to vision-occlusion. Subjects also performed a spatial- or non-spatial-memory cognitive task during the delay-time in a subset of trials. Results showed that older adults had slower reactions than the young across all experimental conditions. Both age groups showed similar reduction in medio-lateral end-point accuracy when recall-delay was longest (10 s, but differed in the effect of recall delay on vertical hand elevation. For both age groups, engaging in either the non-spatial or spatial-memory task had similar (slowing effects on the arm reactions; however, the older adults also showed a dual-task interference effect (poorer cognitive-task performance that was specific to the spatial-memory task. This provides new evidence that spatial working memory plays a role in the control of perturbation-evoked balance-recovery reactions. The delays in completing the reaction that occurred when performing either cognitive task suggest that such dual-task situations in daily

  13. Design Methodologies for Secure Embedded Systems

    CERN Document Server

    Biedermann, Alexander

    2011-01-01

    Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? And how can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration o

  14. Embedded digital oilfield model

    Science.gov (United States)

    Korovin, Iakov S.; Boldyreff, Anton S.

    2017-10-01

    In modern hard conditions for the whole worldwide oil production industry the problem of increasing volumes of produced oil has recently become vital. This problem concerns the existing oilfields cause due to low crude oil prices the possibilities to drill new ones has almost disappeared. In this paper, we describe a novel approach of oil production enhancement, based on online procedures of all oil field data processing. The essence is that we have developed a dynamic oilfield model that allows to simultaneously handle the information, stored in tNavigator, Schlumberger ECLIPSE 100/300 and other `popular' formats in parallel. The model is developed on the basis of convolutional neural networks. An example of successful industrial experiment is depicted.

  15. Embedding Climate Services

    Science.gov (United States)

    Shafer, M.; Boone, M.; Keim, B. D.

    2015-12-01

    With the rapidly-increasing number of climate services providers, the landscape for putting climate into practice is getting both easier to access and more confusing. Each provider serves a different clientele, and in so doing draws more stakeholder organizations into the sphere of those using climate information in decision-making. The challenge has been in connecting these new stakeholders with expertise that may reside within a different provider organization. To help close the gap, the Southern Climate Impacts Planning Program (SCIPP; http://www.southernclimate.org), a NOAA RISA Team, initiated a summer internship program, where students with expertise in meteorology or climatology would work for an organization more closely aligned with another climate services provider network. The format was patterned after the successful NSF-funded Research Experience for Undergraduates (REU) program at the National Weather Center, where students are selected from undergraduate programs across the nation to spend a summer conducting research under a scientific mentor. The SCIPP initiative flipped this model, instead sending students to organizations with operational needs for climate information to work under their mentorship in partnership with SCIPP scientists. Over the past two summers, SCIPP has recruited students to work at landscape-based (Gulf Coast Joint Venture and National Wetlands Research Center) and community-based (Tulsa Partners) organizations. Students worked alongside the organizations' staff on a daily basis and were supported through periodic calls with the SCIPP team to help identify appropriate datasets and work through methodological issues. This presentation will discuss how these relationships were created, the expertise of each of the organizations involved, and outcomes from the projects.

  16. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, Rene Rydhof

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety......-critical applications, a predictable Java processor built with FPGA technology, and an Eclipse based application development environment that binds the profile and the platform together and provides analyses that help to provide evidence that can be used as part of a safety case. This paper summarizes key contributions...

  17. Morphware - Fremtidens Embedded System Platform

    DEFF Research Database (Denmark)

    Madsen, Jan

    2006-01-01

    FPGA'er bliver i stigende grad brugt som komponenter i embedded systemer. Faldende priser, større kapacitet og en større felksibilitet har gjort FPGA'en til en attraktiv og konkurrencedygtig teknologi der tillader en stadig stigende grad af system integration, hvor traditionel hardware og software...... kombineres og rekonfigureres. Muligheden for at rekonfigurere systemet, og specielt rekonfigurerer det medens det kører, giver nogle helt nye muligheder for at designe og programmere embedded systemer. Dette foredrag vil give et indblik i disse nye og fremtidige muligheder....

  18. Implementation of an embedded computer

    OpenAIRE

    Pikl, Bojan

    2011-01-01

    The goal of this thesis is to describe a production of an embedded computer. The thesis describes development and production of an embedded computer for the medical diode laser DL30 that is being developed in Robomed d.o.o.. The first part of the thesis describes the choice of hardware devices. I mostly describe the technologies that one can buy on the market. Moreover for every part of the computer installed and developed there is an argument why we selected that exact part. The second part ...

  19. Homogeneous Spaces and Equivariant Embeddings

    CERN Document Server

    Timashev, DA

    2011-01-01

    Homogeneous spaces of linear algebraic groups lie at the crossroads of algebraic geometry, theory of algebraic groups, classical projective and enumerative geometry, harmonic analysis, and representation theory. By standard reasons of algebraic geometry, in order to solve various problems on a homogeneous space it is natural and helpful to compactify it keeping track of the group action, i.e. to consider equivariant completions or, more generally, open embeddings of a given homogeneous space. Such equivariant embeddings are the subject of this book. We focus on classification of equivariant em

  20. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply......-typed terms can be represented in Haskell using phantom types? And conversely, can all simply-typed terms be represented in Haskell under the restrictions imposed by phantom types? In this article we investigate the conditions under which these assumptions are true: We show that these questions can...

  1. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2002-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply......-typed terms can be represented in Haskell using phantom types? And conversely, can all simply-typed terms be represented in Haskell under the restrictions imposed by phantom types? In this article we investigate the conditions under which these assumptions are true: We show that these questions can...

  2. Probabilistic evaluation method for axial capacity of single pile based on pile test information. Saika shiken kekka wo koryoshita kuienchoku shijiryoku no kakuritsuronteki hyokaho

    Energy Technology Data Exchange (ETDEWEB)

    Ishii, K.; Suzuki, M. (Shimizu Construction Co. Ltd., Tokyo (Japan)); Nakatani, S. (Ministry of Construction Tokyo (Japan)); Matsui, K. (CTI Engineering Co. Ltd., Tokyo (Japan))

    1991-12-20

    To consider the safety and economics in the design of pile, the reasonable evaluation on estimated accuracy from the accuracy of equation of pile capacity and probabilistic evaluation method is necessary. Therefore, the data analysis based on the collection and summary of the results from load tests of piles is one of powerful approach. In this study, selection of the parameters that cannot obtained from probabilistic model and load test and combination between statistical and experimental data by using Baysian probabilistic theory was examined. As the feature of this study, use of the design pile capacity equation based on the model of evaluation of pile capacity, consideration of the intrinsic difference between statistical data and results of load tests by using Baysian probabilistic theory and quantitative examination of applicability of the proposed method and the results of load tests are given. 24 refs., 5 figs., 7 tabs.

  3. Research on embedded automobile collision avoidance system

    Directory of Open Access Journals (Sweden)

    TAO Feng

    2016-08-01

    Full Text Available Taking ARM embedded Linux operating system as the development platform,combined with AVR microcontroller,while optimizing the ranging algorithm and using air ultrasonic transducer,the measurement range of which can be up to 50 meter,this paper designs a high-precision,range far,low price,various models suitable automobile collision avoidance warning system.The system adopts Forlinx OK6410 development board for the master.AVR microcontroller is responsible for taking the data of traveling distance between vehicles,and with the ARM development board via RS232 communication transfers vehicle′s distance and speed information to the ARM development boards.The system uses the established collision avoidance model to get alarm information.Experiments show that the system can accurately send out alarm information within a certain range.It is innovative and practical.

  4. Embedding Sensors During Additive Manufacturing

    Energy Technology Data Exchange (ETDEWEB)

    Sbriglia, Lexey Raylene [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-08-10

    This PowerPoint presentation had the following headings: Fused deposition modeling (FDM); Open source 3D printing; Objectives; Vibration analysis; Equipment; Design; Material choices; Failure causes, such as tension, bubbling; Potential solutions; Simulations; Embedding the sensors; LabView programming; Alternate data acquisition; Problem and proposed solution; and, Conclusions

  5. Embedded EZ-Source Inverters

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Loh, Poh Chiang; Gao, F.

    2008-01-01

    -voltage oscillations to the system. Therefore, Z-source inverters are in effect safer and less complex, and can be implemented using only passive elements with no additional active semiconductor needed. Believing in the prospects of Z-source inverters, this paper contributes by introducing a new family of embedded EZ...

  6. Software for Embedded Control Systems

    NARCIS (Netherlands)

    Broenink, Johannes F.; Hilderink, G.H.; Jovanovic, D.S.

    2001-01-01

    The research of our team deals with the realization of control schemes on digital computers. As such the emphasis is on embedded control software implementation. Applications are in the field of mechatronic devices, using a mechatronic design approach (the integrated and optimal design of a

  7. NOISE SECURES SECRET DATA! BY ACT AS A REFERENCE FOR EMBEDDING

    Directory of Open Access Journals (Sweden)

    J. Jayaseelan

    2014-03-01

    Full Text Available Data Security is that the most crucial think about a communication network. Data security is achieved by cryptography and data concealing. Steganography is one of the info concealing technique; here any form of signal is concealing by exploitation a picture, audio or video. In an exceedingly spatial domain steganography, most typically the info is embedded into a LSB’s of the cover image pixels. As a result of it maintain the standard of the stego image as like as cover image instead of embedded into MSB’s. To embedding into a LSB’s of cover image (R, G, B plane researchers are using different types of pixel indicating methods, random embedding, edge based embedding in spatial domain or applying completely different reworks in transform domain. In this paper, for spatial domain steganography noise based embedding technique is proposed; it is entirely different from the out there techniques. In this paper two copies of JPEG, PNG, GIF, or BMP etc., images are used. One is taken as a reference image and noise is added onto that. Supported this reference image knowledge is embedded into the LSB’s of cover image. Proposed system using salt and pepper noise for data embedding, it is an ON, OFF noise. Based on added salt, pepper, and no noise portions of reference image completely different range of bits are embedded into the cover image. The result is analyzed by using MSE, PSNR and capacity performance metrics.

  8. Embedded, everywhere: a research agenda for networked systems of embedded computers

    National Research Council Canada - National Science Library

    Committee on Networked Systems of Embedded Computers; National Research Council Staff; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; National Academy of Sciences

    2001-01-01

    .... Embedded, Everywhere explores the potential of networked systems of embedded computers and the research challenges arising from embedding computation and communications technology into a wide variety of applicationsâ...

  9. Embedded Systems for Smart Appliances and Energy Management

    CERN Document Server

    Neumann, Peter; Mahlknecht, Stefan

    2013-01-01

    This book provides a comprehensive introduction to embedded systems for smart appliances and energy management, bringing together for the first time a multidisciplinary blend of topics from embedded systems, information technology and power engineering.  Coverage includes challenges for future resource distribution grids, energy management in smart appliances, micro energy generation, demand response management, ultra-low power stand by, smart standby and communication networks in home and building automation.   Provides a comprehensive, multidisciplinary introduction to embedded systems for smart appliances and energy management; Equips researchers and engineers with information required to succeed in designing energy management for smart appliances; Includes coverage of resource distribution grids, energy management in smart appliances, micro energy generation, demand response management, ultra-low power stand by, smart standby and communication networks in home and building automation.  

  10. Mentoring approach improves evaluation capacity of ICTD ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-06-09

    Jun 9, 2016 ... ... initiative is improving evaluation capacities of researchers studying Information and ... Capacity in ICTD (DECI) provides researchers from five IDRC-funded projects in ... Using technology to deliver quality education in Asia.

  11. Embedding Data Stewardship in Geoscience Australia

    Science.gov (United States)

    Bastrakova, I.; Fyfe, S.

    2013-12-01

    Ten years of technological innovation now enable vast amounts of data to be collected, managed, processed and shared. At the same time, organisations have witnessed government legislative and policy requirements for open access to public sector data, and a demand for flexibility in access to data by both machine-to-machine and human consumption. Geoscience Australia (GA) has adopted Data Stewardship as an organisation-wide initiative to improve the way we manage and share our data. The benefits to GA including: - Consolidated understanding of GA's data assets and their value to the Agency; - Recognition of the significant role of data custodianship and data management; - Well-defined governance, policies, standards, practices and accountabilities that promote the accessibility, quality and interoperability of GA's data; - Integration of disparate data sets into cohesive information products available online in real time and equally accessible to researchers, government, industry and the public. Although the theory behind data stewardship is well-defined and accepted and the benefits are generally well-understood, practical implementation requires an organisation to prepare for a long-term commitment of resources, both financial and human. Fundamentally this involves: 1. Raising awareness in the organisation of the need for data stewardship and the challenges this entails; 2. Establishing a data stewardship framework including a data governance office to set policy and drive organisational change; and 3. Embedding the functions and a culture of data stewardship into business as usual operations. GA holds a vast amount of data ranging from petabytes of Big Data to significant quantities of relatively small ';long tail' geoscientific observations and measurements. Over the past four years, GA has undertaken strategic activities that prepare us for Data Stewardship: - Organisation-wide audits of GA's data holdings and identification of custodians for each dataset

  12. An Improved Information Hiding Method Based on Sparse Representation

    Directory of Open Access Journals (Sweden)

    Minghai Yao

    2015-01-01

    Full Text Available A novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of abundant information of the cover image, the sparse representation method is adopted to exploit the correlation between the cover and biometric images. Thus, the biometric image is divided into two parts. The first part is the reconstructed image, and the other part is the residual image. The biometric authentication image cannot be restored by any one part. The residual image and sparse representation coefficients are embedded into the cover image. Then, for the sake of causing much less attention of attackers, the visual attention mechanism is employed to select embedding location and embedding sequence of secret information. Finally, the reversible watermarking algorithm based on histogram is utilized for embedding the secret information. For verifying the validity of the algorithm, the PolyU multispectral palmprint and the CASIA iris databases are used as biometric information. The experimental results show that the proposed method exhibits good security, invisibility, and high capacity.

  13. Embedding Affective Learning Outcomes in Library Instruction

    Directory of Open Access Journals (Sweden)

    Ellysa Stern Cahoy

    2012-12-01

    Full Text Available While information literacy in higher education has long been focused on cognitive learning outcomes, attention must be paid to students’ affective, emotional needs throughout the research process. This article identifies models for embedding affective learning outcomes within information literacy instruction, and provides strategies to help librarians discover, articulate, and address students’ self-efficacy, motivation, emotions and attitudes. Worksheets to assist in creating affective learning outcomes are included to bring structure to an area of learning that is often challenging to articulate and measure. Also included in the article are the results of a recent survey of instruction librarians’ familiarity and inclusion of affective learning outcomes within teaching and learning initiatives.

  14. Isometric embeddings in cosmology and astrophysics

    Indian Academy of Sciences (India)

    embedding theory, a given spacetime (or 'brane') is embedded in a higher- ..... If one recalls that the motivation (at least in part) for non-compact extra ... to successfully embed (apparently perfect fluid) astrophysical models, we typically need to.

  15. Poincare ball embeddings of the optical geometry

    International Nuclear Information System (INIS)

    Abramowicz, M A; Bengtsson, I; Karas, V; Rosquist, K

    2002-01-01

    It is shown that the optical geometry of the Reissner-Nordstroem exterior metric can be embedded in a hyperbolic space all the way down to its outer horizon. The adopted embedding procedure removes a breakdown of flat-space embeddings which occurs outside the horizon, at and below the Buchdahl-Bondi limit (R/M=9/4 in the Schwarzschild case). In particular, the horizon can be captured in the optical geometry embedding diagram. Moreover, by using the compact Poincare ball representation of the hyperbolic space, the embedding diagram can cover the whole extent of radius from spatial infinity down to the horizon. Attention is drawn to the advantages of such embeddings in an appropriately curved space: this approach gives compact embeddings and it clearly distinguishes the case of an extremal black hole from a non-extremal one in terms of the topology of the embedded horizon

  16. The embedded operating system project

    Science.gov (United States)

    Campbell, R. H.

    1984-01-01

    This progress report describes research towards the design and construction of embedded operating systems for real-time advanced aerospace applications. The applications concerned require reliable operating system support that must accommodate networks of computers. The report addresses the problems of constructing such operating systems, the communications media, reconfiguration, consistency and recovery in a distributed system, and the issues of realtime processing. A discussion is included on suitable theoretical foundations for the use of atomic actions to support fault tolerance and data consistency in real-time object-based systems. In particular, this report addresses: atomic actions, fault tolerance, operating system structure, program development, reliability and availability, and networking issues. This document reports the status of various experiments designed and conducted to investigate embedded operating system design issues.

  17. Perturbation Theory of Embedded Eigenvalues

    DEFF Research Database (Denmark)

    Engelmann, Matthias

    project gives a general and systematic approach to analytic perturbation theory of embedded eigenvalues. The spectral deformation technique originally developed in the theory of dilation analytic potentials in the context of Schrödinger operators is systematized by the use of Mourre theory. The group...... of dilations is thereby replaced by the unitary group generated y the conjugate operator. This then allows to treat the perturbation problem with the usual Kato theory.......We study problems connected to perturbation theory of embedded eigenvalues in two different setups. The first part deals with second order perturbation theory of mass shells in massive translation invariant Nelson type models. To this end an expansion of the eigenvalues w.r.t. fiber parameter up...

  18. An Embedded Reconfigurable Logic Module

    Science.gov (United States)

    Tucker, Jerry H.; Klenke, Robert H.; Shams, Qamar A. (Technical Monitor)

    2002-01-01

    A Miniature Embedded Reconfigurable Computer and Logic (MERCAL) module has been developed and verified. MERCAL was designed to be a general-purpose, universal module that that can provide significant hardware and software resources to meet the requirements of many of today's complex embedded applications. This is accomplished in the MERCAL module by combining a sub credit card size PC in a DIMM form factor with a XILINX Spartan I1 FPGA. The PC has the ability to download program files to the FPGA to configure it for different hardware functions and to transfer data to and from the FPGA via the PC's ISA bus during run time. The MERCAL module combines, in a compact package, the computational power of a 133 MHz PC with up to 150,000 gate equivalents of digital logic that can be reconfigured by software. The general architecture and functionality of the MERCAL hardware and system software are described.

  19. The Modified Embedded Atom Method

    Energy Technology Data Exchange (ETDEWEB)

    Baskes, M.I.

    1994-08-01

    Recent modifications have been made to generalize the Embedded Atom Method (EAM) to describe bonding in diverse materials. By including angular dependence of the electron density in an empirical way, the Modified Embedded Atom Method (MEAM) has been able to reproduce the basic energetic and structural properties of 45 elements. This method is ideal for examining interfacial behavior of dissimilar materials. This paper explains in detail the derivation of the method, shows how parameters of MEAM are determined directly from experiment or first principles calculations, and examine the quality of the reproduction of the database. Materials with fcc, bcc, hcp, and diamond cubic crystal structure are discussed. A few simple examples of the application of the MEAM to surfaces and interfaces are presented. Calculations of pullout of a SiC fiber in a diamond matrix as a function of applied stress show nonuniform deformation of the fiber.

  20. Embedding

    DEFF Research Database (Denmark)

    Høyrup, Jens

    2016-01-01

    systems, in particular place-value and quasi place-value systems. 2. The development of algebraic symbolisms. 3. The discussion whether “scientific revolutions” ever take place in mathematics, or new conceptualizations always include what preceded them. A final section investigates the relation between...

  1. Sustainable embedded software lifecycle planning

    OpenAIRE

    Lee, Dong-Hyun; In, Hoh Peter; Lee, Keun; Park, Sooyong; Hinchey, Mike

    2012-01-01

    peer-reviewed Time-to-market is a crucial factor in increasing market share in the consumer electronics (CE) market. Furthermore, fierce competition in the market tends to sharply lower the prices of brand-new CE products as soon as they are released. Software-intensive embedded system design methods such as hardware/software co-design have been studied with the goal of reducing development lead-time by designing hardware and software simultaneously. Many researchers, however, concentra...

  2. Bilipschitz embedding of homogeneous fractals

    OpenAIRE

    Lü, Fan; Lou, Man-Li; Wen, Zhi-Ying; Xi, Li-Feng

    2014-01-01

    In this paper, we introduce a class of fractals named homogeneous sets based on some measure versions of homogeneity, uniform perfectness and doubling. This fractal class includes all Ahlfors-David regular sets, but most of them are irregular in the sense that they may have different Hausdorff dimensions and packing dimensions. Using Moran sets as main tool, we study the dimensions, bilipschitz embedding and quasi-Lipschitz equivalence of homogeneous fractals.

  3. Characterization of Embedded BPM Collimators

    CERN Document Server

    VALENTINO, Gianluca

    2015-01-01

    During LS1, 16 tertiary collimators (TCTs) and 2 secondary collimators (TCSGs) in IR6 were replaced by new embedded BPM collimators. The BPM functionality allows the possibility to align the collimators more quickly and therefore be able to respond faster to machine configuration changes, as well as a direct monitoring of the beam orbit at the collimators. Following an initial commissioning phase, an MD was carried out to test the new collimators and acquisition electronics with beam in the LHC.

