WorldWideScience

Sample records for juliet revisited embedding

  1. "Romeo and Juliet": The Movie.

    Science.gov (United States)

    Lorenz, Sarah L.

    1998-01-01

    Argues that the 1996 film of "Romeo and Juliet" (starring Leonardo Di Caprio and Claire Danes, and transposed to inner-city gang culture) is a gripping presentation of Shakespeare's story of star-crossed lovers in an impulsive, hot-headed, violent world. Suggests that the film is practically guaranteed to make students love Shakespeare.…

  2. "Romeo and Juliet": The Movie.

    Science.gov (United States)

    Lorenz, Sarah L.

    1998-01-01

    Argues that the 1996 film of "Romeo and Juliet" (starring Leonardo Di Caprio and Claire Danes, and transposed to inner-city gang culture) is a gripping presentation of Shakespeare's story of star-crossed lovers in an impulsive, hot-headed, violent world. Suggests that the film is practically guaranteed to make students love Shakespeare. (SR)

  3. Signing Shakespeare: Romeo Loves Juliet.

    Science.gov (United States)

    Goldfarb, Liz; Cambridge, Terry

    1995-01-01

    A language arts teacher of junior high students with deafness or hearing impairments familiarized her students with "Romeo and Juliet" by telling the story in speech and signs, exploring the characters's personalities, reviewing vocabulary, putting the characters into contemporary situations, and directing the students in a full-scale production…

  4. Studying Characters in "Romeo and Juliet."

    Science.gov (United States)

    Guinhawa, Wilhelmina

    1994-01-01

    Describes an activity in which high school students who are reading "Romeo and Juliet" compile information on major characters and create a collection of cards similar to sports cards, to help them understand each character and that character's motives. (SR)

  5. Mixing It Up with "Romeo and Juliet."

    Science.gov (United States)

    Sanchez, Rebecca

    1997-01-01

    Presents a variety of reading, writing, art, and discussion activities to keep students interested in studying "Romeo and Juliet." Describes using the film version of the play as a companion piece to unify the oral reading. (RS)

  6. A Tragedy of Love-Romeo and Juliet

    Institute of Scientific and Technical Information of China (English)

    朱燕

    2016-01-01

    Romeo and Juliet is one of the most famous dramas of William Shakespeare. I like the novel very much and will give some ideas and comments from the three points: first, the difference between Romeo and Juliet & Butterfly Lovers; Second, the analysis of Romeo and Juliet's characters; Third, the great significance of the novel.

  7. Shakespeare Redux, or Romeo and Juliet Revisited: Embedding a Terminology and Name Change in a New Agenda for the Field of Mental Retardation.

    Science.gov (United States)

    Turnbull, Rud; Turnbull, Ann; Warren, Steve; Eidelman, Steve; Marchand, Paul

    2002-01-01

    This commentary discusses whether the American Association on Mental Retardation should change its name. It argues that changing the name would not change the stigma, and would harm advocacy efforts by allowing legislators to use a terminology change to narrow eligibility for supports. (Contains one reference.) (CR)

  8. Prokofiev. "Romeo and Juliet" - Suites / Iran March

    Index Scriptorium Estoniae

    March, Iran

    1991-01-01

    Uuest heliplaadist "Prokofiev. "Romeo and Juliet" - Suites: N 1 Op. 64 bis a; N 2 Op. 64 ter b; N 3 Op. 101 c. Royal Scottish National Orchestra /Neeme Järvi" Chandos cassette ABTD 1536; CD CHAN 8940 (78 minutes) etc

  9. "Romeo and Juliet" and the ESL Classroom.

    Science.gov (United States)

    Straughan, June

    1996-01-01

    Discusses an English teacher's approaches to introducing English-as-a-second-language students to Shakespeare's "Romeo and Juliet." Notes that the students responded with more enthusiasm than they had to any other selection they had read, and that the teacher had underestimated her students' ability to understand Shakespeare. (RS)

  10. Understanding "Romeo and Juliet": A Thematic Unit.

    Science.gov (United States)

    Koveleski, Erin

    This curriculum unit for Grade 9 combines the classic Shakespeare play "Romeo and Juliet" with three young adult novels: "The Outsiders" (S.E. Hinton), "Summer of My German Soldier" (Bette Greene), and "The Witch of Blackbird Pond" (Elizabeth George Speare). To complete the unit, all students will be required to read the Shakespeare play; however,…

  11. "Romeo and Juliet" in One Hour

    Science.gov (United States)

    Monthie-Doyum, Judy; Öztürk, Gülay

    2006-01-01

    This article describes the use of drama activities to motivate students, to teach vocabulary and pronunciation, and to enhance cooperative learning. The author describes in five steps the classroom procedure of an activity based on the play of "Romeo and Juliet." The author discusses the results of the activity and its implications. Play…

  12. Profiles in Research: Juliet Popper Shaffer

    Science.gov (United States)

    Robinson, Dan

    2005-01-01

    Robinson interviews Juliet Popper Shaffer, a scientist, who graduated from Swarthmore College in 1953 and Stanford in 1957 with degrees in psychology and concentrations in math, philosophy, and statistics. In 2004 she received the second Florence Nightingale David award given biannually by the Committee of Presidents of Statistical Societies to a…

  13. Prokofiev. "Romeo and Juliet" - Suites / Iran March

    Index Scriptorium Estoniae

    March, Iran

    1991-01-01

    Uuest heliplaadist "Prokofiev. "Romeo and Juliet" - Suites: N 1 Op. 64 bis a; N 2 Op. 64 ter b; N 3 Op. 101 c. Royal Scottish National Orchestra /Neeme Järvi" Chandos cassette ABTD 1536; CD CHAN 8940 (78 minutes) etc

  14. Prokofiev: Romeo and Juliet - Suite N1 / Ivan March

    Index Scriptorium Estoniae

    March, Ivan

    1990-01-01

    Uuest heliplaadist "Prokofiev: Romeo and Juliet - Suite N1, Op.64b, N2, Op.64c. Philharmonia Orchestra, Barry Wordsworth" Collins Classics cassette 1116-4. CD. Võrreldud Neeme Järvi plaadistustega 1116-2