  4. Embedded system of image storage based on fiber channel

    Science.gov (United States)

    Chen, Xiaodong; Su, Wanxin; Xing, Zhongbao; Wang, Hualong

    2008-03-01

    In domains of aerospace, aviation, aiming, and optic measure etc., the embedded system of imaging, processing and recording is absolutely necessary, which has small volume, high processing speed and high resolution. But the embedded storage technology becomes system bottleneck because of developing slowly. It is used to use RAID to promote storage speed, but it is unsuitable for the embedded system because of its big volume. Fiber channel (FC) technology offers a new method to develop the high-speed, portable storage system. In order to make storage subsystem meet the needs of high storage rate, make use of powerful Virtex-4 FPGA and high speed fiber channel, advance a project of embedded system of digital image storage based on Xilinx Fiber Channel Arbitrated Loop LogiCORE. This project utilizes Virtex- 4 RocketIO MGT transceivers to transmit the data serially, and connects many Fiber Channel hard drivers by using of Arbitrated Loop optionally. It can achieve 400MBps storage rate, breaks through the bottleneck of PCI interface, and has excellences of high-speed, real-time, portable and massive capacity.

  5. Embedding of the radiation cosmos

    International Nuclear Information System (INIS)

    Wang, J.Z.

    1986-01-01

    The embedding of the Friedmann manifold into a higher dimensional Minkowski space is investigated. As solutions of the Friedmann equation with vanishing cosmological term, Friedmann models describe a first expanding, then contracting universe and predict a big bang singularity. For cosmic time t → 0, R(t) → 0, there is an infinite scalar, curvature in the matter cosmos, and an infinite eigenvalue corresponding to the unique timelike eigenvector of the energy-momentum tensor in the radiation cosmos. The big bang, therefore, is an intrinsic singularity of the space time. To investigate the singularity one resorts to the embedding of the Friedmann manifold into a higher dimensional Minkowski space. For the matter cosmos such an investigation has already been done (Lauro and Schucking, 1984). However, the matter cosmos is not a suitable model to discuss the very early universe where the radiation dominates. Geometric properties, such as the Riemann tensor, the Guassian curvature and the global behavior of the geodesics of the embedded manifold, are discussed in detail

  6. Early auditory evoked potential is modulated by selective attention and related to individual differences in visual working memory capacity.

    Science.gov (United States)

    Giuliano, Ryan J; Karns, Christina M; Neville, Helen J; Hillyard, Steven A

    2014-12-01

    A growing body of research suggests that the predictive power of working memory (WM) capacity for measures of intellectual aptitude is due to the ability to control attention and select relevant information. Crucially, attentional mechanisms implicated in controlling access to WM are assumed to be domain-general, yet reports of enhanced attentional abilities in individuals with larger WM capacities are primarily within the visual domain. Here, we directly test the link between WM capacity and early attentional gating across sensory domains, hypothesizing that measures of visual WM capacity should predict an individual's capacity to allocate auditory selective attention. To address this question, auditory ERPs were recorded in a linguistic dichotic listening task, and individual differences in ERP modulations by attention were correlated with estimates of WM capacity obtained in a separate visual change detection task. Auditory selective attention enhanced ERP amplitudes at an early latency (ca. 70-90 msec), with larger P1 components elicited by linguistic probes embedded in an attended narrative. Moreover, this effect was associated with greater individual estimates of visual WM capacity. These findings support the view that domain-general attentional control mechanisms underlie the wide variation of WM capacity across individuals.

  7. Early Auditory Evoked Potential Is Modulated by Selective Attention and Related to Individual Differences in Visual Working Memory Capacity

    Science.gov (United States)

    Giuliano, Ryan J.; Karns, Christina M.; Neville, Helen J.; Hillyard, Steven A.

    2015-01-01

    A growing body of research suggests that the predictive power of working memory (WM) capacity for measures of intellectual aptitude is due to the ability to control attention and select relevant information. Crucially, attentional mechanisms implicated in controlling access to WM are assumed to be domain-general, yet reports of enhanced attentional abilities in individuals with larger WM capacities are primarily within the visual domain. Here, we directly test the link between WM capacity and early attentional gating across sensory domains, hypothesizing that measures of visual WM capacity should predict an individual’s capacity to allocate auditory selective attention. To address this question, auditory ERPs were recorded in a linguistic dichotic listening task, and individual differences in ERP modulations by attention were correlated with estimates of WM capacity obtained in a separate visual change detection task. Auditory selective attention enhanced ERP amplitudes at an early latency (ca. 70–90 msec), with larger P1 components elicited by linguistic probes embedded in an attended narrative. Moreover, this effect was associated with greater individual estimates of visual WM capacity. These findings support the view that domain-general attentional control mechanisms underlie the wide variation of WM capacity across individuals. PMID:25000526

  8. Embedding initial data for black hole collisions

    OpenAIRE

    Romano, Joseph D.; Price, Richard H.

    1994-01-01

    We discuss isometric embedding diagrams for the visualization of initial data for the problem of the head-on collision of two black holes. The problem of constructing the embedding diagrams is explicitly presented for the best studied initial data, the Misner geometry. We present a partial solution of the embedding diagrams and discuss issues related to completing the solution.

  9. Embedded generation: issues arising in network charging and supply

    International Nuclear Information System (INIS)

    1999-01-01

    This study has been commissioned by ETSU, as part of the DTI's New and Renewable Energy Commercialisation programme, with the intention of informing the debate about the appropriate basis for transmission and distribution charges for, and supply of electricity by, Embedded Generators (EGs). (Author)

  10. Embedding Marketing in International Campus Development: Lessons from UK Universities

    Science.gov (United States)

    Lewis, Vicky

    2016-01-01

    This paper provides recommendations for embedding a market- and marketing-informed approach within the development process for a new international campus. It includes a brief outline of the current global profile of international campuses (as one form of transnational education) before highlighting the role of marketing at key stages of campus…

  11. Embedded generation: issues arising in network charging and supply

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-07-01

    This study has been commissioned by ETSU, as part of the DTI's New and Renewable Energy Commercialisation programme, with the intention of informing the debate about the appropriate basis for transmission and distribution charges for, and supply of electricity by, Embedded Generators (EGs). (Author)

  12. Gender Beliefs and Embedded Gendered Values in Preschool

    Science.gov (United States)

    Emilson, Anette; Folkesson, Anne-Mari; Lindberg, Ingeborg Moqvist

    2016-01-01

    The aim of this study is to explore practitioners' gender beliefs and how gendered values are embedded in Swedish preschool practice. The research question is: What beliefs about gender and the associated values, can be identified in practitioners' talk when they discuss gender issues? The study is informed by Bronwyn Davies' theoretical ideas…

  13. Positron confinement in embedded lithium nanoclusters

    Science.gov (United States)

    van Huis, M. A.; van Veen, A.; Schut, H.; Falub, C. V.; Eijt, S. W.; Mijnarends, P. E.; Kuriplach, J.

    2002-02-01

    Quantum confinement of positrons in nanoclusters offers the opportunity to obtain detailed information on the electronic structure of nanoclusters by application of positron annihilation spectroscopy techniques. In this work, positron confinement is investigated in lithium nanoclusters embedded in monocrystalline MgO. These nanoclusters were created by means of ion implantation and subsequent annealing. It was found from the results of Doppler broadening positron beam analysis that approximately 92% of the implanted positrons annihilate in lithium nanoclusters rather than in the embedding MgO, while the local fraction of lithium at the implantation depth is only 1.3 at. %. The results of two-dimensional angular correlation of annihilation radiation confirm the presence of crystalline bulk lithium. The confinement of positrons is ascribed to the difference in positron affinity between lithium and MgO. The nanocluster acts as a potential well for positrons, where the depth of the potential well is equal to the difference in the positron affinities of lithium and MgO. These affinities were calculated using the linear muffin-tin orbital atomic sphere approximation method. This yields a positronic potential step at the MgO||Li interface of 1.8 eV using the generalized gradient approximation and 2.8 eV using the insulator model.

  14. Increasing Bellevue School District's elementary teachers' capacity for teaching inquiry-based science: Using ideas from contemporary learning theory to inform professional development

    Science.gov (United States)

    Maury, Tracy Anne

    This Capstone project examined how leaders in the Bellevue School District can increase elementary teachers' capacity for teaching inquiry-based science through the use of professional learning activities that are grounded in ideas from human learning theory. A framework for professional development was constructed and from that framework, a set of professional learning activities were developed as a means to support teacher learning while project participants piloted new curriculum called the Isopod Habitat Challenge. Teachers in the project increased their understanding of the learning theory principles of preconceptions and metacognition. Teachers did not increase their understanding of the principle of learning with understanding, although they did articulate the significance of engaging children in student-led inquiry cycles. Data from the curriculum revision and professional development project coupled with ideas from learning theory, cognition and policy implementation, and learning community literatures suggest Bellevue's leaders can encourage peer-to-peer interaction, link professional development to teachers' daily practice, and capitalize on technology as ways to increase elementary teachers' capacity for teaching inquiry-based science. These lessons also have significance for supporting teacher learning and efficacy in other subject areas and at other levels in the system.

  15. Sustaining librarian vitality: embedded librarianship model for health sciences libraries.

    Science.gov (United States)

    Wu, Lin; Mi, Misa

    2013-01-01

    With biomedical information widely accessible from anywhere at any time, health sciences libraries have become less centralized, and they are challenged to stay relevant and vital to the mission and strategic goals of their home institution. One solution is to embed librarians at strategic points in health professions' education, research, and patient care. This article discusses a proposed five-level model of embedded librarianship within the context of health sciences libraries and describes different roles, knowledge, and skills desirable for health sciences librarians working as embedded librarians.

  16. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  17. Seismic capacity of switchgear

    International Nuclear Information System (INIS)

    Bandyopadhyay, K.; Hofmayer, C.; Kassir, M.; Pepper, S.

    1989-01-01

    As part of a component fragility program sponsored by the USNRC, BNL has collected existing information on the seismic capacity of switchgear assemblies from major manufacturers. Existing seismic test data for both low and medium voltage switchgear assemblies have been evaluated and the generic results are presented in this paper. The failure modes are identified and the corresponding generic lower bound capacity levels are established. The test response spectra have been used as a measure of the test vibration input. The results indicate that relays chatter at a very low input level at the base of the switchgear cabinet. This change of state of devices including relays have been observed. Breaker tripping occurs at a higher vibration level. Although the structural failure of internal elements have been noticed, the overall switchgear cabinet structure withstands a high vibration level. 5 refs., 2 figs., 2 tabs

  18. The effect of increasing levels of embedded generation on the distribution network. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Collinson, A; Earp, G K; Howson, D; Owen, R D; Wright, A J

    1999-10-01

    This report was commissioned as part of the EA Technology Strategic Technology Programme under guidance of the Module 5 (Embedded Generation) Steering Group. This report aims to provide information related to the distribution and supply of electricity in the context of increasing levels of embedded generation. There is a brief description of the operating environment within which electricity companies in the UK must operate. Technical issues related to the connection of generation to the existing distribution infrastructure are highlighted and the design philosophy adopted by network designers in accommodating applications for the connection of embedded generation to the network is discussed. The effects embedded generation has on the network and the issues raised are presented as many of them present barriers to the connection of embedded generators. The final chapters cover the forecast of required connection to 2010 and solutions to restrictions preventing the connection of more embedded generation to the network. (author)

  19. Digital Libraries with Embedded Values: Combining Insights from LIS and Science and Technology Studies

    Science.gov (United States)

    Fleischmann, Kenneth R.

    2007-01-01

    In the digital age, libraries are increasingly being augmented or even replaced by information technology (IT), which is often accompanied by implicit assumptions of objectivity and neutrality, yet the field of science and technology studies (STS) has a long history of studying what values are embedded in IT and how they are embedded. This article…

  20. Virtually embedded the librarian in an online environment

    CERN Document Server

    McCaffrey, Erin

    2014-01-01

    The rise of online education at institutions of higher learning, together with the increasing cost of higher education, lead some to suggest that online (or distance) education will eventually become the dominant form of higher learning. This has particular significance for librarians. This casebook, a blueprint for embedding academic librarians in online environments, from undergraduate to science-based graduate schools to MOOCs is the first to explore how librarians can play a key role in the virtual academic landscape. The authors, academic librarians representing a broad range of colleges and universities, look at the evolution of the embedded librarian from physical to virtual, suggest how to develop and implement unique programs in and out of the classroom, and explain how to scale programs once they are embedded. This book is suitable for professional collections in academic libraries of all sizes and types. It is also suitable for collections in schools of library and information science.

  1. Cepstral domain modification of audio signals for data embedding: preliminary results

    Science.gov (United States)

    Gopalan, Kaliappan

    2004-06-01

    A method of embedding data in an audio signal using cepstral domain modification is described. Based on successful embedding in the spectral points of perceptually masked regions in each frame of speech, first the technique was extended to embedding in the log spectral domain. This extension resulted at approximately 62 bits /s of embedding with less than 2 percent of bit error rate (BER) for a clean cover speech (from the TIMIT database), and about 2.5 percent for a noisy speech (from an air traffic controller database), when all frames - including silence and transition between voiced and unvoiced segments - were used. Bit error rate increased significantly when the log spectrum in the vicinity of a formant was modified. In the next procedure, embedding by altering the mean cepstral values of two ranges of indices was studied. Tests on both a noisy utterance and a clean utterance indicated barely noticeable perceptual change in speech quality when lower range of cepstral indices - corresponding to vocal tract region - was modified in accordance with data. With an embedding capacity of approximately 62 bits/s - using one bit per each frame regardless of frame energy or type of speech - initial results showed a BER of less than 1.5 percent for a payload capacity of 208 embedded bits using the clean cover speech. BER of less than 1.3 percent resulted for the noisy host with a capacity was 316 bits. When the cepstrum was modified in the region of excitation, BER increased to over 10 percent. With quantization causing no significant problem, the technique warrants further studies with different cepstral ranges and sizes. Pitch-synchronous cepstrum modification, for example, may be more robust to attacks. In addition, cepstrum modification in regions of speech that are perceptually masked - analogous to embedding in frequency masked regions - may yield imperceptible stego audio with low BER.

  2. The biokinetics of uranium migrating from embedded DU fragments

    International Nuclear Information System (INIS)

    Leggett, R.W.; Pellmar, T.C.

    2003-01-01

    Military uses of depleted uranium (DU) munitions have resulted in casualties with embedded DU fragments. Assessment of radiological or chemical health risks from these fragments requires a model relating urinary U to the rate of migration of U from the fragments, and its accumulation in systemic tissues. A detailed biokinetic model for U has been published by the International Commission on Radiological Protection (ICRP), but its applicability to U migrating from embedded DU fragments is uncertain. Recently, ) conducted a study at the Armed Forces Radiobiology Research Institute (AFRRI) on the redistribution and toxicology of U in rats with implanted DU pellets, simulating embedded fragments. This paper compares the biokinetic data from that study with the behavior of commonly studied forms of U in rats (e.g., intravenously injected U nitrate). The comparisons indicate that the biokinetics of U migrating from embedded DU is similar to that of commonly studied forms of U with regard to long-term accumulation in kidneys, bone, and liver. The results provide limited support for the application of the ICRP's model to persons with embedded DU fragments. Additional information is needed with regard to the short-term behavior of migrating U and its accumulation in lymph nodes, brain, testicles, and other infrequently studied U repositories

  3. Permutation entropy with vector embedding delays

    Science.gov (United States)

    Little, Douglas J.; Kane, Deb M.

    2017-12-01

    Permutation entropy (PE) is a statistic used widely for the detection of structure within a time series. Embedding delay times at which the PE is reduced are characteristic timescales for which such structure exists. Here, a generalized scheme is investigated where embedding delays are represented by vectors rather than scalars, permitting PE to be calculated over a (D -1 ) -dimensional space, where D is the embedding dimension. This scheme is applied to numerically generated noise, sine wave and logistic map series, and experimental data sets taken from a vertical-cavity surface emitting laser exhibiting temporally localized pulse structures within the round-trip time of the laser cavity. Results are visualized as PE maps as a function of embedding delay, with low PE values indicating combinations of embedding delays where correlation structure is present. It is demonstrated that vector embedding delays enable identification of structure that is ambiguous or masked, when the embedding delay is constrained to scalar form.

  4. Building policy-making capacity in the Ministry of Health: the Kazakhstan experience.

    Science.gov (United States)

    Chanturidze, Tata; Adams, Orvill; Tokezhanov, Bolat; Naylor, Mike; Richardson, Erica

    2015-01-20

    Recent economic growth in Kazakhstan has been accompanied by slower improvements in population health and this has renewed impetus for health system reform. Strengthening strategic planning and policy-making capacity in the Ministry of Health has been identified as an important priority, particularly as the Ministry of Health is leading the health system reform process. The intervention was informed by the United Nations Development Programme (UNDP) framework for capacity building which views capacity building as an ongoing process embedded in local institutions and practices. In response to local needs extra elements were included in the framework to tailor the capacity building programme according to the existing policy and budget cycles and respective competence requirements, and link it with transparent career development structures of the Ministry of Health. This aspect of the programme was informed by the institutional capability assessment model used by the United Kingdom National Health Service (NHS) which was adapted to examine the specific organizational and individual competences of the Ministry of Health in Kazakhstan. There were clear successes in building capacity for policy making and strategic planning within the Ministry of Health in Kazakhstan, including better planned, more timely and in-depth responses to policy assignments. Embedding career development as a part of this process was more challenging. This case study highlights the importance of strong political will and high level support for capacity building in ensuring the sustainability of programmes. It also shows that capacity-building programmes need to ensure full engagement with all local stakeholders, or where this is not possible, programmes need to be targeted narrowly to those stakeholders who will benefit most, for the greatest impact to be achieved. In sum, high quality tailor-made capacity development programmes should be based on thorough needs assessment of individual and

  5. Checkpointing for graceful degradation in distributed embedded systems

    Science.gov (United States)

    Sababha, Belal Hussein

    Graceful degradation is an approach to developing dependable safety-critical embedded applications, where redundant active or standby resources are used to cope with faults through a system reconfiguration at run-time. Compared to traditional hardware and software redundancy, it is a promising technique that may achieve dependability with a significant reduction in cost, size, weight, and power requirements. Reconfiguration at run-time necessitates using proper checkpointing protocols to support state reservation to ensure correct task restarts after a system reconfiguration. One of the most common checkpointing protocols are communication induced checkpointing (CIC) protocols, which are well developed and understood for large parallel and information systems, but not much has been done for resource limited embedded systems. This work implements and evaluates some of the most common CIC protocols in a periodic resource constrained distributed embedded system for graceful degradation purposes. A test-bed has been developed and used for the evaluation of the various protocols. The implemented protocols are thoroughly studied and performances are contrasted. Specifically the periodicity property and how it benefits checkpointing in embedded systems is investigated. This work introduces a unique effort of CIC protocol implementation and evaluation in the field of distributed embedded systems. Other than providing a test-bed for graceful degradation support, this work shows that some checkpointing protocols that are not efficient in large information systems and supercomputers perform well in embedded systems. We show that a simple index-based CIC protocol, such as the BCS protocol, is more appropriate in embedded system applications compared to other protocols that piggyback a significant amount of information to reduce the number of forced checkpoints. Finally, this work proposes a whole graceful degradation approach to achieve fault tolerance in resource constrained

  6. Embedding Color Watermarks in Color Images

    Directory of Open Access Journals (Sweden)

    Wu Tung-Lin

    2003-01-01

    Full Text Available Robust watermarking with oblivious detection is essential to practical copyright protection of digital images. Effective exploitation of the characteristics of human visual perception to color stimuli helps to develop the watermarking scheme that fills the requirement. In this paper, an oblivious watermarking scheme that embeds color watermarks in color images is proposed. Through color gamut analysis and quantizer design, color watermarks are embedded by modifying quantization indices of color pixels without resulting in perceivable distortion. Only a small amount of information including the specification of color gamut, quantizer stepsize, and color tables is required to extract the watermark. Experimental results show that the proposed watermarking scheme is computationally simple and quite robust in face of various attacks such as cropping, low-pass filtering, white-noise addition, scaling, and JPEG compression with high compression ratios.

  7. Better business case for embedded energy

    International Nuclear Information System (INIS)

    Wallace, Paula

    2014-01-01

    The first customer-led rule change to reform the National Energy Market has been successful, making it easier for clean energy to connect to the national electricity grid. The rule change was adopted by the Australian Energy Market Commission (AEMC) recently and will come into effect from October 1. Led by ClimateWorks Australia, the Property Council of Australia and Seed Advisory, these reforms will make it cheaper and faster to connect co/trigeneration plants and renewable energy to the electricity grid. Some see the reforms unleashing a wave of embedded generation projects on commercial buildings and precincts, seeking energy savings and higher sustainability ratings. However, the benefits that can be assumed at this stage are, greater information from electricity network operators to avoid delays, and known fees and charges so that financial feasibility can be calculated up front.

  8. The MNC as an Externally Embedded Organization

    DEFF Research Database (Denmark)

    Nell, Phillip Christopher; Ambos, Björn; Schlegelmilch, Bodo B.

    2011-01-01

    MNCs have been conceptualized as differentiated networks that, in turn, are embedded in external networks. Previous research has predominantly focused on the embeddedness of established subsidiaries into their local environment, omitting to shed light on the phenomenon of headquarters linkages...... to the local context which creates embeddedness overlap. We develop a model of why MNCs develop overlapping linkages to local subsidiary networks even if the subsidiaries have grown out of the initial start-up phase. Using detailed information on 168 European subsidiaries, we find that MNCs build and maintain...... more overlapping network ties when subsidiaries are high performers, hold important resources, operate in turbulent environments, and are closely connected to multinational actors as opposed to purely domestic firms....

  9. Embedded random matrix ensembles in quantum physics

    CERN Document Server

    Kota, V K B

    2014-01-01

    Although used with increasing frequency in many branches of physics, random matrix ensembles are not always sufficiently specific to account for important features of the physical system at hand. One refinement which retains the basic stochastic approach but allows for such features consists in the use of embedded ensembles.  The present text is an exhaustive introduction to and survey of this important field. Starting with an easy-to-read introduction to general random matrix theory, the text then develops the necessary concepts from the beginning, accompanying the reader to the frontiers of present-day research. With some notable exceptions, to date these ensembles have primarily been applied in nuclear spectroscopy. A characteristic example is the use of a random two-body interaction in the framework of the nuclear shell model. Yet, topics in atomic physics, mesoscopic physics, quantum information science and statistical mechanics of isolated finite quantum systems can also be addressed using these ensemb...

  10. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i.......e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful...... in this direction is to extend saturation-based techniques so that enough state information can be modelled and analysed. Finally, we present a methodology for proving the same security properties in the computational model, by means of typing protocol implementations....

  11. Habitual Tastes and Embedded Taste

    DEFF Research Database (Denmark)

    Hedegaard, Liselotte

    2016-01-01

    The interest of this paper is to position taste within the framework of time. This might seem peculiar given that taste, in its physical sense, is referred to as an ephemeral experience taking place in the mouth. Taste, however, is more than that. It is the transient experience that infiltrates...... may be bridged by story-telling or other ways of handing over historically embedded practices, but this leaves a more fundamental question unanswered. Namely, that given that all remembrance has individual recollection as the point of departure, then how does individual recollection of tastes...

  12. Professional Windows Embedded Compact 7

    CERN Document Server

    Phung, Samuel; Joubert, Thierry; Hall, Mike

    2011-01-01

    Learn to program an array of customized devices and solutions As a compact, highly efficient, scalable operating system, Windows Embedded Compact 7 (WEC7) is one of the best options for developing a new generation of network-enabled, media-rich, and service-oriented devices. This in-depth resource takes you through the benefits and capabilities of WEC7 so that you can start using this performance development platform today. Divided into several major sections, the book begins with an introduction and then moves on to coverage of OS design, application development, advanced application developm

  13. Simulation and Embedded Smart Control

    DEFF Research Database (Denmark)

    Conrad, Finn; Fan, Zhun; Sørensen, Torben

    2006-01-01

    The paper presents results obtained from a Danish mechatronic research program focusing on intelligent motion control, simulation and embedded smart controllers for hydraulic actuators and robots as well as results from the EU projects. A mechatronic test facility with digital controllers...... for a hydraulic robot was implemented. The controllers apply digital signal processors (DSPs), and Field Programmable Gate Array, short named as FPGA, respectively. The DSP controller utilizes the dSPACE System that is suitable for real-time experimentation, evaluation and validation of control laws...... and algorithms. Furthermore, a developed IT-tool concept for controller and system design utilizing the ISO 10303 STEP Standard is proposed....

  14. Quantum reading capacity

    International Nuclear Information System (INIS)

    Pirandola, Stefano; Braunstein, Samuel L; Lupo, Cosmo; Mancini, Stefano; Giovannetti, Vittorio

    2011-01-01

    The readout of a classical memory can be modelled as a problem of quantum channel discrimination, where a decoder retrieves information by distinguishing the different quantum channels encoded in each cell of the memory (Pirandola 2011 Phys. Rev. Lett. 106 090504). In the case of optical memories, such as CDs and DVDs, this discrimination involves lossy bosonic channels and can be remarkably boosted by the use of nonclassical light (quantum reading). Here we generalize these concepts by extending the model of memory from single-cell to multi-cell encoding. In general, information is stored in a block of cells by using a channel-codeword, i.e. a sequence of channels chosen according to a classical code. Correspondingly, the readout of data is realized by a process of ‘parallel’ channel discrimination, where the entire block of cells is probed simultaneously and decoded via an optimal collective measurement. In the limit of a large block we define the quantum reading capacity of the memory, quantifying the maximum number of readable bits per cell. This notion of capacity is nontrivial when we suitably constrain the physical resources of the decoder. For optical memories (encoding bosonic channels), such a constraint is energetic and corresponds to fixing the mean total number of photons per cell. In this case, we are able to prove a separation between the quantum reading capacity and the maximum information rate achievable by classical transmitters, i.e. arbitrary classical mixtures of coherent states. In fact, we can easily construct nonclassical transmitters that are able to outperform any classical transmitter, thus showing that the advantages of quantum reading persist in the optimal multi-cell scenario. (paper)

  15. Information

    International Nuclear Information System (INIS)

    Boyard, Pierre.

    1981-01-01

    The fear for nuclear energy and more particularly for radioactive wastes is analyzed in the sociological context. Everybody agree on the information need, information is available but there is a problem for their diffusion. Reactions of the public are analyzed and journalists, scientists and teachers have a role to play [fr

  16. CSTI High Capacity Power

    International Nuclear Information System (INIS)

    Winter, J.M.

    1989-01-01

    The SP-100 program was established in 1983 by DOD, DOE, and NASA as a joint program to develop the technology necessary for space nuclear power systems for military and civil application. During FY-86 and 87, the NASA SP-100 Advanced Technology Program was devised to maintain the momentum of promising technology advancement efforts started during Phase 1 of SP-100 and to strengthen, in key areas, the chances for successful development and growth capability of space nuclear reactor power systems for future space applications. In FY-88, the Advanced Technology Program was incorporated into NASA's new Civil Space Technology Initiative (CSTI). The CSTI Program was established to provide the foundation for technology development in automation and robotics, information, propulsion, and power. The CSTI High Capacity Power Program builds on the technology efforts of the SP-100 program, incorporates the previous NASA SP-100 Advanced Technology project, and provides a bridge to NASA Project Pathfinder. The elements of CSTI High Capacity Power development include Conversion Systems, Thermal Management, Power Management, System Diagnostics, and Environmental Interactions. Technology advancement in all areas, including materials, is required to assure the high reliability and 7 to 10 year lifetime demanded for future space nuclear power systems. The overall program will develop and demonstrate the technology base required to provide a wide range of modular power systems as well as allowing mission independence from solar and orbital attitude requirements. Several recent advancements in CSTI High Capacity power development will be discussed

  17. Testing framework for embedded languages

    Science.gov (United States)

    Leskó, Dániel; Tejfel, Máté

    2012-09-01

    Embedding a new programming language into an existing one is a widely used technique, because it fastens the development process and gives a part of a language infrastructure for free (e.g. lexical, syntactical analyzers). In this paper we are presenting a new advantage of this development approach regarding to adding testing support for these new languages. Tool support for testing is a crucial point for a newly designed programming language. It could be done in the hard way by creating a testing tool from scratch, or we could try to reuse existing testing tools by extending them with an interface to our new language. The second approach requires less work, and also it fits very well for the embedded approach. The problem is that the creation of such interfaces is not straightforward at all, because the existing testing tools were mostly not designed to be extendable and to be able to deal with new languages. This paper presents an extendable and modular model of a testing framework, in which the most basic design decision was to keep the - previously mentioned - interface creation simple and straightforward. Other important aspects of our model are the test data generation, the oracle problem and the customizability of the whole testing phase.

  18. Drilling azimuth gamma embedded design

    Directory of Open Access Journals (Sweden)

    Zhou Yi Ren

    2016-01-01

    Full Text Available Embedded drilling azimuth gamma design, the use of radioactive measuring principle embedded gamma measurement while drilling a short section analysis. Monte Carlo method, in response to the density of horizontal well logging numerical simulation of 16 orientation, the orientation of horizontal well analysed, calliper, bed boundary location, space, different formation density, formation thickness, and other factors inclined strata dip the impact by simulating 137Cs sources under different formation conditions of the gamma distribution, to determine the orientation of drilling density tool can detect window size and space, draw depth of the logging methods. The data 360° azimuth imaging, image processing method to obtain graph, display density of the formation, dip and strata thickness and other parameters, the logging methods obtain real-time geo-steering. To establish a theoretical basis for the orientation density logging while drilling method implementation and application of numerical simulation in-depth study of the MWD azimuth and density log response factors of horizontal wells.

  19. Nanofluidic Device with Embedded Nanopore

    Science.gov (United States)

    Zhang, Yuning; Reisner, Walter

    2014-03-01

    Nanofluidic based devices are robust methods for biomolecular sensing and single DNA manipulation. Nanopore-based DNA sensing has attractive features that make it a leading candidate as a single-molecule DNA sequencing technology. Nanochannel based extension of DNA, combined with enzymatic or denaturation-based barcoding schemes, is already a powerful approach for genome analysis. We believe that there is revolutionary potential in devices that combine nanochannels with nanpore detectors. In particular, due to the fast translocation of a DNA molecule through a standard nanopore configuration, there is an unfavorable trade-off between signal and sequence resolution. With a combined nanochannel-nanopore device, based on embedding a nanopore inside a nanochannel, we can in principle gain independent control over both DNA translocation speed and sensing signal, solving the key draw-back of the standard nanopore configuration. We demonstrate that we can detect - using fluorescent microscopy - successful translocation of DNA from the nanochannel out through the nanopore, a possible method to 'select' a given barcode for further analysis. We also show that in equilibrium DNA will not escape through an embedded sub-persistence length nanopore until a certain voltage bias is added.

  20. Enhancing Research Ethics Review Systems in Egypt: The Focus of an International Training Program Informed by an Ecological Developmental Approach to Enhancing Research Ethics Capacity.

    Science.gov (United States)

    Edwards, Hillary Anne; Hifnawy, Tamer; Silverman, Henry

    2015-12-01

    Recently, training programs in research ethics have been established to enhance individual and institutional capacity in research ethics in the developing world. However, commentators have expressed concern that the efforts of these training programs have placed 'too great an emphasis on guidelines and research ethics review', which will have limited effect on ensuring ethical conduct in research. What is needed instead is a culture of ethical conduct supported by national and institutional commitment to ethical practices that are reinforced by upstream enabling conditions (strong civil society, public accountability, and trust in basic transactional processes), which are in turn influenced by developmental conditions (basic freedoms of political freedoms, economic facilities, social opportunities, transparency guarantees, and protective security). Examining this more inclusive understanding of the determinants of ethical conduct enhances at once both an appreciation of the limitations of current efforts of training programs in research ethics and an understanding of what additional training elements are needed to enable trainees to facilitate national and institutional policy changes that enhance research practices. We apply this developmental model to a training program focused in Egypt to describe examples of such additional training activities. © 2014 John Wiley & Sons Ltd.

  1. The embodied embedded character of system 1 processing.

    Science.gov (United States)

    Bellini-Leite, Samuel de Castro

    2013-01-01

    In the last thirty years, a relatively large group of cognitive scientists have begun characterising the mind in terms of two distinct, relatively autonomous systems. To account for paradoxes in empirical results of studies mainly on reasoning, Dual Process Theories were developed. Such Dual Process Theories generally agree that System 1 is rapid, automatic, parallel, and heuristic-based and System 2 is slow, capacity-demanding, sequential, and related to consciousness. While System 2 can still be decently understood from a traditional cognitivist approach, I will argue that it is essential for System 1 processing to be comprehended in an Embodied Embedded approach to Cognition.

  2. Flexible Architecture for FPGAs in Embedded Systems

    Science.gov (United States)

    Clark, Duane I.; Lim, Chester N.

    2012-01-01

    Commonly, field-programmable gate arrays (FPGAs) being developed in cPCI embedded systems include the bus interface in the FPGA. This complicates the development because the interface is complicated and requires a lot of development time and FPGA resources. In addition, flight qualification requires a substantial amount of time be devoted to just this interface. Another complication of putting the cPCI interface into the FPGA being developed is that configuration information loaded into the device by the cPCI microprocessor is lost when a new bit file is loaded, requiring cumbersome operations to return the system to an operational state. Finally, SRAM-based FPGAs are typically programmed via specialized cables and software, with programming files being loaded either directly into the FPGA, or into PROM devices. This can be cumbersome when doing FPGA development in an embedded environment, and does not have an easy path to flight. Currently, FPGAs used in space applications are usually programmed via multiple space-qualified PROM devices that are physically large and require extra circuitry (typically including a separate one-time programmable FPGA) to enable them to be used for this application. This technology adds a cPCI interface device with a simple, flexible, high-performance backend interface supporting multiple backend FPGAs. It includes a mechanism for programming the FPGAs directly via the microprocessor in the embedded system, eliminating specialized hardware, software, and PROM devices and their associated circuitry. It has a direct path to flight, and no extra hardware and minimal software are required to support reprogramming in flight. The device added is currently a small FPGA, but an advantage of this technology is that the design of the device does not change, regardless of the application in which it is being used. This means that it needs to be qualified for flight only once, and is suitable for one-time programmable devices or an application

  3. Patients' experiences of intervention trials on the treatment of myocardial infarction: is it time to adjust the informed consent procedure to the patient's capacity?

    OpenAIRE

    Agard, A; Hermeren, G; Herlitz, J

    2001-01-01

    OBJECTIVE—To investigate how patients included in trials on treatment in the early phase of acute myocardial infarction experience the consent procedure.
DESIGN—A combined qualitative and quantitative interview concerning the patients' knowledge of the trial, their feelings about being asked to participate, and their attitudes towards the consent procedure.
SETTING—Tertiary referral centre.
PATIENTS—31 patients who had given written informed consent for their participation in randomised inter...

  4. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Directory of Open Access Journals (Sweden)

    Vishakha Kelkar

    2017-01-01

    Full Text Available In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient’s information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image.

  5. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Science.gov (United States)

    Tuckley, Kushal

    2017-01-01

    In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient's information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB) obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image. PMID:29104744

  6. Cross functional organisational embedded system development

    OpenAIRE

    Lennon, Sophie

    2015-01-01

    peer-reviewed Embedded system development is continuing to grow. Medical, automotive and Internet of Things are just some of the market segments. There is a tight coupling between hardware and software when developing an embedded system, often needing to meet strict performance targets, standards requirements and aggressive schedules. Embedded software developers need to consider hardware requirements in far greater detail as they can have a significant impact on the quality and value of t...

  7. Homomorphic embeddings in n-groups

    Directory of Open Access Journals (Sweden)

    Mona Cristescu

    2013-06-01

    Full Text Available We prove that an cancellative n-groupoid A can be homotopic embedded in an n-group if and only if in A are satisfied all n-ary Malcev conditions. Now we shall prove that in the presence of associative law we obtain homomorphic embeddings. Furthermore, if A has a lateral identity a such embeddings is assured by a subset of n-ary Malcev conditions - unary Malcev conditions.

  8. Knowledge Engineering for Embedded Configuration

    DEFF Research Database (Denmark)

    Oddsson, Gudmundur Valur

    2008-01-01

    into the system the knowledge needed to achieve them. In order to understand the system, one draws simplified functional streams and identifies archetypes from the product assortment, and then one maps the two together into a system breakdown model. The system model indicates how many encapsulation models (EMs......This thesis presents a way to simplify setup of complex product systems with the help of embedded configuration. To achieve this, one has to focus on what subsystems need to communicate between themselves. The required internal knowledge is then structured at three abstraction levels......, and predefined relation types are suggested. The models are stringent and thought out so they can be implemented in software. They should allow both import and export of product knowledge from the knowledge-based system. The purpose of this work is to simplify the installation process of product systems...

  9. The embedded operating system project

    Science.gov (United States)

    Campbell, R. H.

    1985-01-01

    The design and construction of embedded operating systems for real-time advanced aerospace applications was investigated. The applications require reliable operating system support that must accommodate computer networks. Problems that arise in the construction of such operating systems, reconfiguration, consistency and recovery in a distributed system, and the issues of real-time processing are reported. A thesis that provides theoretical foundations for the use of atomic actions to support fault tolerance and data consistency in real-time object-based system is included. The following items are addressed: (1) atomic actions and fault-tolerance issues; (2) operating system structure; (3) program development; (4) a reliable compiler for path Pascal; and (5) mediators, a mechanism for scheduling distributed system processes.

  10. Embedding knowledge in a workstation

    Energy Technology Data Exchange (ETDEWEB)

    Barber, G

    1982-01-01

    This paper describes an approach to supporting work in the office. Using and extending ideas from the field of artificial intelligence (AI) it describes office work as a problem solving activity. A knowledge embedding language called OMEGA is used to embed knowledge of the organization into an office worker's workstation in order to support the office worker in his or her problem solving. A particular approach to reasoning about change and contradiction is discussed. This approach uses OMEGA's viewpoint mechanism. OMEGA's viewpoint mechanism is a general contradiction handling facility. Unlike other knowledge representation systems, when a contradiction is reached the reasons for the contradiction can be analyzed by the reduction mechanism without having to resort to a backtracking mechanism. The viewpoint mechanism is the heart of the problem solving support paradigm. This paradigm is an alternative to the classical view of problem solving in AI. Office workers are supported using the problem solving support paradigm. 16 references.

  11. Embedding Complementarity in HCI Methods and Techniques

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded in the tec......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...... the HCI paradigm in system development....

  12. Embedded Fiber Optic Sensors for Integral Armor

    National Research Council Canada - National Science Library

    Fink, Bruce

    2000-01-01

    This report describes the work performed with Production Products Manufacturing & Sales (PPMS), Inc., under the "Liquid Molded Composite Armor Smart Structures Using Embedded Sensors" Small Business Innovative Research...

  13. Graphical Model Debugger Framework for Embedded Systems

    DEFF Research Database (Denmark)

    Zeng, Kebin

    2010-01-01

    Model Driven Software Development has offered a faster way to design and implement embedded real-time software by moving the design to a model level, and by transforming models to code. However, the testing of embedded systems has remained at the code level. This paper presents a Graphical Model...... Debugger Framework, providing an auxiliary avenue of analysis of system models at runtime by executing generated code and updating models synchronously, which allows embedded developers to focus on the model level. With the model debugger, embedded developers can graphically test their design model...

  14. Multichannel analyzer embedded in FPGA

    International Nuclear Information System (INIS)

    Garcia D, A.; Hernandez D, V. M.; Vega C, H. R.; Ordaz G, O. O.; Bravo M, I.

    2017-10-01

    Ionizing radiation has different applications, so it is a very significant and useful tool, which in turn can be dangerous for living beings if they are exposed to uncontrolled doses. However, due to its characteristics, it cannot be perceived by any of the senses of the human being, so that in order to know the presence of it, radiation detectors and additional devices are required to quantify and classify it. A multichannel analyzer is responsible for separating the different pulse heights that are generated in the detectors, in a certain number of channels; according to the number of bits of the analog to digital converter. The objective of the work was to design and implement a multichannel analyzer and its associated virtual instrument, for nuclear spectrometry. The components of the multichannel analyzer were created in VHDL hardware description language and packaged in the Xilinx Vivado design suite, making use of resources such as the ARM processing core that the System on Chip Zynq contains and the virtual instrument was developed on the LabView programming graphics platform. The first phase was to design the hardware architecture to be embedded in the FPGA and for the internal control of the multichannel analyzer the application was generated for the ARM processor in C language. For the second phase, the virtual instrument was developed for the management, control and visualization of the results. The data obtained as a result of the development of the system were observed graphically in a histogram showing the spectrum measured. The design of the multichannel analyzer embedded in FPGA was tested with two different radiation detection systems (hyper-pure germanium and scintillation) which allowed determining that the spectra obtained are similar in comparison with the commercial multichannel analyzers. (Author)

  15. Capacity-building and Participatory Research Development of a Community-based Nutrition and Exercise Lifestyle Intervention Program (NELIP for Pregnant and Postpartum Aboriginal Women:Information Gathered from Talking Circles.