  15. Prokofiev: Romeo and Juliet - Suite N1 / Ivan March

    Index Scriptorium Estoniae

    March, Ivan

    1990-01-01

    Uuest heliplaadist "Prokofiev: Romeo and Juliet - Suite N1, Op.64b, N2, Op.64c. Philharmonia Orchestra, Barry Wordsworth" Collins Classics cassette 1116-4. CD. Võrreldud Neeme Järvi plaadistustega 1116-2

  16. Godiva and Juliet Diagnostics CED-1 (IER-176)

    Energy Technology Data Exchange (ETDEWEB)

    Scorby, J C

    2011-12-21

    A suite of diagnostics are being proposed for use in the Juliet experiment (IER-128). In order to calibrate and test the diagnostics prior to use, the LLNL calibration facility and Godiva pulsed reactor will be used to provide intense sources of neutrons and gammas. Due to the similarities of the Godiva and Juliet radiation fields, the diagnostics being developed and tested for Juliet can also play an on-going role in diagnostics for Godiva as well as, perhaps, other critical assembly experiments. Similar work is also being conducted for IER-147 for the purpose of characterizing the Godiva radiation field in support of an upcoming international nuclear accident dosimetry exercise. Diagnostics developed and fielded under IER-147 can provide valuable data with respect to the neutron and gamma energy spectrums in the vicinity of Godiva which is relevant to the calibration of Juliet diagnostics.

  17. Embedding

    DEFF Research Database (Denmark)

    Høyrup, Jens

    2016-01-01

    “Embedding” as a technical concept comes from linguistics, more precisely from grammar. The present paper investigates whether it can be applied fruitfully to certain questions that have been investigated by historians (and sometimes philosophers) of mathematics: 1. The construction of numeral sy...... spatial and linguistic embedding and concludes that the spatio-linguistic notion of embedding can be meaningfully applied to the former two discussions, whereas the apparent embedding of older within new theories is rather an ideological mirage....

  18. Embedding

    DEFF Research Database (Denmark)

    Høyrup, Jens

    2015-01-01

    to become the starting point not only for theoretical algebra, but for the whole transformation of mathematics from his time onward: the possibility of embedding, that is, of making a symbol or an element of a calculation stand not only for a single number, determined or undetermined, but for a whole...

  19. Teaching "Romeo and Juliet" in the Nontracked English Classroom.

    Science.gov (United States)

    Adams, Pamela E.

    1995-01-01

    Uses "Romeo and Juliet" to show how high school teachers can teach complex literary texts in nontracked classrooms by building background knowledge and teaching self-monitoring strategies. Explains strategies such as text previews, story impressions, prereading plan, thinking aloud, self-questioning based on story grammar, and reciprocal teaching.…

  20. Exploring Shakespeare: Dynamic Drama Conventions in Teaching "Romeo and Juliet."

    Science.gov (United States)

    Robinson, Sophie

    1999-01-01

    Outlines a Year 10 unit on teaching "Romeo and Juliet" based on standard experiential conventions which include the following: (1) Teacher in Role, (2) Soundscaping, (3) Freeze Frames, (4) Alter Egos, (5) Hot Seating, and (6) Role Playing. Suggests that these conventions can be applied to the study of any Shakespearean play. (NH)

  1. Stratford Studios Proudly Liberates Romeo & Juliet [CD-ROM].

    Science.gov (United States)

    1997

    This CD-ROM product is an interactive supplement to Shakespeare's text of "Romeo and Juliet." It contains an interactive cast of characters and the entire script of the play with an accessible audio performance. Other features include: "Dr. Wacko"--a feature that calls the student's attention to the more subtle nuances of the plot by asking…

  2. Baz, the Bard and Borrowing: "Romeo and Juliet" on Film.

    Science.gov (United States)

    Allen, Rhonda; Guest, Peter

    1999-01-01

    Outlines a unit of study of Baz Luhrmann's 1997 film version of "Romeo and Juliet" for Year 10 students in Australia. Includes a series of lessons/questions and activities that include directing students (1) to consider speed and editing and character analysis; (2) to engage in language comparison; and (3) to generate extended responses. (NH)

  3. Street Signs: Semiotics, Romeo and Juliet, and Young Adult Literature.

    Science.gov (United States)

    Moore, John Noell

    1998-01-01

    Presents basic working principles and a vocabulary of semiotics for classroom teachers; interprets semiotically a story from the teaching of "Romeo and Juliet" that reveals the literary and nonliterary texts of students' lives; and demonstrates semiotic approaches to two texts that illustrate how to locate literature in the context of the culture…

  4. The Sixty-Minute Shakespeare: "Romeo and Juliet."

    Science.gov (United States)

    Foster, Cass

    Developed for theaters or classrooms that wish to present abbreviated versions of Shakespeare's plays without changing the language, this book presents an edited version of "Romeo and Juliet" suitable for presentation in one hour. The book also presents an affordable set design, sound and prop requirements, costume suggestions, definitions and…

  5. Tights vs. Tattoos: Filmic Interpretations of "Romeo and Juliet."

    Science.gov (United States)

    Martin, Jennifer L.

    2002-01-01

    Suggests students will view film adaptations of Shakespeare plays more critically by carefully analyzing the same scene from several different film versions. Discusses relevant scenes from "Romeo and Juliet" for classroom interpretation. Suggests that by providing students the vocabulary to discuss the film, educators can encourage them to look…

  6. Shakespeare for Children: The Story of "Romeo and Juliet."

    Science.gov (United States)

    Foster, Cass

    Written for adults who wish to read to children and children able to read on their own, this book presents an edited version of William Shakespeare's "Romeo and Juliet." The book includes selections of the original text of the play, prose passages explaining what occurs between selections of the play, numerous full-page illustrations, and…

  7. For better and for worst: Romeo and Juliet.

    Science.gov (United States)

    Schwaber, Paul

    2006-01-01

    Shakespeare's famous young lovers, however "star-crossed," contribute crucially to their tragic fate. From a period between before "adolescence" was conceptualized or named, they offer vivid evidence of what we recognize as early adolescent passions, yearnings, and connections, their evocativeness and their dangers. Juliet especially is presented as eloquent in her remarkable awareness of powerful and unfamiliar feelings. The play exemplifies the useful bearings of imaginative literature and psychoanalysis on one another

  8. The Impact of the Tyrannical Use of Power in Family in Romeo and Juliet

    Institute of Scientific and Technical Information of China (English)

    刘冬梅

    2012-01-01

    This essay seeks to examine the tyrannical use of power in family in Romeo and Juliet, and discuss how this tyrannical use of power in family leads Juliet to despair, and to die in the end. It also analyses whether the impact of family power has contributed to making the play more tragic and accelerating the process of tragedy.