    Directory of Open Access Journals (Sweden)

    Katie Big-Canoe

    2011-05-01

    Full Text Available Objectives were to gather information from Talking Circles of Aboriginal women who participated in a maternal Nutrition and Exercise Lifestyle Intervention Program (NELIP to identify strategies to bring NELIP into the community. Twelve First Nations women participated. Several main themes were identified regarding health: balance, knowledge/education and time management. Benefits of the NELIP were improvement in health, stamina, stress, and a healthy baby, no gestational diabetes and a successful home birth, with social support as an important contributing factor for success. Suggestions for improvement for the NELIP included group walking, and incorporating more traditional foods into the meal plan. The information gathered is the first step in determining strategies using participatory research and capacity-building to develop a community-based NELIP for pregnant Aboriginal women.

  16. Informe

    Directory of Open Access Journals (Sweden)

    Egon Lichetenberger

    1950-10-01

    Full Text Available Informe del doctor Egon Lichetenberger ante el Consejo Directivo de la Facultad, sobre el  curso de especialización en Anatomía Patológica patrocinado por la Kellogg Foundation (Departamento de Patología

  17. The Battle River Project: school division implementation of the health-promoting schools approach: assessment for learning: using student health and school capacity measures to inform action and direct policy in a local school district.

    Science.gov (United States)

    Gleddie, Douglas L; Hobin, Erin P

    2011-03-01

    The Battle River Project (BRP) is a school division-level intervention in rural Alberta, Canada, built upon the health-promoting schools approach to health promotion. Using self-reported school and student-level data from administrators and students, the central aim of the BRP is to examine: 'How can the school environment and health behaviours (healthy eating, physical activity and mental wellness) of children and youth be improved when a health-promoting schools model, the Ever Active Schools program, is implemented with school division support?' Evidence used to inform school level changes included students' demographic, behavioral, and psychosocial variables linked to school environment data, comprised of school demographics and administrator-assessed quality of policies, facilities, and programs related to physical activity. Each participating school and the division were provided with a tailored report of their schools' results to reflect, plan and implement for positive health behavior change. The main lesson learned was that sharing school-specific evidence can operate as a catalyst for embedding health promoting policy and practices within the school and division culture.

  18. Strategic analytics: towards fully embedding evidence in healthcare decision-making.

    Science.gov (United States)

    Garay, Jason; Cartagena, Rosario; Esensoy, Ali Vahit; Handa, Kiren; Kane, Eli; Kaw, Neal; Sadat, Somayeh

    2015-01-01

    Cancer Care Ontario (CCO) has implemented multiple information technology solutions and collected health-system data to support its programs. There is now an opportunity to leverage these data and perform advanced end-to-end analytics that inform decisions around improving health-system performance. In 2014, CCO engaged in an extensive assessment of its current data capacity and capability, with the intent to drive increased use of data for evidence-based decision-making. The breadth and volume of data at CCO uniquely places the organization to contribute to not only system-wide operational reporting, but more advanced modelling of current and future state system management and planning. In 2012, CCO established a strategic analytics practice to assist the agency's programs contextualize and inform key business decisions and to provide support through innovative predictive analytics solutions. This paper describes the organizational structure, services and supporting operations that have enabled progress to date, and discusses the next steps towards the vision of embedding evidence fully into healthcare decision-making. Copyright © 2014 Longwoods Publishing.

  19. Adaptive GDDA-BLAST: fast and efficient algorithm for protein sequence embedding.

    Directory of Open Access Journals (Sweden)

    Yoojin Hong

    2010-10-01

    Full Text Available A major computational challenge in the genomic era is annotating structure/function to the vast quantities of sequence information that is now available. This problem is illustrated by the fact that most proteins lack comprehensive annotations, even when experimental evidence exists. We previously theorized that embedded-alignment profiles (simply "alignment profiles" hereafter provide a quantitative method that is capable of relating the structural and functional properties of proteins, as well as their evolutionary relationships. A key feature of alignment profiles lies in the interoperability of data format (e.g., alignment information, physio-chemical information, genomic information, etc.. Indeed, we have demonstrated that the Position Specific Scoring Matrices (PSSMs are an informative M-dimension that is scored by quantitatively measuring the embedded or unmodified sequence alignments. Moreover, the information obtained from these alignments is informative, and remains so even in the "twilight zone" of sequence similarity (<25% identity. Although our previous embedding strategy was powerful, it suffered from contaminating alignments (embedded AND unmodified and high computational costs. Herein, we describe the logic and algorithmic process for a heuristic embedding strategy named "Adaptive GDDA-BLAST." Adaptive GDDA-BLAST is, on average, up to 19 times faster than, but has similar sensitivity to our previous method. Further, data are provided to demonstrate the benefits of embedded-alignment measurements in terms of detecting structural homology in highly divergent protein sequences and isolating secondary structural elements of transmembrane and ankyrin-repeat domains. Together, these advances allow further exploration of the embedded alignment data space within sufficiently large data sets to eventually induce relevant statistical inferences. We show that sequence embedding could serve as one of the vehicles for measurement of low

  20. Multithreading for Embedded Reconfigurable Multicore Systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  1. Multithreading for embedded reconfigurable multicore systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  2. TTCN-3 for distributed testing embedded systems

    NARCIS (Netherlands)

    Blom, S.C.C.; Deiß, T.; Ioustinova, N.; Kontio, A.; Pol, van de J.C.; Rennoch, A.; Sidorova, N.; Virbitskaite, I.; Voronkov, A.

    2007-01-01

    Abstract. TTCN-3 is a standardized language for specifying and executing test suites that is particularly popular for testing embedded systems. Prior to testing embedded software in a target environment, the software is usually tested in the host environment. Executing in the host environment often

  3. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems.......This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  4. Teaching Embedded System Concepts for Technological Literacy

    Science.gov (United States)

    Winzker, M.; Schwandt, A.

    2011-01-01

    A basic understanding of technology is recognized as important knowledge even for students not connected with engineering and computer science. This paper shows that embedded system concepts can be taught in a technological literacy course. An embedded system teaching block that has been used in an electronics module for non-engineers is…

  5. Embedding methods for phi4-interaction

    International Nuclear Information System (INIS)

    Hanckowiak, J.

    1985-01-01

    The idea of embedding a given theory in a class of similar theories is applied to quantum field theory in the case of phi 4 -interaction to derive different equations for the generating functional. The number of possible embeddings has been restricted by demanding that for the defined projections of the generating functional a closed system of equations be obtained

  6. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  7. Heterogeneous Embedded Real-Time Systems Environment

    Science.gov (United States)

    2003-12-01

    AFRL-IF-RS-TR-2003-290 Final Technical Report December 2003 HETEROGENEOUS EMBEDDED REAL - TIME SYSTEMS ENVIRONMENT Integrated...HETEROGENEOUS EMBEDDED REAL - TIME SYSTEMS ENVIRONMENT 6. AUTHOR(S) Cosmo Castellano and James Graham 5. FUNDING NUMBERS C - F30602-97-C-0259

  8. Embedded Systems Design with 8051 Microcontrollers

    DEFF Research Database (Denmark)

    Karakahayov, Zdravko; Winther, Ole; Christensen, Knud Smed

    Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator.......Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator....

  9. Value Relevance of Embedded Value and IFRS 4 Insurance Contracts

    OpenAIRE

    Rebecca Chung-Fern Wu; Audrey Wen-Hsin Hsu

    2011-01-01

    In light of the recent exodus of foreign insurers from Taiwan and the local insurers’ outcries against the International Financial Reporting Standard (IFRS) 4 Insurance Contracts, we examine the value relevance of financial statements for life insurance firms, with particular interests to the embedded value (EV) disclosure. We find that the EV of equity has an incremental information role for book value of equity, which indicates that the accounting mismatching problem in the insurance indust...

  10. Absorptive capacity and smart companies

    Directory of Open Access Journals (Sweden)

    Patricia Moro González

    2014-12-01

    Full Text Available Purpose: The current competitive environment is substantially modifying the organizations’ learning processes due to a global increase of available information allowing this to be transformed into knowledge. This opportunity has been exploited since the nineties by the tools of “Business Analytics” and “Business Intelligence” but, nevertheless, being integrated in the study of new organizational capacities engaged in the process of creating intelligence inside organizations is still an outstanding task. The review of the concept of absorptive capacity and a detailed study from the perspective of this new reality will be the main objective of study of this paper.Design/methodology/approach: By comparing classical absorptive capacity and absorptive capacity from the point of view of information management tools in each one of the three stages of the organizational learning cycle, some gaps of the former are overcome/fulfilled. The academic/bibliographical references provided in this paper have been obtained from ISI web of knowledge, Scopus and Dialnet data bases, supporting the state of affairs on absorptive capacity and thereafter filtering by "Business Intelligence" and "Business Analytics". Specialized websites and Business Schools` Publications there have also been included, crowning the content on information management tools used that are currently used in the strategic consulting.Findings: Our contribution to the literature is the development of "smart absorptive capacity". This is a new capacity emerging from the reformulation of the classical concept of absorptive capacity wherein some aspects of its definition that might have been omitted are emphasized. The result of this new approach is the creation of a new Theoretical Model of Organizational Intelligence, which aims to explain, within the framework of the Resources and Capabilities Theory, the competitive advantage achieved by the so-called smart companies

  11. Building adaptive capacity in Assam

    Directory of Open Access Journals (Sweden)

    Soumyadeep Banerjee

    2015-05-01

    Full Text Available A starting point for adapting to longer-term climate change could be adaptation to short-term climate variability and extreme events. Making more informed choices about the use of remittances can enhance the adaptive capacity of remittance-receiving households.

  12. Hardware standardization for embedded systems

    International Nuclear Information System (INIS)

    Sharma, M.K.; Kalra, Mohit; Patil, M.B.; Mohanty, Ashutos; Ganesh, G.; Biswas, B.B.

    2010-01-01

    Reactor Control Division (RCnD) has been one of the main designers of safety and safety related systems for power reactors. These systems have been built using in-house developed hardware. Since the present set of hardware was designed long ago, a need was felt to design a new family of hardware boards. A Working Group on Electronics Hardware Standardization (WG-EHS) was formed with an objective to develop a family of boards, which is general purpose enough to meet the requirements of the system designers/end users. RCnD undertook the responsibility of design, fabrication and testing of boards for embedded systems. VME and a proprietary I/O bus were selected as the two system buses. The boards have been designed based on present day technology and components. The intelligence of these boards has been implemented on FPGA/CPLD using VHDL. This paper outlines the various boards that have been developed with a brief description. (author)

  13. Field tests on partial embedment effects (embedment effect tests on soil-structure interaction)

    International Nuclear Information System (INIS)

    Kurimoto, O.; Tsunoda, T.; Inoue, T.; Izumi, M.; Kusakabe, K.; Akino, K.

    1993-01-01

    A series of Model Tests of Embedment Effect on Reactor Buildings has been carried out by the Nuclear Power Engineering Corporation (NUPEC), under the sponsorship of the Ministry of International Trade and lndustry (MITI) of Japan. The nuclear reactor buildings are partially embedded due to conditions for the construction or building arrangement in Japan. It is necessary to verify the partial embedment effects by experiments and analytical studies in order to incorporate the effects in the seismic design. Forced vibration tests, therefore, were performed using a model with several types of embedment. Correlated simulation analyses were also performed and the characteristics of partial embedment effects on soil-structure interaction were evaluated. (author)

  14. The Mekong Fish Network: expanding the capacity of the people and institutions of the Mekong River Basin to share information and conduct standardized fisheries monitoring

    Science.gov (United States)

    Patricio, Harmony C.; Ainsley, Shaara M.; Andersen, Matthew E.; Beeman, John W.; Hewitt, David A.

    2012-01-01

    The Mekong River is one of the most biologically diverse rivers in the world, and it supports the most productive freshwater fisheries in the world. Millions of people in the Lower Mekong River Basin (LMB) countries of the Union of Myanmar (Burma), Lao People’s Democratic Republic, the Kingdom of Thailand, the Kingdom of Cambodia, and the Socialist Republic of Vietnam rely on the fisheries of the basin to provide a source of protein. The Mekong Fish Network Workshop was convened in Phnom Penh, Cambodia, in February 2012 to discuss the potential for coordinating fisheries monitoring among nations and the utility of establishing standard methods for short- and long-term monitoring and data sharing throughout the LMB. The concept for this network developed out of a frequently cited need for fisheries researchers in the LMB to share their knowledge with other scientists and decisionmakers. A fish monitoring network could be a valuable forum for researchers to exchange ideas, store data, or access general information regarding fisheries studies in the LMB region. At the workshop, representatives from governments, nongovernmental organizations, and universities, as well as participating foreign technical experts, cited a great need for more international cooperation and technical support among them. Given the limited staff and resources of many institutions in the LMB, the success of the proposed network would depend on whether it could offer tools that would provide benefits to network participants. A potential tool discussed at the workshop was a user-friendly, Web-accessible portal and database that could help streamline data entry and storage at the institutional level, as well as facilitate communication and data sharing among institutions. The workshop provided a consensus to establish pilot standardized data collection and database efforts that will be further reviewed by the workshop participants. Overall, workshop participants agreed that this is the type of

  15. Maximizing the optical network capacity.

    Science.gov (United States)

    Bayvel, Polina; Maher, Robert; Xu, Tianhua; Liga, Gabriele; Shevchenko, Nikita A; Lavery, Domaniç; Alvarado, Alex; Killey, Robert I

    2016-03-06

    Most of the digital data transmitted are carried by optical fibres, forming the great part of the national and international communication infrastructure. The information-carrying capacity of these networks has increased vastly over the past decades through the introduction of wavelength division multiplexing, advanced modulation formats, digital signal processing and improved optical fibre and amplifier technology. These developments sparked the communication revolution and the growth of the Internet, and have created an illusion of infinite capacity being available. But as the volume of data continues to increase, is there a limit to the capacity of an optical fibre communication channel? The optical fibre channel is nonlinear, and the intensity-dependent Kerr nonlinearity limit has been suggested as a fundamental limit to optical fibre capacity. Current research is focused on whether this is the case, and on linear and nonlinear techniques, both optical and electronic, to understand, unlock and maximize the capacity of optical communications in the nonlinear regime. This paper describes some of them and discusses future prospects for success in the quest for capacity. © 2016 The Authors.

  16. The access of political representatives to information and the new laws on transparency and access to public information. In particular, their capacity to file claims with the transparency authorities

    Directory of Open Access Journals (Sweden)

    Emilio Guichot Reina

    2017-11-01

    Full Text Available The new public independent authorities in charge of access to information’s claims have adopted conflicting positions on the rules applicable to requests for information made by political representatives and on their own competence to hear complaints they may raise. The right of access to the information of the political representatives cannot have a smaller scope in its substantive, procedural and guarantees content than the one that the new regulation on transparency and access to the information recognizes to any person. The case law of the Supreme Court has consistently affirmed this. It would contribute to legal certainty if this criterion was followed by every new public independent authorities and it was expressly established by a future legislative reform.

  17. Development and characterization of silicone embedded distributed piezoelectric sensors for contact detection

    International Nuclear Information System (INIS)

    Acer, Merve; Salerno, Marco; Paik, Jamie; Agbeviade, Kossi

    2015-01-01

    Tactile sensing transfers complex interactive information in a most intuitive sense. Such a populated set of data from the environment and human interactions necessitates various degrees of information from both modular and distributed areas. A sensor design that could provide such types of feedback becomes challenging when the target component has a nonuniform, agile, high resolution, and soft surface. This paper presents an innovative methodology for the manufacture of novel soft sensors that have a high resolution sensing array due to the sensitivity of ceramic piezoelectric (PZT) elements, while uncommonly matched with the high stretchability of the soft substrate and electrode design. Further, they have a low profile and their transfer function is easy to tune by changing the material and thickness of the soft substrate in which the PZTs are embedded. In this manuscript, we present experimental results of the soft sensor prototypes: PZTs arranged in a four by two array form, measuring 1.5–2.3 mm in thickness, with the sensitivity in the range of 0.07–0.12 of the normalized signal change per unit force. We have conducted extensive tests under dynamic loading conditions that include impact, step and cyclic. The presented prototype's mechanical and functional capacities are promising for applications in biomedical systems where soft, wearable and high precision sensors are needed. (paper)

  18. Development and characterization of silicone embedded distributed piezoelectric sensors for contact detection

    Science.gov (United States)

    Acer, Merve; Salerno, Marco; Agbeviade, Kossi; Paik, Jamie

    2015-07-01

    Tactile sensing transfers complex interactive information in a most intuitive sense. Such a populated set of data from the environment and human interactions necessitates various degrees of information from both modular and distributed areas. A sensor design that could provide such types of feedback becomes challenging when the target component has a nonuniform, agile, high resolution, and soft surface. This paper presents an innovative methodology for the manufacture of novel soft sensors that have a high resolution sensing array due to the sensitivity of ceramic piezoelectric (PZT) elements, while uncommonly matched with the high stretchability of the soft substrate and electrode design. Further, they have a low profile and their transfer function is easy to tune by changing the material and thickness of the soft substrate in which the PZTs are embedded. In this manuscript, we present experimental results of the soft sensor prototypes: PZTs arranged in a four by two array form, measuring 1.5-2.3 mm in thickness, with the sensitivity in the range of 0.07-0.12 of the normalized signal change per unit force. We have conducted extensive tests under dynamic loading conditions that include impact, step and cyclic. The presented prototype's mechanical and functional capacities are promising for applications in biomedical systems where soft, wearable and high precision sensors are needed.

  19. In Vivo Microscopy Reveals Extensive Embedding of Capillaries within the Sarcolemma of Skeletal Muscle Fibers

    Science.gov (United States)

    Glancy, Brian; Hsu, Li-Yueh; Dao, Lam; Bakalar, Matthew; French, Stephanie; Chess, David J.; Taylor, Joni L.; Picard, Martin; Aponte, Angel; Daniels, Mathew P.; Esfahani, Shervin; Cushman, Samuel; Balaban, Robert S.

    2013-01-01

    Objective To provide insight into mitochondrial function in vivo, we evaluated the 3D spatial relationship between capillaries, mitochondria, and muscle fibers in live mice. Methods 3D volumes of in vivo murine Tibialis anterior muscles were imaged by multi-photon microscopy (MPM). Muscle fiber type, mitochondrial distribution, number of capillaries, and capillary-to-fiber contact were assessed. The role of myoglobin-facilitated diffusion was examined in myoglobin knockout mice. Distribution of GLUT4 was also evaluated in the context of the capillary and mitochondrial network. Results MPM revealed that 43.6 ± 3.3% of oxidative fiber capillaries had ≥ 50% of their circumference embedded in a groove in the sarcolemma, in vivo. Embedded capillaries were tightly associated with dense mitochondrial populations lateral to capillary grooves and nearly absent below the groove. Mitochondrial distribution, number of embedded capillaries, and capillary-to-fiber contact were proportional to fiber oxidative capacity and unaffected by myoglobin knockout. GLUT4 did not preferentially localize to embedded capillaries. Conclusions Embedding capillaries in the sarcolemma may provide a regulatory mechanism to optimize delivery of oxygen to heterogeneous groups of muscle fibers. We hypothesize that mitochondria locate to paravascular regions due to myofibril voids created by embedded capillaries, not to enhance the delivery of oxygen to the mitochondria. PMID:25279425

  20. Total iron binding capacity

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/003489.htm Total iron binding capacity To use the sharing features on this page, please enable JavaScript. Total iron binding capacity (TIBC) is a blood test to ...

  1. Entrepreneurial networks as culturally embedded phenomena

    Directory of Open Access Journals (Sweden)

    Vlatka Skokic

    2015-06-01

    Full Text Available Entrepreneurship research concerning networks has largely focused on network structure, content and governance. We believe that further research is required in order to gain a richer understanding of why specific network forms and types originated. The purpose of this paper is to explore the existence, importance, values and meanings of both the informal and formal networks and networking behaviours of small-scale hotel owner-managers embedded in the socio-economic context of Croatia. In order to gain richer and more detailed understanding of entrepreneurial networks and to understand the influence of socio-economic setting on entrepreneurial networking, we have employed qualitative, in-depth study with small hotel owners. Results suggest that entrepreneurs do not establish strong personal and firm-to-firm ties, but rather focus on formal associations. Reported findings identify socio-cultural factors apparently unique to the context of former socialist economy which have the potential to explain the reported networking behaviour. The adopted research approach brings another dimension to existing theoretical underpinnings, which can encourage researchers to extend or revise theories with new contextual variables.

  2. Air capacity for Sydney

    OpenAIRE

    Forsyth, Peter

    2013-01-01

    Like most large cities, Sydney has an airport problem. Demand is increasing faster than supply, and additional capacity will be needed if costly rationing, and delays, are to be avoided. However, compared to many cities, the problems facing Sydney are modest. At the moment, demand is only just exceeding capacity. There is a good chance that the available capacity will be rationed efficiently. Options for expanding capacity are being evaluated well. There may be problems in the future- poor op...