  9. "You Kiss by the Book": Shakespeare's "Romeo and Juliet." [Lesson Plan].

    Science.gov (United States)

    2000

    This lesson plan complements study of plot and characterization in "Romeo and Juliet" by focusing on Shakespeare's use of lyric forms and conventions to spotlight moments in the drama and thereby heightens the impact of the action on the stage. Students look first at the sonnet in which Romeo and Juliet meet, analyzing the imagery to gain insight…

  10. Exploring Romeo and Juliet. ArtsEdge Curricula, Lessons and Activities.

    Science.gov (United States)

    Fullard, Barbara Lois; Karsten, Jayne

    This curriculum unit examines William Shakespeare's tragic play, "Romeo and Juliet." The unit calls the play "one of the greatest and saddest love stories of all time," and notes that artists across centuries and oceans have retold the tale of "Romeo and Juliet" in various forms and incarnations. It first presents…

  11. An Analysis of Puns in Romeo and Juliet by Shakespeare

    Institute of Scientific and Technical Information of China (English)

    Liu Changrui; Wang Xiaoli

    2016-01-01

    The play Romeo and Juliet written by Shakespeare is one of the most great tragedies in the world.Even through it is not in the Four Great Tragedies of Shakespeare,the play had won many readers' and audience's tear.Shakespeare is such a great writer that he used many writing techniques to model his characters.The most obvious technique is the use of pun.This thesis is going to make a simple research of the puns in the play.

  12. National Theatre of China's Romeo and Juliet and Its Rituals

    Directory of Open Access Journals (Sweden)

    Benny Lim

    2014-04-01

    Full Text Available This paper explores the “Chinese-ness” of this brand new production of Romeo and Juliet by the National Theatre of China, from a ritual perspective. Three main areas were discussed. Firstly, this play has got several religious connotations. The absence of religion in this play’s setting is relevant to China’s current high percentage of atheists. Despite that, several religions, such as Buddhism, Daoism and Christianity, are mentioned in this play. Secondly, the play has also incorporated several Chinese culture and traditions. The use of bicycles as one of the main props can be linked to the cultural significance of bicycles in China. The play also incorporated other cultural and traditional elements such as wedding customaries in China, Xinjiang dance, as well as the Chinese tongue twisters. Finally, the play has incorporated multiple Brechtian moments. Perhaps the Brechtian moments can lead audience to think about the current religious and cultural developments in modern China.

  13. "Romeo and Juliet" in the Minneapolis Public Schools: Accurate Text or Bowdlerized Text?

    Science.gov (United States)

    Reed, Margaret A.

    In 1984, parents of a Minneapolis, Minnesota, ninth grader came before the school district's "Students' Right to Learn Committee" to object to what they described as a bowdlerized version of "Romeo and Juliet" in the Scott, Foresman text, and the publisher's failure to acknowledge in the text that the play was abridged. The committee concurred…

  14. "Romeo and Juliet." A Play Packet To Accompany "Elementary, My Dear Shakespeare."

    Science.gov (United States)

    Engen, Barbara; Campbell, Joy

    Intended for use by elementary school teachers as a supplement to the book, "Elementary, My Dear Shakespeare," or for use by itself to produce a Shakespeare play, this play packet contains ready-to-reproduce materials for the production of "Romeo and Juliet." Materials include: staging suggestions for scenery, props, lighting, and costumes; a…

  15. Shake Up Your Shakespeare: Creative Drama Activities for "Romeo and Juliet."

    Science.gov (United States)

    Hett, Dorothy; Haring, Dana

    This paper presents creative drama activities based on Shakespeare's "Romeo and Juliet" for use in ninth-grade English classrooms. The activities are divided into sections on improvisation, pantomime, image-making and creative drama, reader's theater, drama scenes, interior monologue, and producing plays. Each section of the paper presents…

  16. "Music with Her Silver Sound": An Introduction to "Romeo and Juliet."

    Science.gov (United States)

    Sheaffer, Lloyd E.

    1992-01-01

    Asserts that the key to incorporating music effectively into the English classroom is to provide a context for the music. Describes a teacher's introduction to Shakespeare's "Romeo and Juliet" that demonstrates one way to use music and which helps accomplish the goals of the literary unit. (PRA)

  17. Challenging Normative Sexual and Gender Identity Beliefs through Romeo and Juliet

    Science.gov (United States)

    Ressler, Paula

    2005-01-01

    Paula Ressler, an English teacher, suggests unconventional ways to work with William Shakespeare's "Romeo and Juliet" in the secondary school English curriculum to challenge normative sexual and gender identity beliefs. Reading queerly to explore non-normative sex and gender identities and reading for social justice have the potential to include…

  18. "What is it else?" Love's (Con-Text in Romeo and Juliet

    Directory of Open Access Journals (Sweden)

    Aliakbari H.

    2012-01-01

    Full Text Available Reading Romeo and Juliet from Jacques Derrida's perspective provides us with new insight to Shakespeare's portrayal of love. As an early tragedy, Romeo and Juliet is a study of the nature of love. Many believe that the play still follows the lead of the comedies in presenting its major theme. However, drawing upon Derrida's deconstruction of the play, we have shown that love as an idea, a word, or a nomenclature, follows the same aporetic law of the proper name in that it is split, not unified, contradictory, not lucidly meaningful. We have demonstrated the multiplicity of love's identity despite the universally unifying attributes attached to it by the individual characters inside the play. In short, this reading reveals that identity in general, and the identity of love in particular, is not fixed, that they are products of textuality.

  19. Godiva IV and Juliet Diagnostics CED-1, Rev. 1 (IER-176)

    Energy Technology Data Exchange (ETDEWEB)

    Scorby, J C; Myers, W L

    2012-04-11

    The Juliet experiment is currently in preliminary design (IER-128). This experiment will utilize a suite of diagnostics to measure the physical state of the device (temperature, surface motion, stress, etc.) and the total and time rate of change of neutron and gamma fluxes. A variety of potential diagnostics has been proposed in this CED-1 report. Based on schedule and funding, a subset of diagnostics will be selected for testing using the Godiva IV pulsed reactor as a source of neutrons and gammas. The diagnostics development and testing will occur over a two year period (FY12-13) culminating in a final set of diagnostics to be fielded for he Juliet experiment currently proposed for execution in FY15.

  20. Du Liniang And Juliet-On Shakespeare's Play from the Perspective of Tang Xianzu

    Institute of Scientific and Technical Information of China (English)

    郭蕾吟; 郭峘

    2013-01-01

    Shakespeare and Tang Xianzu, who totally do not affect each, actually have two love plays. According to this feature, in this paper, I analyze these two plays in the changing subject matter, the theme, characters, the structure, play conflicts, tragedy styles and so on which are approximate in the external form——Romeo And Juliet and The Peony Pavilion, and discuss the differ⁃ences of these two plays and the characteristics and rules of east and west plays.It objectively describes the similarities and differ⁃ences on the conflict and rhythm. Romeo And Juliet and The Peony Pavilion are different in structural style and rhythm, because of different artistic character for each type of drama they belong to. It emphasizes similarities and differences of the tragedy style and the end. Chinese classical tragedy and the Shakespeare tragedy. This paper analyzes and contrasts Romeo and Juliet and The Peo⁃ny Pavilion by the methods of comparison and contrast, and demonstrates different characteristics and styles of east and west plays as well as studies the profoundly historical culture behind the plays.

  1. Claire Danes's Star-Body, Teen Female Viewers and the Pluralisation of Authorship in Baz Luhrmann's "William Shakespeare's Romeo + Juliet"

    Science.gov (United States)

    Keam, Angela

    2008-01-01

    Teaching William Shakespeare's canonical tragedy "Romeo and Juliet" to teenagers in the context of the English classroom in Australia is not a particularly new pedagogical practice. In the year 2008, when many teachers (particularly those with a feminist bent such as I) are intent on guiding their students to decipher the ideological…

  2. Claire Danes's Star-Body, Teen Female Viewers and the Pluralisation of Authorship in Baz Luhrmann's "William Shakespeare's Romeo + Juliet"

    Science.gov (United States)

    Keam, Angela

    2008-01-01

    Teaching William Shakespeare's canonical tragedy "Romeo and Juliet" to teenagers in the context of the English classroom in Australia is not a particularly new pedagogical practice. In the year 2008, when many teachers (particularly those with a feminist bent such as I) are intent on guiding their students to decipher the ideological motivations…

  3. Claire Danes's Star-Body, Teen Female Viewers and the Pluralisation of Authorship in Baz Luhrmann's "William Shakespeare's Romeo + Juliet"

    Science.gov (United States)

    Keam, Angela

    2008-01-01

    Teaching William Shakespeare's canonical tragedy "Romeo and Juliet" to teenagers in the context of the English classroom in Australia is not a particularly new pedagogical practice. In the year 2008, when many teachers (particularly those with a feminist bent such as I) are intent on guiding their students to decipher the ideological…

  4. “By Looking Liking”: Baz Luhrmann’S William Shakespeare’S Romeo+Juliet

    Directory of Open Access Journals (Sweden)

    Cinpoeş Nicoleta

    2016-08-01

    Full Text Available Twenty years since its release onto the big screen, Baz Luhrmann’s William Shakespeare’s Romeo + Juliet continues to attract viewers, divide critics and remain unchallenged, in a league of its own, when it comes to film adaptation of Shakespeare’s plays. This article begins with taking stock of reception directions which still dispute the field of film adaptation. Cued by Worthen’s “Performance Paradigm”, my argument positions Luhrmann’s film (his second at the time and the one to propel the Australian director into Hollywood fame firmly in the cinematic and sees the film narrative not as opposed to the textual and/or spoken one, but as a complex citational practice developed at the level of oral, visual and written discourse.

  5. Hard Love-The Comparison between Romeo and Juliet and Under the Hawthorn Tree

    Institute of Scientific and Technical Information of China (English)

    张倩; 张露

    2013-01-01

    Although the two stories occurred under distinctive era with different social background, both of Romeo and Juliet and Under the hawthorn tree are, to some extent, regarded as tragic romance. From the perspective of humanism, the essay at⁃tempts to analyze the inevitability of the tragic love. At the background of European Renaissance, who declared that human born with right of pursuing happiness, freedom and equality; Chinese Cultural Revolution was an era which constrained the humanity by morality and law. Love is thought to be as an eternal topic. Under the circumstances of European Renaissance and Chinese Cultural Revolution, flipping the new chapters of arts’renovation, became the thruster of these two hard love stories.

  6. Parody and the gas station in William Shakespeare's Romeo and Juliet

    Directory of Open Access Journals (Sweden)

    Avital G. Cykman

    2017-01-01

    Baz Luhrmann’s 1996 film, William Shakespeare'sRomeo and Juliet, is a pop-culture adaptation of the late sixteenth-century play. The cross-references and transgression of allusions and their postmodern subversive statement along with the extreme intensity with which these elements appear in act one, scene one, and especially in the scene placed at a gas station produce a self-directed irony, a cutting-edge, if playful combination of references that define it as parody in the postmodern sense. Hence, this article examines act one, scene one with a special attention to the gas station sequence, and analyzes it in the light of scholarly definitions of postmodern parody by Linda Hutcheon, John W. Duvall and Douglas Lanier, and of pastiche by Fredric Jameson. Once the hypothesis of parody is established, the article analyzes what the film parodies and in what ways, and what the objective and the impact of the applied humor are.

  7. The European Herbal Medicines Directive: could it have saved the lives of Romeo and Juliet?

    Science.gov (United States)

    Routledge, Philip A

    2008-01-01

    need to be aware that 'natural' does not necessarily mean 'safe' in all circumstances. They should be fully informed about all medicines they take. Consideration also needs to be given to effective regulation of herbal medicines practitioners, so that they are identifiable in law, are governed by professional codes of practice and have agreed standards of training and competency. There are many references to herbal medicines in Shakespeare's tragedy, Romeo and Juliet, which was written around 1595. A herbal medicine (distilled liquor) was almost certainly used to put Juliet into a deep sleep. A poison, possibly of herbal origin, was used by Romeo to take his own life when he thought his beloved Juliet was dead, rather than sleeping. While European herbal medicines regulation seeks to protect the public health by ensuring the necessary guarantees of quality, safety and efficacy, it was poor communication that appears to have triggered the chain of events leading to the death of Romeo and Juliet. Good communication between regulators, practitioners, patients and the public is necessary so that those who choose to take herbal medicines can do so with acceptable safety.