  3. Responsibility and Capacities

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2014-01-01

    That responsible moral agency presupposes certain mental capacities, constitutes a widely accepted view among theorists. Moreover, it is often assumed that degrees in the development of the relevant capacities co-vary with degrees of responsibility. In this article it is argued that, the move from...... the view that responsibility requires certain mental capacities to the position that degrees of responsibility co-vary with degrees of the development of the mental capacities, is premature....

  4. Secure smart embedded devices, platforms and applications

    CERN Document Server

    Markantonakis, Konstantinos

    2013-01-01

    New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and consider

  5. Two diverse models of embedding class one

    Science.gov (United States)

    Kuhfittig, Peter K. F.

    2018-05-01

    Embedding theorems have continued to be a topic of interest in the general theory of relativity since these help connect the classical theory to higher-dimensional manifolds. This paper deals with spacetimes of embedding class one, i.e., spacetimes that can be embedded in a five-dimensional flat spacetime. These ideas are applied to two diverse models, a complete solution for a charged wormhole admitting a one-parameter group of conformal motions and a new model to explain the flat rotation curves in spiral galaxies without the need for dark matter.

  6. The art of designing embedded systems

    CERN Document Server

    Ganssle, Jack G

    2000-01-01

    Art of Designing Embedded Systems is apart primer and part reference, aimed at practicing embedded engineers, whether working on the code or the hardware design. Embedded systems suffer from a chaotic, ad hoc development process. This books lays out a very simple seven-step plan to get firmware development under control. There are no formal methodologies to master; the ideas are immediately useful. Most designers are unaware that code complexity grows faster than code size. This book shows a number of ways to linearize the complexity/size curve and get products out faster

  7. Embedded Solenoid Transformer for Power Conversion

    DEFF Research Database (Denmark)

    2015-01-01

    A resonant power converter for operation in the radio frequency range, preferably in the VHF, comprises at least one PCB-embedded transformer. The transformer is configured for radio frequency operation and comprises a printed circuit board defining a horizontal plane, the printed circuit board...... comprising at least two horizontal conductive layers separated by an isolating layer, a first embedded solenoid forming a primary winding of the transformer and a second embedded solenoid being arranged parallel to the first solenoid and forming a secondary winding of the transformer, wherein the first...

  8. Embedding health policy and systems research into decision-making processes in low- and middle-income countries.

    Science.gov (United States)

    Koon, Adam D; Rao, Krishna D; Tran, Nhan T; Ghaffar, Abdul

    2013-08-08

    Attention is increasingly directed to bridging the gap between the production of knowledge and its use for health decision-making in low- and middle-income countries (LMICs). An important and underdeveloped area of health policy and systems research (HPSR) is the organization of this process. Drawing from an interdisciplinary conception of embeddedness, a literature review was conducted to identify examples of embedded HPSR used to inform decision-making in LMICs. The results of the literature review were organized according to the World Health Organization's Building Blocks Framework. Next, a conceptual model was created to illustrate the arrangement of organizations that produce embedded HPSR and the characteristics that facilitate its uptake into the arena of decision-making. We found that multiple forces converge to create context-specific pathways through which evidence enters into decision-making. Depending on the decision under consideration, the literature indicates that decision-makers may call upon an intricate combination of actors for sourcing HPSR. While proximity to decision-making does have advantages, it is not the position of the organization within the network, but rather the qualities the organization possesses, that enable it to be embedded. Our findings suggest that four qualities influence embeddedness: reputation, capacity, quality of connections to decision-makers, and quantity of connections to decision-makers and others. In addition to this, the policy environment (e.g. the presence of legislation governing the use of HPSR, presence of strong civil society, etc.) strongly influences uptake. Through this conceptual model, we can understand which conditions are likely to enhance uptake of HPSR in LMIC health systems. This raises several important considerations for decision-makers and researchers about the arrangement and interaction of evidence-generating organizations in health systems.

  9. CDMA systems capacity engineering

    CERN Document Server

    Kim, Kiseon

    2004-01-01

    This new hands-on resource tackles capacity planning and engineering issues that are crucial to optimizing wireless communication systems performance. Going beyond the system physical level and investigating CDMA system capacity at the service level, this volume is the single-source for engineering and analyzing systems capacity and resources.

  10. PAYMENT CAPACITY SENSITIVITY FACTORS

    Directory of Open Access Journals (Sweden)

    Daniel BRÎNDESCU – OLARIU

    2014-11-01

    The results of the study facilitate the determination and classification of the main sensitivity factors for the payment capacity at sample level, the establishment of general benchmarks for the payment capacity (as no such benchmarks currently exist in the Romanian literature and the identification of the mechanisms through which the variation of different factors impacts the payment capacity.

  11. AdS2 models in an embedding superspace

    International Nuclear Information System (INIS)

    McKeon, D.G.C.; Sherry, T.N.

    2003-01-01

    An embedding superspace, whose bosonic part is the flat (2+1)-dimensional embedding space for AdS 2 , is introduced. Superfields and several supersymmetric models are examined in the embedded AdS 2 superspace

  12. Visual content highlighting via automatic extraction of embedded captions on MPEG compressed video

    Science.gov (United States)

    Yeo, Boon-Lock; Liu, Bede

    1996-03-01

    Embedded captions in TV programs such as news broadcasts, documentaries and coverage of sports events provide important information on the underlying events. In digital video libraries, such captions represent a highly condensed form of key information on the contents of the video. In this paper we propose a scheme to automatically detect the presence of captions embedded in video frames. The proposed method operates on reduced image sequences which are efficiently reconstructed from compressed MPEG video and thus does not require full frame decompression. The detection, extraction and analysis of embedded captions help to capture the highlights of visual contents in video documents for better organization of video, to present succinctly the important messages embedded in the images, and to facilitate browsing, searching and retrieval of relevant clips.

  13. Wavelet-based audio embedding and audio/video compression

    Science.gov (United States)

    Mendenhall, Michael J.; Claypoole, Roger L., Jr.

    2001-12-01

    Watermarking, traditionally used for copyright protection, is used in a new and exciting way. An efficient wavelet-based watermarking technique embeds audio information into a video signal. Several effective compression techniques are applied to compress the resulting audio/video signal in an embedded fashion. This wavelet-based compression algorithm incorporates bit-plane coding, index coding, and Huffman coding. To demonstrate the potential of this audio embedding and audio/video compression algorithm, we embed an audio signal into a video signal and then compress. Results show that overall compression rates of 15:1 can be achieved. The video signal is reconstructed with a median PSNR of nearly 33 dB. Finally, the audio signal is extracted from the compressed audio/video signal without error.

  14. Real-time depth processing for embedded platforms

    Science.gov (United States)

    Rahnama, Oscar; Makarov, Aleksej; Torr, Philip

    2017-05-01

    Obtaining depth information of a scene is an important requirement in many computer-vision and robotics applications. For embedded platforms, passive stereo systems have many advantages over their active counterparts (i.e. LiDAR, Infrared). They are power efficient, cheap, robust to lighting conditions and inherently synchronized to the RGB images of the scene. However, stereo depth estimation is a computationally expensive task that operates over large amounts of data. For embedded applications which are often constrained by power consumption, obtaining accurate results in real-time is a challenge. We demonstrate a computationally and memory efficient implementation of a stereo block-matching algorithm in FPGA. The computational core achieves a throughput of 577 fps at standard VGA resolution whilst consuming less than 3 Watts of power. The data is processed using an in-stream approach that minimizes memory-access bottlenecks and best matches the raster scan readout of modern digital image sensors.

  15. Testing the Predictions of the Central Capacity Sharing Model

    Science.gov (United States)

    Tombu, Michael; Jolicoeur, Pierre

    2005-01-01

    The divergent predictions of 2 models of dual-task performance are investigated. The central bottleneck and central capacity sharing models argue that a central stage of information processing is capacity limited, whereas stages before and after are capacity free. The models disagree about the nature of this central capacity limitation. The…

  16. Developing Evaluation and Communication Capacity in Information ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    It will result in a trained cadre of regional mentors who are able to facilitate advanced methodologies in both evaluation and communications. Participating flagship project teams will develop their evaluation and communication skills, and gain opportunities for policy and practice change. More will be learned about practical ...

  17. Developing Evaluation and Communication Capacity in Information ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Evaluation and communication are essential to ensuring that research has an impact. The two fields share common elements: the importance of engaging users from the beginning, the significance of ... New Economy Development Group, Inc.

  18. Strengthening Information Society Research Capacity Alliance III ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    What are the benefits, costs, and risks of openness in developing countries? ... by greater transparency and collaboration made possible through digital technologies such ... Existing research is of limited use to policymakers and practitioners.

  19. Embedded Face Detection and Recognition

    Directory of Open Access Journals (Sweden)

    Göksel Günlü

    2012-10-01

    Full Text Available The need to increase security in open or public spaces has in turn given rise to the requirement to monitor these spaces and analyse those images on-site and on-time. At this point, the use of smart cameras – of which the popularity has been increasing – is one step ahead. With sensors and Digital Signal Processors (DSPs, smart cameras generate ad hoc results by analysing the numeric images transmitted from the sensor by means of a variety of image-processing algorithms. Since the images are not transmitted to a distance processing unit but rather are processed inside the camera, it does not necessitate high-bandwidth networks or high processor powered systems; it can instantaneously decide on the required access. Nonetheless, on account of restricted memory, processing power and overall power, image processing algorithms need to be developed and optimized for embedded processors. Among these algorithms, one of the most important is for face detection and recognition. A number of face detection and recognition methods have been proposed recently and many of these methods have been tested on general-purpose processors. In smart cameras – which are real-life applications of such methods – the widest use is on DSPs. In the present study, the Viola-Jones face detection method – which was reported to run faster on PCs – was optimized for DSPs; the face recognition method was combined with the developed sub-region and mask-based DCT (Discrete Cosine Transform. As the employed DSP is a fixed-point processor, the processes were performed with integers insofar as it was possible. To enable face recognition, the image was divided into sub-regions and from each sub-region the robust coefficients against disruptive elements – like face expression, illumination, etc. – were selected as the features. The discrimination of the selected features was enhanced via LDA (Linear Discriminant Analysis and then employed for recognition. Thanks to its

  20. Liquid-phase plasma synthesis of silicon quantum dots embedded in carbon matrix for lithium battery anodes

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Ying [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China); College of Chemistry and Chemical Engineering, Bohai University, Jinzhou 121000 (China); Yu, Hang; Li, Haitao; Ming, Hai; Pan, Keming; Huang, Hui [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China); Liu, Yang, E-mail: yangl@suda.edu.cn [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China); Kang, Zhenhui, E-mail: zhkang@suda.edu.cn [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China)

    2013-10-15

    Graphical abstract: - Highlights: • Silicon quantum dots embedded in carbon matrix (SiQDs/C) were fabricated. • SiQDs/C exhibits excellent battery performance as anode materials with high specific capacity. • The good performance was attributed to the marriage of small sized SiQDs and carbon. - Abstract: Silicon quantum dots embedded in carbon matrix (SiQDs/C) nanocomposites were prepared by a novel liquid-phase plasma assisted synthetic process. The SiQDs/C nanocomposites were demonstrated to show high specific capacity, good cycling life and high coulmbic efficiency as anode materials for lithium-ion battery.

  1. Liquid-phase plasma synthesis of silicon quantum dots embedded in carbon matrix for lithium battery anodes

    International Nuclear Information System (INIS)

    Wei, Ying; Yu, Hang; Li, Haitao; Ming, Hai; Pan, Keming; Huang, Hui; Liu, Yang; Kang, Zhenhui

    2013-01-01

    Graphical abstract: - Highlights: • Silicon quantum dots embedded in carbon matrix (SiQDs/C) were fabricated. • SiQDs/C exhibits excellent battery performance as anode materials with high specific capacity. • The good performance was attributed to the marriage of small sized SiQDs and carbon. - Abstract: Silicon quantum dots embedded in carbon matrix (SiQDs/C) nanocomposites were prepared by a novel liquid-phase plasma assisted synthetic process. The SiQDs/C nanocomposites were demonstrated to show high specific capacity, good cycling life and high coulmbic efficiency as anode materials for lithium-ion battery

  2. Multidimensional artificial field embedding with spatial sensitivity

    CSIR Research Space (South Africa)

    Lunga, D

    2013-06-01

    Full Text Available Multidimensional embedding is a technique useful for characterizing spectral signature relations in hyperspectral images. However, such images consist of disjoint similar spectral classes that are spatially sensitive, thus presenting challenges...

  3. Costs and benefits of embedded generation

    International Nuclear Information System (INIS)

    1999-11-01

    This project sought to evaluate the costs and benefits of embedded generation in the light of the UK government's consultation paper on the future of green generation, the government's aim to increase the levels of generation from renewable energy sources and cogeneration, the current Review of the Electricity Trading Arrangements, and the form of the Distribution Price Control. Definitions are given for embedded, centrally dispatched, and pooled generation, and licensed suppliers, and commercial and economic values. The commercial and economic value of embedded generation is examined in terms of generation prices, costs to electrical suppliers, losses (electrical, transmission, distribution), and effects on the national grid and distribution network. Diagrams showing the cost elements of trading through the Pool and the elements that are avoided by non-Pool embedded generator trading are presented

  4. Time-Scale Invariant Audio Data Embedding

    Directory of Open Access Journals (Sweden)

    Mansour Mohamed F

    2003-01-01

    Full Text Available We propose a novel algorithm for high-quality data embedding in audio. The algorithm is based on changing the relative length of the middle segment between two successive maximum and minimum peaks to embed data. Spline interpolation is used to change the lengths. To ensure smooth monotonic behavior between peaks, a hybrid orthogonal and nonorthogonal wavelet decomposition is used prior to data embedding. The possible data embedding rates are between 20 and 30 bps. However, for practical purposes, we use repetition codes, and the effective embedding data rate is around 5 bps. The algorithm is invariant after time-scale modification, time shift, and time cropping. It gives high-quality output and is robust to mp3 compression.

  5. Embedding Moodle into Ubiquitous Computing Environments

    NARCIS (Netherlands)

    Glahn, Christian; Specht, Marcus

    2010-01-01

    Glahn, C., & Specht, M. (2010). Embedding Moodle into Ubiquitous Computing Environments. In M. Montebello, et al. (Eds.), 9th World Conference on Mobile and Contextual Learning (MLearn2010) (pp. 100-107). October, 19-22, 2010, Valletta, Malta.

  6. Apparatuses And Systems For Embedded Thermoelectric Generators

    KAUST Repository

    Hussain, Muhammad M.

    2013-08-08

    An apparatus and a system for embedded thermoelectric generators are disclosed. In one embodiment, the apparatus is embedded in an interface where the ambient temperatures on two sides of the interface are different. In one embodiment, the apparatus is fabricated with the interface in integrity as a unitary piece. In one embodiment, the apparatus includes a first thermoelectric material embedded through the interface. The apparatus further includes a second thermoelectric material embedded through the interface. The first thermoelectric material is electrically coupled to the second thermoelectric material. In one embodiment, the apparatus further includes an output structure coupled to the first thermoelectric material and the second thermoelectric material and configured to output a voltage.

  7. Apparatuses And Systems For Embedded Thermoelectric Generators

    KAUST Repository

    Hussain, Muhammad M.; Inayat, Salman Bin; Smith, Casey Eben

    2013-01-01

    An apparatus and a system for embedded thermoelectric generators are disclosed. In one embodiment, the apparatus is embedded in an interface where the ambient temperatures on two sides of the interface are different. In one embodiment, the apparatus is fabricated with the interface in integrity as a unitary piece. In one embodiment, the apparatus includes a first thermoelectric material embedded through the interface. The apparatus further includes a second thermoelectric material embedded through the interface. The first thermoelectric material is electrically coupled to the second thermoelectric material. In one embodiment, the apparatus further includes an output structure coupled to the first thermoelectric material and the second thermoelectric material and configured to output a voltage.

  8. Embedded High Performance Scalable Computing Systems

    National Research Council Canada - National Science Library

    Ngo, David

    2003-01-01

    The Embedded High Performance Scalable Computing Systems (EHPSCS) program is a cooperative agreement between Sanders, A Lockheed Martin Company and DARPA that ran for three years, from Apr 1995 - Apr 1998...

  9. Embedded Lattice and Properties of Gram Matrix

    Directory of Open Access Journals (Sweden)

    Futa Yuichi

    2017-03-01

    Full Text Available In this article, we formalize in Mizar [14] the definition of embedding of lattice and its properties. We formally define an inner product on an embedded module. We also formalize properties of Gram matrix. We formally prove that an inverse of Gram matrix for a rational lattice exists. Lattice of Z-module is necessary for lattice problems, LLL (Lenstra, Lenstra and Lov´asz base reduction algorithm [16] and cryptographic systems with lattice [17].

  10. Embedded adhesive connection for laminated glass plates

    DEFF Research Database (Denmark)

    Hansen, Jens Zangenberg; Poulsen, S.H.; Bagger, A.

    2012-01-01

    The structural behavior of a new connection design, the embedded adhesive connection, used for laminated glass plates is investigated. The connection consists of an aluminum plate encapsulated in-between two adjacent triple layered laminated glass plates. Fastening between glass and aluminum...... usage in a design situation. The embedded connection shows promising potential as a future fastening system for load-carrying laminated glass plates....

  11. Operating system concepts for embedded multicores

    OpenAIRE

    Horst, Oliver; Schmidt, Adriaan

    2014-01-01

    Currently we can see an increasing adoption of multi-core platforms in the area of embedded systems. While these new hardware platforms offer the potential to satisfy the ever increasing demand for computational power, they pose considerable challenges with regard to software development. This affects the application software itself, but also the system design and architecture. Here, we address the consequences for operating system architecture in embedded systems. After dis-cussing current a...

  12. Capacity and optimal collusion attack channels for Gaussian fingerprinting games

    Science.gov (United States)

    Wang, Ying; Moulin, Pierre

    2007-02-01

    constraints. Under those constraints on the fingerprint embedder and the colluders, fingerprinting capacity is obtained as the solution of a mutual-information game involving probability density functions (pdf's) designed by the embedder and the colluders. We show that the optimal fingerprinting strategy is a Gaussian test channel where the fingerprinted signal is the sum of an attenuated version of the cover signal plus a Gaussian information-bearing noise, and the optimal collusion strategy is to average fingerprinted signals possessed by all the colluders and pass the averaged copy through a Gaussian test channel. The capacity result and the optimal strategies are the same for both the private and public games. In the former scenario, the original covertext is available to the decoder, while in the latter setup, the original covertext is available to the encoder but not to the decoder.

  13. "You're just one of the group when you're embedded": report from a mixed-method investigation of the research-embedded health librarian experience.

    Science.gov (United States)

    Greyson, Devon; Surette, Soleil; Dennett, Liz; Chatterley, Trish

    2013-10-01

    Embedded librarianship has received much attention in recent years. A model of embeddedness rarely discussed to date is that of research-embedded health librarians (REHLs). This study explores the characteristics of Canadian REHLs and the situations in which they are employed. The authors employed a sequential, mixed-method design. An online survey provided descriptive statistics about REHLs' positions and work experiences. This informed a series of focus group interviews that expanded upon the survey. Through constant comparison, we conducted qualitative descriptive analysis of the interviews. Based on twenty-nine survey responses and four group interviews, we created a portrait of a "typical" REHL and discovered themes relevant to REHL work. REHLs may identify more strongly as researchers than as librarians, with corresponding professional needs and rewards. REHLs value "belonging" to the research team, involvement in full project lifecycles, and in-depth relationships with nonlibrarian colleagues. Despite widely expressed job satisfaction, many REHLs struggle with isolation from library and information science peers and relative lack of job security. REHLs differ from non-embedded health librarians, as well as from other types of embedded librarians. REHLs' work also differs from just a decade or two ago, prior to widespread Internet access to digital resources. Given that research-embedded librarianship appears to be a distinct and growing subset of health librarianship, libraries, master's of library and information science programs, and professional associations will need to respond to the support and education needs of REHLs or risk losing them to the health research field.

  14. Strengthening our approaches to building capacity

    International Development Research Centre (IDRC) Digital Library (Canada)

    CCAA

    and capacity building mandate. A number of ... of CCAA capacity building: participatory action research (PAR) mentoring ... project, to ensure its application in planning, monitoring ... community volunteers who use climate information in emergency response ... has expertise in monitoring and evaluation, and the Department.