  8. La Délinquance Idéologique: Sony Labou Tansi and the Political Love Story of Romeo and Juliet

    Directory of Open Access Journals (Sweden)

    Rebekah Bale

    2016-12-01

    Full Text Available The article discusses an adaptation of William Shakespeare's Romeo and Juliet, (La Résurrection Rouge et Blanche de Romeo et Juliette- 'The Red and White Revival of Romeo and Juliet' by the Congolese writer Sony Labou Tansi. It examines the consequences of a focus on the political frame of the narrative. Sony's version is an indictment of a monstrous and hyper-violent political system in which the only choice left is the manner of one’s death. Sony uses the play as a means to interrogate a society that focuses on the political fetishization of violent dictatorships and nihilistic choices. With a radical shift in focus, Sony’s work also requires the audience / reader to consider the necessity of theatre and, by extension, the power under which it operates. Sony’s language in this adaptation gives the story of Romeo and Juliet, a post-colonial framework as well as an urgent political message. The analysis concludes that the adaptation presents the conventional love story as a political tragedy of the post-colonial condition.

  9. Translating Proper Names in the Vietnamese Translation of Shakespeare’s Romeo and Juliet

    Directory of Open Access Journals (Sweden)

    Nhan V. Luong,

    2015-07-01

    Full Text Available Cultural differences are always the great challenges for translators in the translation process. When dealing with cultural barrier, metaphor is a typical struggle, in which Proper names necessitate consideration because the translation might cause confused and misunderstood as well as negative feelings of the readers to the original text. A name can be popular used in a source culture (SC or a country but too strange or the taboo in a target culture (TC. This study, by applying both qualitative and quantitative research methods, has described and compared the translations of proper names in the Shakespeare’s Romeo and Juliet and its Vietnamese translation by Dang The Binh. The findings reveal that besides similarities, when using popular proper names, English and Vietnamese cultures have many different names that require careful analysis and understanding of the translator. It is concluded that foreignization and domestication should be applied flexibly in order to introduce a friendly translation that honors both the SC and the TC.

  10. Equivalence in the Vietnamese Translation of Shakespeare’s Romeo and Juliet

    Directory of Open Access Journals (Sweden)

    Van Nhan Luong

    2016-03-01

    Full Text Available Equivalence has been the central concern in Translation Studies and always challenges the translator’s abilities. Equivalence is also the factor determining the closeness of target text (TT to the source text (ST. By applying the theories suggested by Vinay and Darbelnet, Nida and Taber, Catford, Baker, House and Pym, as well as the qualitative method to describe the semantic features of the ST and the TT, this study has investigated and compared the Shakespeare’s English and the Vietnamese translation of Romeo and Juliet by Dang The Binh to find out the levels of equivalence in regards to semantic features. It has been found that both objective and subjective factors, in which language differences, culture and the translator’s ability are the keys affecting the orientation of choosing equivalents of the translator. It is, therefore, no unique type of equivalence in the Vietnamese translation, but the mixture of dynamic equivalence and formal equivalence. As a result, the translation is partly covert and also partly overt.

  11. Lakatos Revisited.

    Science.gov (United States)

    Court, Deborah

    1999-01-01

    Revisits and reviews Imre Lakatos' ideas on "Falsification and the Methodology of Scientific Research Programmes." Suggests that Lakatos' framework offers an insightful way of looking at the relationship between theory and research that is relevant not only for evaluating research programs in theoretical physics, but in the social…

  12. Embedded Leverage

    DEFF Research Database (Denmark)

    Frazzini, Andrea; Heje Pedersen, Lasse

    Many financial instruments are designed with embedded leverage such as options and leveraged exchange traded funds (ETFs). Embedded leverage alleviates investors’ leverage constraints and, therefore, we hypothesize that embedded leverage lowers required returns. Consistent with this hypothesis, we...... find that asset classes with embedded leverage offer low risk-adjusted returns and, in the cross-section, higher embedded leverage is associated with lower returns. A portfolio which is long low-embedded-leverage securities and short high-embedded-leverage securities earns large abnormal returns......, with t-statistics of 8.6 for equity options, 6.3 for index options, and 2.5 for ETFs. We provide extensive robustness tests and discuss the broader implications of embedded leverage for financial economics....

  13. Intelligence Revisited

    Science.gov (United States)

    2005-05-01

    environment (i.e., culture , class, family, educational 2 Chapter 23 Intelligence Revisited opportunities, gender) shapes our intellect, and there are no...connectivity is going to be rather problematic, to say the least. A single nano-bot cruising this Disneyland of synaptic wonderment is certainly... cultures ). Embodiment – A sense of being anchored to our physical bodies. Agency – A sense of free will, wherein we are in charge of our own

  14. 65 Revisited

    OpenAIRE

    2010-01-01

    Pennebaker hat doch zurückgeblickt. In weiteren fünfundsechzig Minuten zeigt er mit 65 REVISITED neue und ergänzende Facetten von Bob Dylan auf seiner 1965er Tournee durch England aus bisher unveröffentlichtem und digital aufgearbeitetem Material. Couchman (2002, 94) betont, dass Dylan über vierzig Jahre nach DON‘T LOOK BACK (1965) noch immer nichts von seiner enigmatischen Ausstrahlung verloren habe. Das gleiche gilt auch für den Film und für seine Ergänzung.

  15. Carleson embeddings

    Directory of Open Access Journals (Sweden)

    Helmut J. Heiming

    1996-01-01

    Full Text Available In this paper we discuss several operator ideal properties for so called Carleson embeddings of tent spaces into specific L q(μ-spaces, where μ is a Carleson measure on the complex unit disc. Characterizing absolutely q-summing, absolutely continuous and q-integral Carleson embeddings in terms of the underlying measure is our main topic. The presented results extend and integrate results especially known for composition operators on Hardy spaces as well as embedding theorems for function spaces of similar kind.

  16. The Analysis of Differences and Similarities of Eastern and Western Women’s Images in Liang Sanbo Yu Zhu Yingtai and Romeo and Juliet Novel

    Directory of Open Access Journals (Sweden)

    Yenny Yenny

    2010-11-01

    Full Text Available Sanpek Engtay and Romeo Juliet are the two famous classic love novels from Eastern and Western countries. They are liked by many generation of eastern and western readers. Both novels describe the image of women at each decade. Engtay represents the image of women at feudalism era while Juliet represents it Renainsance era. In this article, the writer did research at education, marriage, love, women's personality, and women's position at each decade. Library research was done in this study with the purpose of letting people know the differences and similarities of women's images between those two decades It can be concluded that in both writings, they have some similarities when describing love, mindset, and women's personality. The differences are about education, marriage, and women's position at feudalism and Renainsance decades.

  17. A Comparison of the English and Vietnamese Translation of Romeo and Juliet in Terms of Rhythm and Speech Patterns

    Directory of Open Access Journals (Sweden)

    Nhan V. Luong

    2015-05-01

    Full Text Available Translation is the bridge connecting languages, cultures, and people around the world throughout history, from past to present, in time and space. The quality of translation affects the closeness and tightness of those connections. A translation can cause misconceptions, contort tone, and misinterpret cultural references, while a translation can also bring a positive impression to foreign readers not only of the text, but also of the country, people, and culture of origin. In Translation Studies, faithfulness is the central concern of philological theories that focus on literary genres, stylistics, and rhetoric between the Source Language (SL and Target Language (TL. Translating literary and dramatic texts for stage performance, especially Shakespeare’s plays, always requires specific criteria to convey the original meanings as well as the performability, in which the poetic feature is the most difficult task for any translator. This study, based on this fundamental principle, compares and contrasts the original text of Shakespeare’s Romeo and Juliet with its Vietnamese translation by Dang The Binh to examine how much the translator has done to maintain the rhythmic and speech patterns. It is concluded that the Vietnamese translation was unable to maintain the Iambic Pentameter of the Source Text (ST while other rhythmic syllables were conveyed randomly.

  18. Embedded Hardware

    CERN Document Server

    Ganssle, Jack G; Eady, Fred; Edwards, Lewin; Katz, David J; Gentile, Rick

    2007-01-01

    The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!. Circuit design using microcontrollers is both a science and an art. This book covers it all. It details all of the essential theory and facts to help an engineer design a robust embedded system. Processors, memory, and the hot topic of interconnects (I/O) are completely covered. Our authors bring a wealth of experience and ideas; thi

  19. Marketization Revisited

    DEFF Research Database (Denmark)

    Hansen, Morten Balle; Lindholst, Andrej Christian

    2016-01-01

    Purpose: The purpose of this introduction article to the IJPSM special issue on marketization is to clarify the conceptual foundations of marketization as a phenomenon within the public sector and to gauge current marketization trends on the basis of the seven articles in the special issue. Design....../methodology/approach: Conceptual clarification and cross-cutting review of seven articles analysing marketization in six countries in three policy areas at the level of local government. Findings: Four ideal-type models are deduced: Quasi-markets, involving both provider competition and free choice for users; Classic contracting...... out; Benchmarking and yardstick competition; and Public-Private collaboration. On the basis of the review of the seven articles, it is found that all elements in all marketization models are firmly embedded but also under dynamic change within public service delivery systems. The review also...

  20. The Mother, Who Is Not One: Reflections Of Motherhood In Shakespeare's Romeo And Juliet, The Tempest, And The Taming Of The Shrew

    Directory of Open Access Journals (Sweden)

    KARAMAN HATICE

    2014-12-01

    Full Text Available The lack of proper motherhood in Shakespeare's plays has been a point of attraction for many feminist critics actively engaged in emphasizing the patriarchal aspect of Shakespeare's plays. This paper aims to analyze motherhood and the lack of mother/mother-figure in The Tempest, Romeo and Juliet and The Taming of the Shrew through Luce Irigaray's theory of gender and the work of other feminist critics. The issues of gender, father-daughter relations and the reflections of the absent mothers will be discussed. Male/Female Subjectivity will also be questioned, in view of Irigaray's conceptualization of gender by relating it to Subject.

  1. An embedded crack in a constant strain triangle utilizing extended finite element concepts

    DEFF Research Database (Denmark)

    Olesen, J.F.; Poulsen, P.N.

    2013-01-01

    This paper revisits the formulation of the CST element with an embedded discrete crack taking advantage of the direct formulations developed within the framework of the extended finite element method, XFEM. The result is a simple element for modeling cohesive fracture processes in quasi-brittle m......This paper revisits the formulation of the CST element with an embedded discrete crack taking advantage of the direct formulations developed within the framework of the extended finite element method, XFEM. The result is a simple element for modeling cohesive fracture processes in quasi...

  2. Embedded Processor Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Embedded Processor Laboratory provides the means to design, develop, fabricate, and test embedded computers for missile guidance electronics systems in support...

  3. Conceptualizing Embedded Configuration

    DEFF Research Database (Denmark)

    Oddsson, Gudmundur Valur; Hvam, Lars; Lysgaard, Ole

    2006-01-01

    and services. The general idea can be named embedded configuration. In this article we intend to conceptualize embedded configuration, what it is and is not. The difference between embedded configuration, sales configuration and embedded software is explained. We will look at what is needed to make embedded...... configuration systems. That will include requirements to product modelling techniques. An example with consumer electronics will illuminate the elements of embedded configuration in settings that most can relate to. The question of where embedded configuration would be relevant is discussed, and the current...

  4. Extrinsic Curvature Embedding Diagrams

    CERN Document Server

    Lu, J L

    2003-01-01

    Embedding diagrams have been used extensively to visualize the properties of curved space in Relativity. We introduce a new kind of embedding diagram based on the {\\it extrinsic} curvature (instead of the intrinsic curvature). Such an extrinsic curvature embedding diagram, when used together with the usual kind of intrinsic curvature embedding diagram, carries the information of how a surface is {\\it embedded} in the higher dimensional curved space. Simple examples are given to illustrate the idea.

  5. Gravity current jump conditions, revisited

    Science.gov (United States)

    Ungarish, Marius; Hogg, Andrew J.