  15. Capacity building for sustainable energy development

    International Nuclear Information System (INIS)

    Rogner, Hans-Holger

    2006-01-01

    Capacity Building for Sustainable Energy Development - Mission: To build capacity in Member States (MS) for comprehensive energy system, economic and environmental analyses to assist in: - making informed policy decisions for sustainable energy development; - assessing the role of nuclear power; - understanding environmental and climate change issues related to energy production and use

  16. The effects of magnetic nanoparticles embedded with SA/PVA and pH on chemical-mechanical polishing wastewater and magnetic particle regeneration and recycle

    Directory of Open Access Journals (Sweden)

    Chung-Fu Huang

    2017-12-01

    Full Text Available Experiments were conducted using sodium alginate (SA and polyvinyl alcohol (PVA as embedded materials for Fe3O4 magnetic nanoparticles (MNPs. The materials provided excellent protection to the embedded MNPs in low-pH conditions. This study observed and compared the adsorption capacity of the unaltered and embedded MNPs. At pH 3 and without additional magnetic fields, the wastewater turbidity removal rate of the embedded MNPs reached a maximum of 95%, similar to that of the unaltered MNPs. Moreover, this study examined the recyclability and reusability of the unaltered and embedded MNPs and discovered that the embedded MNPs could be reused up to seven times. Overall, the use of SA/PVA prevented MNPs from disintegrating and contaminating the wastewater through the dissolution of Fe ions. SA and PVA also increased the reusability of the unaltered MNPs.

  17. Information, Information, Information

    Science.gov (United States)

    Pratt, John

    2013-01-01

    According to researchers at the University of Southern California (Washington Post, 2011), the world's storage capacity for digital data increased from 0.2 billion gigabytes in 1986 to 276 billion gigabytes by 2007 (at the same time analogue storage capacity increased from 2.6 to 18.9 billion gigabytes). This huge growth is often seen in…

  18. CESAR cost-efficient methods and processes for safety-relevant embedded systems

    CERN Document Server

    Wahl, Thomas

    2013-01-01

    The book summarizes the findings and contributions of the European ARTEMIS project, CESAR, for improving and enabling interoperability of methods, tools, and processes to meet the demands in embedded systems development across four domains - avionics, automotive, automation, and rail. The contributions give insight to an improved engineering and safety process life-cycle for the development of safety critical systems. They present new concept of engineering tools integration platform to improve the development of safety critical embedded systems and illustrate capacity of this framework for end-user instantiation to specific domain needs and processes. They also advance state-of-the-art in component-based development as well as component and system validation and verification, with tool support. And finally they describe industry relevant evaluated processes and methods especially designed for the embedded systems sector as well as easy adoptable common interoperability principles for software tool integratio...

  19. The Irony of the Capac Nan.

    Science.gov (United States)

    Johnson, Robert W.

    1992-01-01

    Presents information on the Capac Nan, the highway system of the Incas. Describes its use by the Spanish conquistadors in the destruction of the Incan empire. Includes suggested classroom uses for the article, a homework assignment, and discussion topics. (DK)

  20. Strengthening Agricultural Research Capacity for Viable Extension ...

    African Journals Online (AJOL)

    Strengthening Agricultural Research Capacity for Viable Extension Policies in Nigeria: An Exploration of Ricoeur's Hermeneutic Theory for Analysing Extension Research. ... Progressively more, researchers use hermeneutic philosophy to inform the conduct of interpretive research. Analogy between the philosophical ...

  1. Capacity planning and management

    OpenAIRE

    Boydell, Briony

    2011-01-01

    After reading this chapter you should be able to: • Define and measure capacity and appreciate the factors that influence it. • Assess the difficulties of matching capacity to demand. • Evaluate and apply the different strategies for matching capacity with demand in the short, medium and long term. • Analyse the impact of constraints and bottlenecks on a process and consider the Theory of Constraints. • Outline the different strategies available for both manufacturing and service operations. ...

  2. Runtime reconfiguration in networked embedded systems design and testing practices

    CERN Document Server

    Exarchakos, George

    2016-01-01

    This book focuses on the design and testing of large-scale, distributed signal processing systems, with a special emphasis on systems architecture, tooling and best practices. Architecture modeling, model checking, model-based evaluation and model-based design optimization occupy central roles. Target systems with resource constraints on processing, communication or energy supply require non-trivial methodologies to model their non-functional requirements, such as timeliness, robustness, lifetime and “evolution” capacity. Besides the theoretical foundations of the methodology, an engineering process and toolchain are described. Real-world cases illustrate the theory and practice tested by the authors in the course of the European project ARTEMIS DEMANES. The book can be used as a “cookbook” for designers and practitioners working with complex embedded systems like sensor networks for the structural integrity monitoring of steel bridges, and distributed micro-climate control systems for greenhouses and...

  3. The French capacity mechanism

    International Nuclear Information System (INIS)

    2014-01-01

    The French capacity mechanism has been design to ensure security of supply in the context of the energy transition. This energy transition challenges the electricity market design with several features: peak load growth, the development of renewables, demand response,... To ensure security of supply in this context, a capacity mechanism is being implemented in France. It is a market wide capacity obligation on electricity suppliers, based on market principles. Suppliers are responsible for forecasting their obligation, which corresponds to their contribution to winter peak load, and must procure enough capacity certificates to meet their obligations. Capacity certificates are granted to capacities through a certification process, which assesses their contribution to security of supply on the basis of availability commitments. This certification process is technology neutral and performance based, associated with controls and penalties in case of non compliance. Demand Side is fully integrated in the market, either through the reduction of suppliers' capacity obligation or direct participation after certification. In addition to the expected benefits in terms of security of supply, the French capacity market will foster the development of demand response. The participation of foreign capacities will require adaptations which are scheduled in a road-map, and could pave the way for further European integration of energy policies. (authors)

  4. Gaussian Embeddings for Collaborative Filtering

    OpenAIRE

    Dos Santos , Ludovic; Piwowarski , Benjamin; Gallinari , Patrick

    2017-01-01

    International audience; Most collaborative ltering systems, such as matrix factorization, use vector representations for items and users. Those representations are deterministic, and do not allow modeling the uncertainty of the learned representation, which can be useful when a user has a small number of rated items (cold start), or when there is connict-ing information about the behavior of a user or the ratings of an item. In this paper, we leverage recent works in learning Gaussian embeddi...

  5. Dynamic virtual optical network embedding in spectral and spatial domains over elastic optical networks with multicore fibers

    Science.gov (United States)

    Zhu, Ruijie; Zhao, Yongli; Yang, Hui; Tan, Yuanlong; Chen, Haoran; Zhang, Jie; Jue, Jason P.

    2016-08-01

    Network virtualization can eradicate the ossification of the infrastructure and stimulate innovation of new network architectures and applications. Elastic optical networks (EONs) are ideal substrate networks for provisioning flexible virtual optical network (VON) services. However, as network traffic continues to increase exponentially, the capacity of EONs will reach the physical limitation soon. To further increase network flexibility and capacity, the concept of EONs is extended into the spatial domain. How to map the VON onto substrate networks by thoroughly using the spectral and spatial resources is extremely important. This process is called VON embedding (VONE).Considering the two kinds of resources at the same time during the embedding process, we propose two VONE algorithms, the adjacent link embedding algorithm (ALEA) and the remote link embedding algorithm (RLEA). First, we introduce a model to solve the VONE problem. Then we design the embedding ability measurement of network elements. Based on the network elements' embedding ability, two VONE algorithms were proposed. Simulation results show that the proposed VONE algorithms could achieve better performance than the baseline algorithm in terms of blocking probability and revenue-to-cost ratio.

  6. Food consumption and waste and the embedded carbon, water and ecological footprints of households in China.

    Science.gov (United States)

    Song, Guobao; Li, Mingjing; Semakula, Henry Musoke; Zhang, Shushen

    2015-10-01

    Strategies for reducing food waste and developing sustainable diets require information about the impacts of consumption behavior and waste generation on climatic, water, and land resources. We quantified the carbon, water, and ecological footprints of 17,110 family members of Chinese households, covering 1935 types of foods, by combining survey data with available life-cycle assessment data sets. We also summarized the patterns of both food consumption and waste generation and analyzed the factors influencing the observed trends. The average person wasted (consumed) 16 (415) kg of food at home annually, equivalent to 40 (1080) kg CO2e, 18 (673) m(3), and 173 (4956) gm(2) for the carbon, water and ecological footprints, respectively. The generation of food waste was highly correlated with consumption for various food groups. For example, vegetables, rice, and wheat were consumed the most and accounted for the most waste. In addition to the three plant-derived food groups, pork and aquatic products also contributed greatly to embedded footprints. The data obtained in this study could be used for assessing national food security or the carrying capacity of resources. Copyright © 2015 Elsevier B.V. All rights reserved.

  7. Primal and dual approaches to fishing capacity

    DEFF Research Database (Denmark)

    Kerstens, Kristiaan; Vestergaard, Niels

    2013-01-01

    Application of primal non-parametric approaches to estimation of fishing capacity provides useful disaggregated information about fishing firm’s capacities utilizations. A potentially serious issue is that the estimated capacity utilization rates can be relatively low. This may call for reductions...... in the fishing fleet that are political impossible to defend. In this paper two modifications of the traditional approach are explored. First, non-convex technologies are introduced and it is shown how the primal non-parametric approach leads to different capacity utilization rates. Then capacity utilization...... measures using cost functions are specified for both convex and non-convex technologies. It is illustrated how the convexity assumption impacts capacity utilization rates and how this dual approach differs from the primal approach. Second, the effect of utilizing these different convex versus non...

  8. Semi-Supervised Tensor-Based Graph Embedding Learning and Its Application to Visual Discriminant Tracking.

    Science.gov (United States)

    Hu, Weiming; Gao, Jin; Xing, Junliang; Zhang, Chao; Maybank, Stephen

    2017-01-01

    An appearance model adaptable to changes in object appearance is critical in visual object tracking. In this paper, we treat an image patch as a two-order tensor which preserves the original image structure. We design two graphs for characterizing the intrinsic local geometrical structure of the tensor samples of the object and the background. Graph embedding is used to reduce the dimensions of the tensors while preserving the structure of the graphs. Then, a discriminant embedding space is constructed. We prove two propositions for finding the transformation matrices which are used to map the original tensor samples to the tensor-based graph embedding space. In order to encode more discriminant information in the embedding space, we propose a transfer-learning- based semi-supervised strategy to iteratively adjust the embedding space into which discriminative information obtained from earlier times is transferred. We apply the proposed semi-supervised tensor-based graph embedding learning algorithm to visual tracking. The new tracking algorithm captures an object's appearance characteristics during tracking and uses a particle filter to estimate the optimal object state. Experimental results on the CVPR 2013 benchmark dataset demonstrate the effectiveness of the proposed tracking algorithm.

  9. Quantum capacity of Pauli channels with memory

    International Nuclear Information System (INIS)

    Huang Peng; He Guangqiang; Lu Yuan; Zeng Guihua

    2011-01-01

    The amount of coherent quantum information that can be reliably transmitted down the memory Pauli channels with Markovian correlated noise is investigated. Two methods for evaluating the quantum capacity of the memory Pauli channels are proposed to try to trace the memory effect on the transmissions of quantum information. We show that the evaluation of quantum capacity can be reduced to the calculation of the initial memory state of each successive transmission. Furthermore, we derive quantum capacities of the memory phase flip channel, bit flip channel and bit-phase flip channel. Also, a lower bound of the quantum capacity of the memory depolarizing channel is obtained. An increase of the degree of memory of the channels has a positive effect on the increase of their quantum capacities.

  10. Embedded computer systems for control applications in EBR-II

    International Nuclear Information System (INIS)

    Carlson, R.B.; Start, S.E.

    1993-01-01

    The purpose of this paper is to describe the embedded computer systems approach taken at Experimental Breeder Reactor II (EBR-II) for non-safety related systems. The hardware and software structures for typical embedded systems are presented The embedded systems development process is described. Three examples are given which illustrate typical embedded computer applications in EBR-II

  11. Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications.

    Science.gov (United States)

    Loan, Nazir A; Parah, Shabir A; Sheikh, Javaid A; Akhoon, Jahangir A; Bhat, Ghulam M

    2017-09-01

    A high capacity and semi-reversible data hiding scheme based on Pixel Repetition Method (PRM) and hybrid edge detection for scalable medical images has been proposed in this paper. PRM has been used to scale up the small sized image (seed image) and hybrid edge detection ensures that no important edge information is missed. The scaled up version of seed image has been divided into 2×2 non overlapping blocks. In each block there is one seed pixel whose status decides the number of bits to be embedded in the remaining three pixels of that block. The Electronic Patient Record (EPR)/data have been embedded by using Least Significant and Intermediate Significant Bit Substitution (ISBS). The RC4 encryption has been used to add an additional security layer for embedded EPR/data. The proposed scheme has been tested for various medical and general images and compared with some state of art techniques in the field. The experimental results reveal that the proposed scheme besides being semi-reversible and computationally efficient is capable of handling high payload and as such can be used effectively for electronic healthcare applications. Copyright © 2017. Published by Elsevier Inc.

  12. Diverse Power Iteration Embeddings and Its Applications

    Energy Technology Data Exchange (ETDEWEB)

    Huang H.; Yoo S.; Yu, D.; Qin, H.

    2014-12-14

    Abstract—Spectral Embedding is one of the most effective dimension reduction algorithms in data mining. However, its computation complexity has to be mitigated in order to apply it for real-world large scale data analysis. Many researches have been focusing on developing approximate spectral embeddings which are more efficient, but meanwhile far less effective. This paper proposes Diverse Power Iteration Embeddings (DPIE), which not only retains the similar efficiency of power iteration methods but also produces a series of diverse and more effective embedding vectors. We test this novel method by applying it to various data mining applications (e.g. clustering, anomaly detection and feature selection) and evaluating their performance improvements. The experimental results show our proposed DPIE is more effective than popular spectral approximation methods, and obtains the similar quality of classic spectral embedding derived from eigen-decompositions. Moreover it is extremely fast on big data applications. For example in terms of clustering result, DPIE achieves as good as 95% of classic spectral clustering on the complex datasets but 4000+ times faster in limited memory environment.

  13. Technical solutions to enable embedded generation growth

    Energy Technology Data Exchange (ETDEWEB)

    Lynch, C.A.; Todd, S.; Millar, W.; Wood, H.S.

    2003-07-01

    This report describes the results of one of a series of studies commissioned by the UK Department of Trade and Industry into various aspects of embedded generation with the aim of supporting the development and deployment of electrical sources (particularly their ease of connection to the network) to deliver power to consumers. The first phase of the project involved a literature review and meetings with embedded generation developers and planning engineers from distribution network operators (DNOs). The second phase investigated embedded generation at different levels of the distribution network and included modelling a representative network. Technologies that could facilitate a significant increase in embedded generation were identified and estimates made of when and where significant development would be needed. Technical problems identified by DNOs were concerned with thermal loading, voltage regulation, fault levels, protection and network operation. A number of non-technical (commercial and regulatory) problems were also identified. The report describes the UK regulatory framework, the present situation, the British power system, the accommodation of embedded generation by established means, the representative model and technical innovations.

  14. Autonomous Multicamera Tracking on Embedded Smart Cameras

    Directory of Open Access Journals (Sweden)

    Bischof Horst

    2007-01-01

    Full Text Available There is currently a strong trend towards the deployment of advanced computer vision methods on embedded systems. This deployment is very challenging since embedded platforms often provide limited resources such as computing performance, memory, and power. In this paper we present a multicamera tracking method on distributed, embedded smart cameras. Smart cameras combine video sensing, processing, and communication on a single embedded device which is equipped with a multiprocessor computation and communication infrastructure. Our multicamera tracking approach focuses on a fully decentralized handover procedure between adjacent cameras. The basic idea is to initiate a single tracking instance in the multicamera system for each object of interest. The tracker follows the supervised object over the camera network, migrating to the camera which observes the object. Thus, no central coordination is required resulting in an autonomous and scalable tracking approach. We have fully implemented this novel multicamera tracking approach on our embedded smart cameras. Tracking is achieved by the well-known CamShift algorithm; the handover procedure is realized using a mobile agent system available on the smart camera network. Our approach has been successfully evaluated on tracking persons at our campus.

  15. Embedded Hyperchaotic Generators: A Comparative Analysis

    Science.gov (United States)

    Sadoudi, Said; Tanougast, Camel; Azzaz, Mohamad Salah; Dandache, Abbas

    In this paper, we present a comparative analysis of FPGA implementation performances, in terms of throughput and resources cost, of five well known autonomous continuous hyperchaotic systems. The goal of this analysis is to identify the embedded hyperchaotic generator which leads to designs with small logic area cost, satisfactory throughput rates, low power consumption and low latency required for embedded applications such as secure digital communications between embedded systems. To implement the four-dimensional (4D) chaotic systems, we use a new structural hardware architecture based on direct VHDL description of the forth order Runge-Kutta method (RK-4). The comparative analysis shows that the hyperchaotic Lorenz generator provides attractive performances compared to that of others. In fact, its hardware implementation requires only 2067 CLB-slices, 36 multipliers and no block RAMs, and achieves a throughput rate of 101.6 Mbps, at the output of the FPGA circuit, at a clock frequency of 25.315 MHz with a low latency time of 316 ns. Consequently, these good implementation performances offer to the embedded hyperchaotic Lorenz generator the advantage of being the best candidate for embedded communications applications.

  16. Heat Capacity Analysis Report

    International Nuclear Information System (INIS)

    Findikakis, A.

    2004-01-01

    The purpose of this report is to provide heat capacity values for the host and surrounding rock layers for the waste repository at Yucca Mountain. The heat capacity representations provided by this analysis are used in unsaturated zone (UZ) flow, transport, and coupled processes numerical modeling activities, and in thermal analyses as part of the design of the repository to support the license application. Among the reports that use the heat capacity values estimated in this report are the ''Multiscale Thermohydrologic Model'' report, the ''Drift Degradation Analysis'' report, the ''Ventilation Model and Analysis Report, the Igneous Intrusion Impacts on Waste Packages and Waste Forms'' report, the ''Dike/Drift Interactions report, the Drift-Scale Coupled Processes (DST and TH Seepage) Models'' report, and the ''In-Drift Natural Convection and Condensation'' report. The specific objective of this study is to determine the rock-grain and rock-mass heat capacities for the geologic stratigraphy identified in the ''Mineralogic Model (MM3.0) Report'' (BSC 2004 [DIRS 170031], Table 1-1). This report provides estimates of the heat capacity for all stratigraphic layers except the Paleozoic, for which the mineralogic abundance data required to estimate the heat capacity are not available. The temperature range of interest in this analysis is 25 C to 325 C. This interval is broken into three separate temperature sub-intervals: 25 C to 95 C, 95 C to 114 C, and 114 C to 325 C, which correspond to the preboiling, trans-boiling, and postboiling regimes. Heat capacity is defined as the amount of energy required to raise the temperature of a unit mass of material by one degree (Nimick and Connolly 1991 [DIRS 100690], p. 5). The rock-grain heat capacity is defined as the heat capacity of the rock solids (minerals), and does not include the effect of water that exists in the rock pores. By comparison, the rock-mass heat capacity considers the heat capacity of both solids and pore

  17. Embedding operational research into national disease control programme: lessons from 10 years of experience in Indonesia

    Directory of Open Access Journals (Sweden)

    Yodi Mahendradhata

    2014-10-01

    Full Text Available There is growing recognition that operational research (OR should be embedded into national disease control programmes. However, much of the current OR capacity building schemes are still predominantly driven by international agencies with limited integration into national disease control programmes. We demonstrated that it is possible to achieve a more sustainable capacity building effort across the country by establishing an OR group within the national tuberculosis (TB control programme in Indonesia. Key challenges identified include long-term financial support, limited number of scientific publications, and difficulties in documenting impact on programmatic performance. External evaluation has expressed concerns in regard to utilisation of OR in policy making. Efforts to address this concern have been introduced recently and led to indications of increased utilisation of research evidence in policy making by the national TB control programme. Embedding OR in national disease control programmes is key in establishing an evidence-based disease control programme.

  18. Embedded Web Technology: Applying World Wide Web Standards to Embedded Systems

    Science.gov (United States)

    Ponyik, Joseph G.; York, David W.

    2002-01-01

    Embedded Systems have traditionally been developed in a highly customized manner. The user interface hardware and software along with the interface to the embedded system are typically unique to the system for which they are built, resulting in extra cost to the system in terms of development time and maintenance effort. World Wide Web standards have been developed in the passed ten years with the goal of allowing servers and clients to intemperate seamlessly. The client and server systems can consist of differing hardware and software platforms but the World Wide Web standards allow them to interface without knowing about the details of system at the other end of the interface. Embedded Web Technology is the merging of Embedded Systems with the World Wide Web. Embedded Web Technology decreases the cost of developing and maintaining the user interface by allowing the user to interface to the embedded system through a web browser running on a standard personal computer. Embedded Web Technology can also be used to simplify an Embedded System's internal network.

  19. Co-design for an SoC embedded network controller

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With the development of Ethernet systems and the growing capacity of modern silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardware/software co-design is a methodology for solving design problems in processor based embedded systems. In this work, we implemented a new 1-cycle pipeline microprocessor and a fast Ethernet transceiver and established a low cost, high performance embedded network controller, and designed a TCP/IP stack to access the Internet. We discussed the hardware/software architecture in the forepart, and then the whole system-on-a-chip on Altera Stratix EP1S25F780C6 device. Using the FPGA environment and SmartBit tester, we tested the system's throughput. Our simulation results showed that the maximum throughput of Ethernet packets is up to 7 Mbps, that of UDP packets is up to 5.8 Mbps, and that of TCP packets is up to 3.4 Mbps, which showed that this embedded system can easily transmit basic voice and video signals through Ethernet, and that using only one chip can realize that many electronic devices access to the Internet directly and get high performance.