    2016-11-01

    Consider the flow of a high-Reynolds-number gravity current of density ρc in an ambient fluid of density ρa in a horizontal channel z ∈ [ 0 , H ] , with gravity in - z direction. The motion is often modeled by a two-layer formulation which displays jumps (shocks) in the height of the interface, in particular at the leading front of the dense layer. Various theoretical models have been advanced to predict the dimensionless speed of the jump, Fr = U /√{g' h } ; g' , h are reduced gravity and jump height. We revisit this problem and using the Navier-Stokes equations, integrated over a control volume embedding the jump, derive balances of mass and momentum fluxes. We focus on understanding the closures needed to complete this model and we show the vital need to understand the pressure head losses over the jump, which we show can be related to the vorticity fluxes at the boundaries of the control volume. Our formulation leads to two governing equations for three dimensionless quantities. Closure requires one further assumption, depending on which we demonstrate that previous models for gravity current fronts and internal bores can be recovered. This analysis yield new insights into existing results, and also provides constraints for potential new formulae.

  6. Revisiting Okun's Relationship

    NARCIS (Netherlands)

    Dixon, R.; Lim, G.C.; van Ours, Jan

    2016-01-01

    Our paper revisits Okun's relationship between observed unemployment rates and output gaps. We include in the relationship the effect of labour market institutions as well as age and gender effects. Our empirical analysis is based on 20 OECD countries over the period 1985-2013. We find that the

  7. Revisiting city connectivity

    NARCIS (Netherlands)

    Mans, U.

    2014-01-01

    This article introduces a new perspective on city connectivity in order to analyze non-hub cities and their position in the world economy. The author revisits the different approaches discussed in the Global Commodity Chains (GCC), Global Production Networks (GPN) and World City Network (WCN) discou

  8. A Hydrostatic Paradox Revisited

    Science.gov (United States)

    Ganci, Salvatore

    2012-01-01

    This paper revisits a well-known hydrostatic paradox, observed when turning upside down a glass partially filled with water and covered with a sheet of light material. The phenomenon is studied in its most general form by including the mass of the cover. A historical survey of this experiment shows that a common misunderstanding of the phenomenon…

  9. Concept Image Revisited

    Science.gov (United States)

    Bingolbali, Erhan; Monaghan, John

    2008-01-01

    Concept image and concept definition is an important construct in mathematics education. Its use, however, has been limited to cognitive studies. This article revisits concept image in the context of research on undergraduate students' understanding of the derivative which regards the context of learning as paramount. The literature, mainly on…

  10. Revisiting the Okun relationship

    NARCIS (Netherlands)

    Dixon, R. (Robert); Lim, G.C.; J.C. van Ours (Jan)

    2017-01-01

    textabstractOur article revisits the Okun relationship between observed unemployment rates and output gaps. We include in the relationship the effect of labour market institutions as well as age and gender effects. Our empirical analysis is based on 20 OECD countries over the period 1985–2013. We

  11. The Faraday effect revisited

    DEFF Research Database (Denmark)

    Cornean, Horia; Nenciu, Gheorghe

    2009-01-01

    This paper is the second in a series revisiting the (effect of) Faraday rotation. We formulate and prove the thermodynamic limit for the transverse electric conductivity of Bloch electrons, as well as for the Verdet constant. The main mathematical tool is a regularized magnetic and geometric...

  12. A Hydrostatic Paradox Revisited

    Science.gov (United States)

    Ganci, Salvatore

    2012-01-01

    This paper revisits a well-known hydrostatic paradox, observed when turning upside down a glass partially filled with water and covered with a sheet of light material. The phenomenon is studied in its most general form by including the mass of the cover. A historical survey of this experiment shows that a common misunderstanding of the phenomenon…

  13. On Romeo and Juliet

    Institute of Scientific and Technical Information of China (English)

    付景波

    1999-01-01

    本文通过对莎士比亚悲剧中罗密欧与朱丽叶的人物分析以及对其诸剧人物。情节安排的对比,试图揭示莎士比亚对悲剧效果的特殊处理和对人物描写的特殊风格。《罗密欧与朱丽叶》虽属悲剧,但从精神上说它具有喜剧特征。莎翁一改传统模式,塑造了悲喜双重人物性格。

  14. Fossil turbulence revisited

    CERN Document Server

    Gibson, C H

    1999-01-01

    A theory of fossil turbulence presented in the 11th Liege Colloquium on Marine turbulence is "revisited" in the 29th Liege Colloquium "Marine Turbulence Revisited". The Gibson (1980) theory applied universal similarity theories of turbulence and turbulent mixing to the vertical evolution of an isolated patch of turbulence in a stratified fluid as it is constrained and fossilized by buoyancy forces. Towed oceanic microstructure measurements of Schedvin (1979) confirmed the predicted universal constants. Universal constants, spectra, hydrodynamic phase diagrams (HPDs) and other predictions of the theory have been reconfirmed by a wide variety of field and laboratory observations. Fossil turbulence theory has many applications; for example, in marine biology, laboratory and field measurements suggest phytoplankton species with different swimming abilities adjust their growth strategies differently by pattern recognition of several days of turbulence-fossil-turbulence dissipation and persistence times above thres...

  15. Deterministic Graphical Games Revisited

    DEFF Research Database (Denmark)

    Andersson, Daniel; Hansen, Kristoffer Arnsfelt; Miltersen, Peter Bro

    2008-01-01

    We revisit the deterministic graphical games of Washburn. A deterministic graphical game can be described as a simple stochastic game (a notion due to Anne Condon), except that we allow arbitrary real payoffs but disallow moves of chance. We study the complexity of solving deterministic graphical...... games and obtain an almost-linear time comparison-based algorithm for computing an equilibrium of such a game. The existence of a linear time comparison-based algorithm remains an open problem....

  16. Reverse cholesterol transport revisited

    Institute of Scientific and Technical Information of China (English)

    Astrid; E; van; der; Velde

    2010-01-01

    Reverse cholesterol transport was originally described as the high-density lipoprotein-mediated cholesterol flux from the periphery via the hepatobiliary tract to the intestinal lumen, leading to fecal excretion. Since the introduction of reverse cholesterol transport in the 1970s, this pathway has been intensively investigated. In this topic highlight, the classical reverse cholesterol transport concepts are discussed and the subject reverse cholesterol transport is revisited.