  20. Capacity building for HIA

    Directory of Open Access Journals (Sweden)

    Gabriel Gulis PhD

    2007-09-01

    Full Text Available

    Background: To integrate health impact assessment (HIA into existing decision-making processes requires not only methods and procedures but also well-trained experts, aware policy makers and appropriate institutions. Capacity building is the assistance which is provided to entities, which have a need to develop a certain skill or competence, or for general upgrading of performance ability. If a new technique is planned to be introduced there is a need for capacity building with no respect to levels (local, regional, national, international or sectors (health, environment, finance, social care, education, etc.. As such, HIA is a new technique for most of the new Member States and accession countries of the European Union.

    Methods: To equip individuals with the understanding and skills needed to launch a HIA or be aware of the availability of this methodology and to access information, knowledge and training, we focused on the organization of workshops in participating countries. The workshops served also as pilot events to test a “curriculum” for HIA; a set of basic topics and presentations had been developed to be tested during workshops. In spite of classical in-class workshops we aimed to organize e-learning events as a way to over come the “busyness” problem of decision makers.

    Results: Throughout March – October 2006 we organized and ran 7 workshops in Denmark, Turkey, Lithuania, Poland, Bulgaria, Slovak Republic and Hungary. Participants came from the public health sector (141, non-public health decision makers (113 and public health students (100. A concise curriculum was developed and tested during these workshops. Participants developed a basic understanding of HIA, skills to develop and use their own screening tools as well as scoping.Within the workshop in Denmark we tested an online, real-time Internet based training method; participants highly welcomed this

  1. Ultimate Lateral Capacity of Rigid Pile in c- φ Soil

    Science.gov (United States)

    Zhang, Wei-min

    2018-03-01

    To date no analytical solution of the pile ultimate lateral capacity for the general c- φ soil has been obtained. In the present study, a new dimensionless embedded ratio was proposed and the analytical solutions of ultimate lateral capacity and rotation center of rigid pile in c- φ soils were obtained. The results showed that both the dimensionless ultimate lateral capacity and dimensionless rotation center were the univariate functions of the embedded ratio. Also, the ultimate lateral capacity in the c- φ soil was the combination of the ultimate lateral capacity ( f c ) in the clay, and the ultimate lateral capacity ( f φ ) in the sand. Therefore, the Broms chart for clay, solution for clay ( φ=0) put forward by Poulos and Davis, solution for sand ( c=0) obtained by Petrasovits and Awad, and Kondner's ultimate bending moment were all proven to be the special cases of the general solution in the present study. A comparison of the field and laboratory tests in 93 cases showed that the average ratios of the theoretical values to the experimental value ranged from 0.85 to 1.15. Also, the theoretical values displayed a good agreement with the test values.

  2. Isometric embeddings of 2-spheres by embedding flow for applications in numerical relativity

    International Nuclear Information System (INIS)

    Jasiulek, Michael; Korzyński, Mikołaj

    2012-01-01

    We present a numerical method for solving Weyl's embedding problem which consists in finding a global isometric embedding of a positively curved and positive-definite spherical 2-metric into the Euclidean 3-space. The method is based on a construction introduced by Weingarten and was used in Nirenberg's proof of Weyl's conjecture. The target embedding results as the endpoint of an embedding flow in R 3 beginning at the unit sphere's embedding. We employ spectral methods to handle functions on the surface and to solve various (non)linear elliptic PDEs. The code requires no additional input or steering from the operator and its convergence is guaranteed by the Nirenberg arguments. Possible applications in 3 + 1 numerical relativity range from quasi-local mass and momentum measures to coarse-graining in inhomogeneous cosmological models. (paper)

  3. Prospects for OPEC capacity

    International Nuclear Information System (INIS)

    Adelman, M.A.

    1995-01-01

    OPEC capacity is not exogenous, but responds to demand. Price increases have not been caused by capacity shortages. OPEC nations find it hard to set aside even very small portions of their revenues for oil investment, despite its extreme profitability. Foreign investors face high risks. Production sharing makes their after-tax return even more unstable. (author)

  4. Spatially Partitioned Embedded Runge--Kutta Methods

    KAUST Repository

    Ketcheson, David I.; MacDonald, Colin B.; Ruuth, Steven J.

    2013-01-01

    We study spatially partitioned embedded Runge--Kutta (SPERK) schemes for partial differential equations (PDEs), in which each of the component schemes is applied over a different part of the spatial domain. Such methods may be convenient for problems in which the smoothness of the solution or the magnitudes of the PDE coefficients vary strongly in space. We focus on embedded partitioned methods as they offer greater efficiency and avoid the order reduction that may occur in nonembedded schemes. We demonstrate that the lack of conservation in partitioned schemes can lead to nonphysical effects and propose conservative additive schemes based on partitioning the fluxes rather than the ordinary differential equations. A variety of SPERK schemes are presented, including an embedded pair suitable for the time evolution of fifth-order weighted nonoscillatory spatial discretizations. Numerical experiments are provided to support the theory.

  5. Embedded Thermal Control for Spacecraft Subsystems Miniaturization

    Science.gov (United States)

    Didion, Jeffrey R.

    2014-01-01

    Optimization of spacecraft size, weight and power (SWaP) resources is an explicit technical priority at Goddard Space Flight Center. Embedded Thermal Control Subsystems are a promising technology with many cross cutting NSAA, DoD and commercial applications: 1.) CubeSatSmallSat spacecraft architecture, 2.) high performance computing, 3.) On-board spacecraft electronics, 4.) Power electronics and RF arrays. The Embedded Thermal Control Subsystem technology development efforts focus on component, board and enclosure level devices that will ultimately include intelligent capabilities. The presentation will discuss electric, capillary and hybrid based hardware research and development efforts at Goddard Space Flight Center. The Embedded Thermal Control Subsystem development program consists of interrelated sub-initiatives, e.g., chip component level thermal control devices, self-sensing thermal management, advanced manufactured structures. This presentation includes technical status and progress on each of these investigations. Future sub-initiatives, technical milestones and program goals will be presented.

  6. Spatially Partitioned Embedded Runge--Kutta Methods

    KAUST Repository

    Ketcheson, David I.

    2013-10-30

    We study spatially partitioned embedded Runge--Kutta (SPERK) schemes for partial differential equations (PDEs), in which each of the component schemes is applied over a different part of the spatial domain. Such methods may be convenient for problems in which the smoothness of the solution or the magnitudes of the PDE coefficients vary strongly in space. We focus on embedded partitioned methods as they offer greater efficiency and avoid the order reduction that may occur in nonembedded schemes. We demonstrate that the lack of conservation in partitioned schemes can lead to nonphysical effects and propose conservative additive schemes based on partitioning the fluxes rather than the ordinary differential equations. A variety of SPERK schemes are presented, including an embedded pair suitable for the time evolution of fifth-order weighted nonoscillatory spatial discretizations. Numerical experiments are provided to support the theory.

  7. Embedded fiber optic ultrasonic sensors and generators

    Science.gov (United States)

    Dorighi, John F.; Krishnaswamy, Sridhar; Achenbach, Jan D.

    1995-04-01

    Ultrasonic sensors and generators based on fiber-optic systems are described. It is shown that intrinsic fiber optic Fabry-Perot ultrasound sensors that are embedded in a structure can be stabilized by actively tuning the laser frequency. The need for this method of stabilization is demonstrated by detecting piezoelectric transducer-generated ultrasonic pulses in the presence of low frequency dynamic strains that are intentionally induced to cause sensor drift. The actively stabilized embedded fiber optic Fabry-Perot sensor is also shown to have sufficient sensitivity to detect ultrasound that is generated in the interior of a structure by means of a high-power optical fiber that pipes energy from a pulsed laser to an embedded generator of ultrasound.

  8. Design Technology for Heterogeneous Embedded Systems

    CERN Document Server

    O'Connor, Ian; Piguet, Christian

    2012-01-01

    Designing technology to address the problem of heterogeneous embedded systems, while remaining compatible with standard “More Moore” flows, i.e. capable of handling simultaneously both silicon complexity and system complexity, represents one of the most important challenges facing the semiconductor industry today. While the micro-electronics industry has built its own specific design methods to focus mainly on the management of complexity through the establishment of abstraction levels, the emergence of device heterogeneity requires new approaches enabling the satisfactory design of physically heterogeneous embedded systems for the widespread deployment of such systems. This book, compiled largely from a set of contributions from participants of past editions of the Winter School on Heterogeneous Embedded Systems Design Technology (FETCH), proposes a broad and holistic overview of design techniques used to tackle the various facets of heterogeneity in terms of technology and opportunities at the physical ...

  9. Dynamic memory management for embedded systems

    CERN Document Server

    Atienza Alonso, David; Poucet, Christophe; Peón-Quirós, Miguel; Bartzas, Alexandros; Catthoor, Francky; Soudris, Dimitrios

    2015-01-01

    This book provides a systematic and unified methodology, including basic principles and reusable processes, for dynamic memory management (DMM) in embedded systems.  The authors describe in detail how to design and optimize the use of dynamic memory in modern, multimedia and network applications, targeting the latest generation of portable embedded systems, such as smartphones. Coverage includes a variety of design and optimization topics in electronic design automation of DMM, from high-level software optimization to microarchitecture-level hardware support. The authors describe the design of multi-layer dynamic data structures for the final memory hierarchy layers of the target portable embedded systems and how to create a low-fragmentation, cost-efficient, dynamic memory management subsystem out of configurable components for the particular memory allocation and de-allocation patterns for each type of application.  The design methodology described in this book is based on propagating constraints among de...

  10. Uncertainty in adaptive capacity

    International Nuclear Information System (INIS)

    Neil Adger, W.; Vincent, K.

    2005-01-01

    The capacity to adapt is a critical element of the process of adaptation: it is the vector of resources that represent the asset base from which adaptation actions can be made. Adaptive capacity can in theory be identified and measured at various scales, from the individual to the nation. The assessment of uncertainty within such measures comes from the contested knowledge domain and theories surrounding the nature of the determinants of adaptive capacity and the human action of adaptation. While generic adaptive capacity at the national level, for example, is often postulated as being dependent on health, governance and political rights, and literacy, and economic well-being, the determinants of these variables at national levels are not widely understood. We outline the nature of this uncertainty for the major elements of adaptive capacity and illustrate these issues with the example of a social vulnerability index for countries in Africa. (authors)

  11. Laser assisted embedding of nanoparticles into metallic materials

    International Nuclear Information System (INIS)

    Lin Dong; Suslov, Sergey; Ye Chang; Liao Yiliang; Liu, C. Richard; Cheng, Gary J.

    2012-01-01

    This paper reports a methodology of half-embedding nanoparticles into metallic materials. Transparent and opaque nanoparticles are chosen to demonstrate the process of laser assisted nanoparticle embedding. Dip coating method is used to coat transparent or opaque nanoparticle on the surface of metallic material. Nanoparticles are embedded into substrate by laser irradiation. In this study, the mechanism and process of nanoparticle embedding are investigated. It is found both transparent and opaque nanoparticles embedding are with high densities and good uniformities.

  12. Feasibility study on embedded transport core calculations

    International Nuclear Information System (INIS)

    Ivanov, B.; Zikatanov, L.; Ivanov, K.

    2007-01-01

    The main objective of this study is to develop an advanced core calculation methodology based on embedded diffusion and transport calculations. The scheme proposed in this work is based on embedded diffusion or SP 3 pin-by-pin local fuel assembly calculation within the framework of the Nodal Expansion Method (NEM) diffusion core calculation. The SP 3 method has gained popularity in the last 10 years as an advanced method for neutronics calculation. NEM is a multi-group nodal diffusion code developed, maintained and continuously improved at the Pennsylvania State University. The developed calculation scheme is a non-linear iteration process, which involves cross-section homogenization, on-line discontinuity factors generation, and boundary conditions evaluation by the global solution passed to the local calculation. In order to accomplish the local calculation, a new code has been developed based on the Finite Elements Method (FEM), which is capable of performing both diffusion and SP 3 calculations. The new code will be used in the framework of the NEM code in order to perform embedded pin-by-pin diffusion and SP 3 calculations on fuel assembly basis. The development of the diffusion and SP 3 FEM code is presented first following by its application to several problems. Description of the proposed embedded scheme is provided next as well as the obtained preliminary results of the C3 MOX benchmark. The results from the embedded calculations are compared with direct pin-by-pin whole core calculations in terms of accuracy and efficiency followed by conclusions made about the feasibility of the proposed embedded approach. (authors)

  13. The art of programming embedded systems

    CERN Document Server

    Ganssle, Jack

    1992-01-01

    Embedded systems are products such as microwave ovens, cars, and toys that rely on an internal microprocessor. This book is oriented toward the design engineer or programmer who writes the computer code for such a system. There are a number of problems specific to the embedded systems designer, and this book addresses them and offers practical solutions.Key Features* Offers cookbook routines, algorithms, and design techniques* Includes tips for handling debugging management and testing* Explores the philosophy of tightly coupling software and hardware in programming and dev

  14. Tools for Embedded Computing Systems Software

    Science.gov (United States)

    1978-01-01

    A workshop was held to assess the state of tools for embedded systems software and to determine directions for tool development. A synopsis of the talk and the key figures of each workshop presentation, together with chairmen summaries, are presented. The presentations covered four major areas: (1) tools and the software environment (development and testing); (2) tools and software requirements, design, and specification; (3) tools and language processors; and (4) tools and verification and validation (analysis and testing). The utility and contribution of existing tools and research results for the development and testing of embedded computing systems software are described and assessed.

  15. Modern system architectures in embedded systems

    International Nuclear Information System (INIS)

    Korhonen, T.

    2012-01-01

    Several new technologies are making their way also in embedded systems. In addition to the FPGA technology which has become commonplace, multi-core CPUs and I/O virtualization (the implementation of the tasks of a software hyper-visor in hardware to improve the efficiency) are being introduced to the embedded systems. In this paper we review the trends and discuss how to take advantage of these features in control systems. Some potential application examples like parallelization, data streaming, high-speed data acquisition and virtualization are discussed

  16. Model-based testing for embedded systems

    CERN Document Server

    Zander, Justyna; Mosterman, Pieter J

    2011-01-01

    What the experts have to say about Model-Based Testing for Embedded Systems: "This book is exactly what is needed at the exact right time in this fast-growing area. From its beginnings over 10 years ago of deriving tests from UML statecharts, model-based testing has matured into a topic with both breadth and depth. Testing embedded systems is a natural application of MBT, and this book hits the nail exactly on the head. Numerous topics are presented clearly, thoroughly, and concisely in this cutting-edge book. The authors are world-class leading experts in this area and teach us well-used

  17. Communicating embedded systems software and design

    CERN Document Server

    Jard, Claude

    2013-01-01

    The increased complexity of embedded systems coupled with quick design cycles to accommodate faster time-to-market requires increased system design productivity that involves both model-based design and tool-supported methodologies. Formal methods are mathematically-based techniques and provide a clean framework in which to express requirements and models of the systems, taking into account discrete, stochastic and continuous (timed or hybrid) parameters with increasingly efficient tools. This book deals with these formal methods applied to communicating embedded systems by presenting the

  18. Microring embedded hollow polymer fiber laser

    Energy Technology Data Exchange (ETDEWEB)

    Linslal, C. L., E-mail: linslal@gmail.com; Sebastian, S.; Mathew, S.; Radhakrishnan, P.; Nampoori, V. P. N.; Girijavallabhan, C. P.; Kailasnath, M. [International School of Photonics, Cochin University of Science and Technology, Cochin 22 (India)

    2015-03-30

    Strongly modulated laser emission has been observed from rhodamine B doped microring resonator embedded in a hollow polymer optical fiber by transverse optical pumping. The microring resonator is fabricated on the inner wall of a hollow polymer fiber. Highly sharp lasing lines, strong mode selection, and a collimated laser beam are observed from the fiber. Nearly single mode lasing with a side mode suppression ratio of up to 11.8 dB is obtained from the strongly modulated lasing spectrum. The microring embedded hollow polymer fiber laser has shown efficient lasing characteristics even at a propagation length of 1.5 m.

  19. Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application

    Science.gov (United States)

    Zhang, De-gan; Zhang, Xiao-dan

    2012-11-01

    With the growth of the amount of information manipulated by embedded application systems, which are embedded into devices and offer access to the devices on the internet, the requirements of saving the information systemically is necessary so as to fulfil access from the client and the local processing more efficiently. For supporting mobile applications, a design and implementation solution of embedded un-interruptible power supply (UPS) system (in brief, EUPSS) is brought forward for long-distance monitoring and controlling of UPS based on Web. The implementation of system is based on ATmega161, RTL8019AS and Arm chips with TCP/IP protocol suite for communication. In the embedded UPS system, an embedded file system is designed and implemented which saves the data and index information on a serial EEPROM chip in a structured way and communicates with a microcontroller unit through I2C bus. By embedding the file system into UPS system or other information appliances, users can access and manipulate local data on the web client side. Embedded file system on chips will play a major role in the growth of IP networking. Based on our experiment tests, the mobile users can easily monitor and control UPS in different places of long-distance. The performance of EUPSS has satisfied the requirements of all kinds of Web-based mobile applications.

  20. High capacity fiber optic sensor networks using hybrid multiplexing techniques and their applications

    Science.gov (United States)

    Sun, Qizhen; Li, Xiaolei; Zhang, Manliang; Liu, Qi; Liu, Hai; Liu, Deming

    2013-12-01

    Fiber optic sensor network is the development trend of fiber senor technologies and industries. In this paper, I will discuss recent research progress on high capacity fiber sensor networks with hybrid multiplexing techniques and their applications in the fields of security monitoring, environment monitoring, Smart eHome, etc. Firstly, I will present the architecture of hybrid multiplexing sensor passive optical network (HSPON), and the key technologies for integrated access and intelligent management of massive fiber sensor units. Two typical hybrid WDM/TDM fiber sensor networks for perimeter intrusion monitor and cultural relics security are introduced. Secondly, we propose the concept of "Microstructure-Optical X Domin Refecltor (M-OXDR)" for fiber sensor network expansion. By fabricating smart micro-structures with the ability of multidimensional encoded and low insertion loss along the fiber, the fiber sensor network of simple structure and huge capacity more than one thousand could be achieved. Assisted by the WDM/TDM and WDM/FDM decoding methods respectively, we built the verification systems for long-haul and real-time temperature sensing. Finally, I will show the high capacity and flexible fiber sensor network with IPv6 protocol based hybrid fiber/wireless access. By developing the fiber optic sensor with embedded IPv6 protocol conversion module and IPv6 router, huge amounts of fiber optic sensor nodes can be uniquely addressed. Meanwhile, various sensing information could be integrated and accessed to the Next Generation Internet.

  1. OPEC future capacity expansions

    International Nuclear Information System (INIS)

    Sandrea, I.

    2005-01-01

    This conference presentation examined OPEC future capacity expansions including highlights from 2000-2004 from the supply perspective and actions by OPEC; OPEC spare capacity in 2005/2006; medium-term capacity expansion and investments; long-term scenarios, challenges and opportunities; and upstream policies in member countries. Highlights from the supply perspective included worst than expected non-OPEC supply response; non-OPEC supply affected by a number of accidents and strikes; geopolitical tensions; and higher than expected demand for OPEC crude. OPEC's actions included closer relationship with other producers and consumers; capacity expansions in 2004 and 2005/2006; and OPEC kept the market well supplied with crude in 2004. The presentation also provided data using graphical charts on OPEC net capacity additions until 2005/2006; OPEC production versus spare capacity from 2003 to 2005; OPEC production and capacity to 2010; and change in required OPEC production from 2005-2020. Medium term expansion to 2010 includes over 60 projects. Medium-term risks such as project execution, financing, costs, demand, reserves, depletion, integration of Iraq, and geopolitical tensions were also discussed. The presentation concluded that in the long term, large uncertainties remain; the peak of world supply is not imminent; and continued and enhanced cooperation is essential to market stability. tabs., figs

  2. Available transmission capacity assessment

    Directory of Open Access Journals (Sweden)

    Škokljev Ivan

    2012-01-01

    Full Text Available Effective power system operation requires the analysis of vast amounts of information. Power market activities expose power transmission networks to high-level power transactions that threaten normal, secure operation of the power system. When there are service requests for a specific sink/source pair in a transmission system, the transmission system operator (TSO must allocate the available transfer capacity (ATC. It is common that ATC has a single numerical value. Additionally, the ATC must be calculated for the base case configuration of the system, while generation dispatch and topology remain unchanged during the calculation. Posting ATC on the internet should benefit prospective users by aiding them in formulating their requests. However, a single numerical value of ATC offers little for prospect for analysis, planning, what-if combinations, etc. A symbolic approach to the power flow problem (DC power flow and ATC offers a numerical computation at the very end, whilst the calculation beforehand is performed by using symbols for the general topology of the electrical network. Qualitative analysis of the ATC using only qualitative values, such as increase, decrease or no change, offers some new insights into ATC evaluation, multiple transactions evaluation, value of counter-flows and their impact etc. Symbolic analysis in this paper is performed after the execution of the linear, symbolic DC power flow. As control variables, the mathematical model comprises linear security constraints, ATC, PTDFs and transactions. The aim is to perform an ATC sensitivity study on a five nodes/seven lines transmission network, used for zonal market activities tests. A relatively complicated environment with twenty possible bilateral transactions is observed.

  3. Vedr.: Military capacity building

    DEFF Research Database (Denmark)

    Larsen, Josefine Kühnel; Struwe, Lars Bangert

    2013-01-01

    Military capacity building has increasingly become an integral part of Danish defence. Military capacity is a new way of thinking Danish defence and poses a new set of challenges and opportunities for the Danish military and the Political leadership. On the 12th of december, PhD. Candidate Josefine...... Kühnel Larsen and researcher Lars Bangert Struwe of CMS had organized a seminar in collaboration with Royal Danish Defense Colleg and the East African Security Governance Network. The seminar focused on some of the risks involved in Military capacity building and how these risks are dealt with from...

  4. Improving emotion recognition systems by embedding cardiorespiratory coupling

    International Nuclear Information System (INIS)

    Valenza, Gaetano; Lanatá, Antonio; Scilingo, Enzo Pasquale

    2013-01-01

    This work aims at showing improved performances of an emotion recognition system embedding information gathered from cardiorespiratory (CR) coupling. Here, we propose a novel methodology able to robustly identify up to 25 regions of a two-dimensional space model, namely the well-known circumplex model of affect (CMA). The novelty of embedding CR coupling information in an autonomic nervous system-based feature space better reveals the sympathetic activations upon emotional stimuli. A CR synchrogram analysis was used to quantify such a coupling in terms of number of heartbeats per respiratory period. Physiological data were gathered from 35 healthy subjects emotionally elicited by means of affective pictures of the international affective picture system database. In this study, we finely detected five levels of arousal and five levels of valence as well as the neutral state, whose combinations were used for identifying 25 different affective states in the CMA plane. We show that the inclusion of the bivariate CR measures in a previously developed system based only on monovariate measures of heart rate variability, respiration dynamics and electrodermal response dramatically increases the recognition accuracy of a quadratic discriminant classifier, obtaining more than 90% of correct classification per class. Finally, we propose a comprehensive description of the CR coupling during sympathetic elicitation adapting an existing theoretical nonlinear model with external driving. The theoretical idea behind this model is that the CR system is comprised of weakly coupled self-sustained oscillators that, when exposed to an external perturbation (i.e. sympathetic activity), becomes synchronized and less sensible to input variations. Given the demonstrated role of the CR coupling, this model can constitute a general tool which is easily embedded in other model-based emotion recognition systems. (paper)

  5. Embedding librarianship in learning management systems a how-to-do-it manual for librarians

    CERN Document Server

    Tumbleson, Beth E

    2014-01-01

    Information literacy instruction is best when it is integrated into actual research, and in higher education that means embedding librarianship into the learning management system (LMS). This new How-To-Do-It Manual is geared towards academic librarians already working with classes in an LMS as well as those considering how to begin a pilot. Tumbleson and Burke, who surveyed 280 librarians for information on related activities, also use their own first-hand experience implementing an embedded librarianship program at their university to offer guidance and encouragement.

  6. Design of remote weather monitor system based on embedded web database

    International Nuclear Information System (INIS)

    Gao Jiugang; Zhuang Along

    2010-01-01

    The remote weather monitoring system is designed by employing the embedded Web database technology and the S3C2410 microprocessor as the core. The monitoring system can simultaneously monitor the multi-channel sensor signals, and can give a dynamic Web pages display of various types of meteorological information on the remote computer. It gives a elaborated introduction of the construction and application of the Web database under the embedded Linux. Test results show that the client access the Web page via the GPRS or the Internet, acquires data and uses an intuitive graphical way to display the value of various types of meteorological information. (authors)

  7. Capacity Building in Land Management

    DEFF Research Database (Denmark)

    Enemark, Stig; Ahene, Rexford

    2003-01-01

    There is a significant need for capacity building in the interdisciplinary area of land management especially in developing countries and countries in transition, to deal with the complex issues of building efficient land information systems and sustainable institutional infrastructures. Capacity...... building in land management is not only a question of establishing a sufficient technological level or sufficient economic resources. It is mainly a question of understanding the interdisciplinary and cross-sectoral nature of land administration systems, and understanding the need for human resource...... and professionals for implementing the new land policy. The curriculum combines the diploma and the bachelor level and it combines the key areas of land surveying, land management and physical planning....

  8. Views on Evolvability of Embedded Systems

    NARCIS (Netherlands)

    Laar, P. van de; Punter, T.

    2011-01-01

    Evolvability, the ability to respond effectively to change, represents a major challenge to today's high-end embedded systems, such as those developed in the medical domain by Philips Healthcare. These systems are typically developed by multi-disciplinary teams, located around the world, and are in

  9. Views on evolvability of embedded systems

    NARCIS (Netherlands)

    Laar, van de P.J.L.J.; Punter, H.T.

    2011-01-01

    Evolvability, the ability to respond effectively to change, represents a major challenge to today's high-end embedded systems, such as those developed in the medical domain by Philips Healthcare. These systems are typically developed by multi-disciplinary teams, located around the world, and are in

  10. Embedded high-contrast distributed grating structures

    Science.gov (United States)

    Zubrzycki, Walter J.; Vawter, Gregory A.; Allerman, Andrew A.

    2002-01-01

    A new class of fabrication methods for embedded distributed grating structures is claimed, together with optical devices which include such structures. These new methods are the only known approach to making defect-free high-dielectric contrast grating structures, which are smaller and more efficient than are conventional grating structures.

  11. Carcinogenicity of Embedded Tungsten Alloys in Mice

    Science.gov (United States)

    2011-03-01

    formation as a result of embedded metal from a lawn mower blade (Saruwatari et al. 2009) and a chain saw blade (Osawa et al. 2006), respectively. In both...granuloma attributable to a piece of lawn - mower blade. Clin Exp Dermatol 34:e268–e269 Schins RP, Borm PJ (1999) Mechanisms and mediators in coal dust induced

  12. The polarizable embedding coupled cluster method

    DEFF Research Database (Denmark)

    Sneskov, Kristian; Schwabe, Tobias; Kongsted, Jacob

    2011-01-01

    We formulate a new combined quantum mechanics/molecular mechanics (QM/MM) method based on a self-consistent polarizable embedding (PE) scheme. For the description of the QM region, we apply the popular coupled cluster (CC) method detailing the inclusion of electrostatic and polarization effects...

  13. Flash memory in embedded Java programs

    DEFF Research Database (Denmark)

    Korsholm, Stephan Erbs

    This paper introduces a Java execution environment with the capability for storing constant heap data in Flash, thus saving valuable RAM. The extension is motivated by the structure of three industrial applications which demonstrate the need for storing constant data in Flash on small embedded...

  14. Are Central European countries’ financial institutions embedded?

    NARCIS (Netherlands)

    Jong, E. de; Hooijdonk, C.J.J. van

    2010-01-01

    The fall of the Iron Curtain in 1989 was one of the causes of an increased interest in the relation between economics and culture. An important idea of this literature is that social and economic systems will function properly if they are embedded in a corresponding value system. Although some

  15. Embedding complex objects with 3d printing

    KAUST Repository

    Hussain, Muhammad Mustafa; Diaz, Cordero Marlon Steven

    2017-01-01

    A CMOS technology-compatible fabrication process for flexible CMOS electronics embedded during additive manufacturing (i.e. 3D printing). A method for such a process may include printing a first portion of a 3D structure; pausing the step

  16. Embedded Critique in a Tensed World

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2006-01-01

    , it is probably best not to criticize at all. I argue that this reaction is wrong. Descriptivism does on the one hand not solve the problem from which it originates: the description is itself embedded in a contingent validity. The postmodern insight does on the other hand not necessarily lead to absolute...

  17. Web Service Architecture Framework for Embedded Devices

    Science.gov (United States)

    Yanzick, Paul David

    2009-01-01

    The use of Service Oriented Architectures, namely web services, has become a widely adopted method for transfer of data between systems across the Internet as well as the Enterprise. Adopting a similar approach to embedded devices is also starting to emerge as personal devices and sensor networks are becoming more common in the industry. This…

  18. The Embedding Theorems of Whitney and Nash

    Indian Academy of Sciences (India)

    IAS Admin

    We begin by briefly motivating the idea of a manifold and then discuss the embedding the- orems of Whitney and Nash that allow us to view these objects inside appropriately large Eu- clidean spaces. 1. Introduction. Let us begin by motivating the concept of a manifold. Start with the unit circle C in the plane given by x2.

  19. The Embedded Character of Workplace Relations.

    Science.gov (United States)

    Frenkel, Stephen J.

    2003-01-01

    The workplace is embedded in three force fields: the macro field of globalization/technology, the meso field of transnational production networks, and the micro field of local labor markets and organizations. Each field influences the way flexibility and cost reduction are prioritized and has consequences for workplace structures and relations.…

  20. Dealing with dynamism in embedded system design

    NARCIS (Netherlands)

    Gheorghita, S.V.

    2007-01-01

    In the past decade, real-time embedded systems became more and more complex and pervasive. From the user perspective, these systems have stringent requirements regarding size, performance and energy consumption, and due to business competition, their time-to-market is a crucial factor. Besides these

  1. Structure Map for Embedded Binary Alloy Nanocrystals

    Energy Technology Data Exchange (ETDEWEB)

    Yuan, C.W.; Shin, S.J.; Liao, C.Y.; Guzman, J.; Stone, P.R.; Watanabe, M.; Ager III, J.W.; Haller, E.E.; Chrzan, D.C.

    2008-09-20

    The equilibrium structure of embedded nanocrystals formed from strongly segregating binary-alloys is considered within a simple thermodynamic model. The model identifies two dimensionlessinterface energies that dictate the structure, and allows prediction of the stable structure for anychoice of these parameters. The resulting structure map includes three distinct nanocrystal mor-phologies: core/shell, lobe/lobe, and completely separated spheres.

  2. EMBEDDED MARKETING AND THE QUALITY-QUANTITY ...

    African Journals Online (AJOL)

    NGOZI

    This paper discusses how embedded marketing can be harnessed to yield additional .... to the school of thought that look at film as nothing short of a lucrative ..... Awaeze, C.C.& Nworgu, K.O. “History of Motion Pictures and. Film Criticism “ In ...

  3. Singular interactions supported by embedded curves

    International Nuclear Information System (INIS)

    Kaynak, Burak Tevfik; Turgut, O Teoman

    2012-01-01

    In this work, singular interactions supported by embedded curves on Riemannian manifolds are discussed from a more direct and physical perspective, via the heat kernel approach. We show that the renormalized problem is well defined, the ground state is finite and the corresponding wavefunction is positive. The renormalization group invariance of the model is also discussed. (paper)

  4. The Embedding Theorems of Whitney and Nash

    Indian Academy of Sciences (India)

    We begin by briefly motivating the idea of amanifold and then discuss the embedding theorems of Whitney and Nash that allow us toview these objects inside appropriately large Euclidean spaces. Resonance – Journal of Science Education. Current Issue : Vol. 23, Issue 4. Current Issue Volume 23 | Issue 4. April 2018.

  5. Concurrent Design of Embedded Control Software

    NARCIS (Netherlands)

    Groothuis, M.A.; Frijns, Raymond; Voeten, Jeroen; Broenink, Johannes F.; Margaria, T.; Padberg, J.; Taentzer, G.; Levendovszky, T.; Lengyel, L.; Karsai, G.; Hardebolle, C.

    2009-01-01

    Embedded software design for mechatronic systems is becoming an increasingly time-consuming and error-prone task. In order to cope with the heterogeneity and complexity, a systematic model-driven design approach is needed, where several parts of the system can be designed concurrently. There is

  6. Integrated Design Tools for Embedded Control Systems

    NARCIS (Netherlands)

    Jovanovic, D.S.; Hilderink, G.H.; Broenink, Johannes F.; Karelse, F.

    2001-01-01

    Currently, computer-based control systems are still being implemented using the same techniques as 10 years ago. The purpose of this project is the development of a design framework, consisting of tools and libraries, which allows the designer to build high reliable heterogeneous real-time embedded

  7. Reusing knowledge in embedded system modelling

    NARCIS (Netherlands)

    Marincic, J.; Mader, Angelika H.; Wieringa, Roelf J.; Lucas, Yan

    Model-based design is a promising technique to improve the quality of software and the efficiency of the software development process. We are investigating how to efficiently model embedded software and its environment to verify the requirements for the system controlled by the software. The

  8. LC Circuits for Diagnosing Embedded Piezoelectric Devices

    Science.gov (United States)

    Chattin, Richard L.; Fox, Robert Lee; Moses, Robert W.; Shams, Qamar A.

    2005-01-01

    A recently invented method of nonintrusively detecting faults in piezoelectric devices involves measurement of the resonance frequencies of inductor capacitor (LC) resonant circuits. The method is intended especially to enable diagnosis of piezoelectric sensors, actuators, and sensor/actuators that are embedded in structures and/or are components of multilayer composite material structures.

  9. Pixels to Graphs by Associative Embedding

    KAUST Repository

    Newell, Alejandro; Deng, Jia

    2017-01-01

    network such that it takes in an input image and produces a full graph. This is done end-to-end in a single stage with the use of associative embeddings. The network learns to simultaneously identify all of the elements that make up a graph and piece them

  10. Simultaneous embedding: edge orderings, relative positions, cutvertices

    NARCIS (Netherlands)

    Bläsius, T.; Karrer, A.; Rutter, I.

    A simultaneous embedding (with fixed edges) of two graphs (Formula presented.) and (Formula presented.) with common graph (Formula presented.) is a pair of planar drawings of (Formula presented.) and (Formula presented.) that coincide on G. It is an open question whether there is a polynomial-time

  11. Polarizable Density Embedding Coupled Cluster Method

    DEFF Research Database (Denmark)

    Hršak, Dalibor; Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2018-01-01

    by an embedding potential consisting of a set of fragment densities obtained from calculations on isolated fragments with a quantum-chemistry method such as Hartree-Fock (HF) or Kohn-Sham density functional theory (KS-DFT) and dressed with a set of atom-centered anisotropic dipole-dipole polarizabilities...

  12. Excited States in Solution through Polarizable Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus; Aidas, Kestutis; Kongsted, Jacob

    2010-01-01

    mechanical calculation. The polarizable embedding potential is described by an atomistic representation including terms up to localized octupoles and anisotropic polarizabilities. It is generally applicable to any quantum chemical description but is here implemented for the case of Kohn−Sham density...

  13. On Verification Modelling of Embedded Systems

    NARCIS (Netherlands)

    Brinksma, Hendrik; Mader, Angelika H.

    Computer-aided verification of embedded systems hinges on the availability of good verification models of the systems at hand. Such models must be much simpler than full design models or specifications to be of practical value, because of the unavoidable combinatorial complexities in the

  14. Real-time Kernel Implementation Practice Program for Embedded Software Engineers' Education and its Evaluation

    Science.gov (United States)

    Yoshida, Toshio; Matsumoto, Masahide; Seo, Katsuhiko; Chino, Shinichiro; Sugino, Eiji; Sawamoto, Jun; Koizumi, Hisao

    A real-time kernel (henceforth RTK) is in the center place of embedded software technology, and the understanding of RTK is indispensable for the embedded system design. To implement RTK, it is necessary to understand languages that describe RTK software program code, system programming manners, software development tools, CPU on that RTK runs and the interface between software and hardware, etc. in addition to understanding of RTK itself. This means RTK implementation process largely covers embedded software implementation process. Therefore, it is thought that RTK implementation practice program is very effective as a means of the acquisition of common embedded software skill in addition to deeper acquisition of RTK itself. In this paper, we propose to apply RTK implementing practice program to embedded software engineers educational program. We newly developed very small and step-up type RTK named μK for educational use, and held a seminar that used μK as a teaching material for the students of information science and engineers of the software house. As a result, we confirmed that RTK implementation practice program is very effective for the acquisition of embedded software common skill.

  15. Evaluating Capacity Development

    International Development Research Centre (IDRC) Digital Library (Canada)

    She also had the dubious pleasure of checking and correcting the text numerous ... Has your organization received training or other types of support for capacity ...... processors, and consumer groups in its research and development work.

  16. THE INFLUENCE OF ECOLOGICAL MATERIALS EMBEDDED INTO COMPOSITES UPON THE THERMAL INSULATING CAPACITY

    Directory of Open Access Journals (Sweden)

    Luminiţa-Maria BRENCI

    2014-12-01

    Full Text Available The paper presents the results of a research performed in order to design and manufacture composites that embed in their structure ecological raw materials, such as wood chips and hemp hurds. The thermal conductivity was determined for a temperature difference (ΔT of 200 C between the cold plate and warm plate and the measurements were done in eight points. The results showed that the best insulating composite material was obtained for the structure containing equal shares of wood chips and chopped hemp

  17. Evaluation of protein immobilization capacity on various carbon nanotube embedded hydrogel biomaterials.

    Science.gov (United States)

    Derkus, Burak; Emregul, Kaan Cebesoy; Emregul, Emel

    2015-11-01

    This study investigates effective immobilization of proteins, an important procedure in many fields of bioengineering and medicine, using various biomaterials. Gelatin, alginate and chitosan were chosen as polymeric carriers, and applied in both their composites and nanocomposite forms in combination with carbon nanotubes (CNTs). The prepared nano/composite structures were characterized using scanning electron microscopy (SEM), Fourier-transform infrared spectroscopy (FTIR), thermal gravimetric analysis (TG) and contact angle analysis (CA). Electrochemical impedance spectroscopy analysis revealed gelatin composites in general to exhibit better immobilization performance relative to the native gelatin which can be attributed to enhanced film morphologies of the composite structures. Moreover, superior immobilization efficiencies were obtained with the addition of carbon nanotubes, due to their conducting and surface enhancement features, especially in the gelatin-chitosan structures due to the presence of structural active groups. Copyright © 2015 Elsevier B.V. All rights reserved.

  18. Effect of Embedment on the Vertical Bearing Capacity of Bucket Foundations in Clay

    DEFF Research Database (Denmark)

    Barari, Amin; Ibsen, Lars Bo

    2011-01-01

    To evaluate the undrained behaviour of bucket foundations installed on Yoldia clay, 100 tests on bucket foundations subject to vertical and moment loadings were conducted at Aalborg university geotechnical centre. Bucket foundations are tubular steel foundations that are installed by sealing...

  19. Revisiting Absorptive Capacity

    DEFF Research Database (Denmark)

    de Araújo, Ana Luiza Lara; Ulhøi, John Parm; Lettl, Christopher

    Absorptive capacity has mostly been perceived as a 'passive' outcome of R&D investments. Recently, however, a growing interest into its 'proactive' potentials has emerged. This paper taps into this development and proposes a dynamic model for conceptualizing the determinants of the complementary...... learning processes of absorptive capacity, which comprise combinative and adaptive capabilities. Drawing on survey data (n=169), the study concludes that combinative capabilities primarily enhance transformative and exploratory learning processes, while adaptive capabilities strengthen all three learning...

  20. Moving Object Detection in Heterogeneous Conditions in Embedded Systems.

    Science.gov (United States)

    Garbo, Alessandro; Quer, Stefano

    2017-07-01

    This paper presents a system for moving object exposure, focusing on pedestrian detection, in external, unfriendly, and heterogeneous environments. The system manipulates and accurately merges information coming from subsequent video frames, making small computational efforts in each single frame. Its main characterizing feature is to combine several well-known movement detection and tracking techniques, and to orchestrate them in a smart way to obtain good results in diversified scenarios. It uses dynamically adjusted thresholds to characterize different regions of interest, and it also adopts techniques to efficiently track movements, and detect and correct false positives. Accuracy and reliability mainly depend on the overall receipt, i.e., on how the software system is designed and implemented, on how the different algorithmic phases communicate information and collaborate with each other, and on how concurrency is organized. The application is specifically designed to work with inexpensive hardware devices, such as off-the-shelf video cameras and small embedded computational units, eventually forming an intelligent urban grid. As a matter of fact, the major contribution of the paper is the presentation of a tool for real-time applications in embedded devices with finite computational (time and memory) resources. We run experimental results on several video sequences (both home-made and publicly available), showing the robustness and accuracy of the overall detection strategy. Comparisons with state-of-the-art strategies show that our application has similar tracking accuracy but much higher frame-per-second rates.