  17. Clinical ethics revisited

    Directory of Open Access Journals (Sweden)

    Pellegrino Edmund D

    2001-04-01

    Full Text Available Abstract A decade ago, we reviewed the field of clinical ethics; assessed its progress in research, education, and ethics committees and consultation; and made predictions about the future of the field. In this article, we revisit clinical ethics to examine our earlier observations, highlight key developments, and discuss remaining challenges for clinical ethics, including the need to develop a global perspective on clinical ethics problems.

  18. Revisiting modern portfolio theory

    OpenAIRE

    Tenani, Paulo

    2016-01-01

    This paper revisits Modern Portfolio Theory and derives eleven properties of Efficient Allocations and Portfolios in the presence of leverage. With different degrees of leverage, an Efficient Portfolio is a linear combination of two portfolios that lie in different efficient frontiers - which allows for an attractive reinterpretation of the Separation Theorem. In particular a change in the investor risk-return preferences will leave the allocation between the Minimum Risk and Risk Portfolios ...

  19. Relation between observability and differential embeddings for nonlinear dynamics

    Science.gov (United States)

    Letellier, Christophe; Aguirre, Luis A.; Maquet, Jean

    2005-06-01

    In the analysis of a scalar time series, which lies on an m -dimensional object, a great number of techniques will start by embedding such a time series in a d -dimensional space, with d>m . Therefore there is a coordinate transformation Φs from the original phase space to the embedded one. The embedding space depends on the observable s(t) . In theory, the main results reached are valid regardless of s(t) . In a number of practical situations, however, the choice of the observable does influence our ability to extract dynamical information from the embedded attractor. This may arise in problems in nonlinear dynamics such as model building, control and synchronization. To some degree, ease of success will depend on the choice of the observable simply because it is related to the observability of the dynamics. In this paper the observability matrix for nonlinear systems, which uses Lie derivatives, is revisited. It is shown that such a matrix can be interpreted as the Jacobian matrix of Φs —the map between the original phase space and the differential embedding induced by the observable—thus establishing a link between observability and embedding theory.

  20. Embedded systems handbook

    CERN Document Server

    Zurawski, Richard

    2005-01-01

    Embedded systems are nearly ubiquitous, and books on individual topics or components of embedded systems are equally abundant. Unfortunately, for those designers who thirst for knowledge of the big picture of embedded systems there is not a drop to drink. Until now. The Embedded Systems Handbook is an oasis of information, offering a mix of basic and advanced topics, new solutions and technologies arising from the most recent research efforts, and emerging trends to help you stay current in this ever-changing field.With preeminent contributors from leading industrial and academic institutions

  1. Pro Linux Embedded Systems

    CERN Document Server

    Sally, Gene

    2010-01-01

    Today, Linux is included with nearly every embedded platform. Embedded developers can take a more modern route and spend more time tuning Linux and taking advantage of open source code to build more robust, feature-rich applications. While Gene Sally does not neglect porting Linux to new hardware, modern embedded hardware is more sophisticated than ever: most systems include the capabilities found on desktop systems. This book is written from the perspective of a user employing technologies and techniques typically reserved for desktop systems. * Modern guide for developing embedded Linux syst

  2. Embedding beyond electrostatics

    DEFF Research Database (Denmark)

    Nåbo, Lina J.; Olsen, Jógvan Magnus Haugaard; Holmgaard List, Nanna;

    2016-01-01

    We study excited states of cholesterol in solution and show that, in this specific case, solute wave-function confinement is the main effect of the solvent. This is rationalized on the basis of the polarizable density embedding scheme, which in addition to polarizable embedding includes non-electrostatic...... repulsion that effectively confines the solute wave function to its cavity. We illustrate how the inclusion of non-electrostatic repulsion results in a successful identification of the intense π → π∗ transition, which was not possible using an embedding method that only includes electrostatics....... This underlines the importance of non-electrostatic repulsion in quantum-mechanical embedding-based methods....

  3. Embedded systems handbook networked embedded systems

    CERN Document Server

    Zurawski, Richard

    2009-01-01

    Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area

  4. The data embedding method

    Energy Technology Data Exchange (ETDEWEB)

    Sandford, M.T. II; Bradley, J.N.; Handel, T.G.

    1996-06-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.

  5. Data embedding method

    Science.gov (United States)

    Sandford, Maxwell T., II; Bradley, Jonathan N.; Handel, Theodore G.

    1996-01-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in MicrosoftTM bitmap (BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed `steganography.' Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or `lossy' compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is derived from the original host data by an analysis algorithm.

  6. Embedded engineering education

    CERN Document Server

    Kaštelan, Ivan; Temerinac, Miodrag; Barak, Moshe; Sruk, Vlado

    2016-01-01

    This book focuses on the outcome of the European research project “FP7-ICT-2011-8 / 317882: Embedded Engineering Learning Platform” E2LP. Additionally, some experiences and researches outside this project have been included. This book provides information about the achieved results of the E2LP project as well as some broader views about the embedded engineering education. It captures project results and applications, methodologies, and evaluations. It leads to the history of computer architectures, brings a touch of the future in education tools and provides a valuable resource for anyone interested in embedded engineering education concepts, experiences and material. The book contents 12 original contributions and will open a broader discussion about the necessary knowledge and appropriate learning methods for the new profile of embedded engineers. As a result, the proposed Embedded Computer Engineering Learning Platform will help to educate a sufficient number of future engineers in Europe, capable of d...

  7. Revisiting and Renegotiating Wars

    DEFF Research Database (Denmark)

    Gade, Solveig

    2014-01-01

    Anri Sala’s film 1395 Days Without Red (2011) provides a kind of reenactment of an accidental day during the 1992-95 siege of Sarajevo. Shot in today’s Sarajevo, the film revisits and embodies some of the widely circulated images of the siege, such as inhabitants sprinting across so-called Sniper...... Alley in order to avoid the bullets of the Bosnian Serbian snipers positioned around the city. Based on a close reading of Sala’s work, this article will scrutinize how subjectivating techniques of power, during times of war, affectively work to create boundaries between those excluded from and those...

  8. Analogue Magnetism Revisited

    CERN Document Server

    Osano, Bob

    2016-01-01

    In this article we revisit the significance of the often debated structural similarity between the equations of electromagnetism and fluid dynamics. Although the matching of the two sets of equations has successfully been done for non-dissipative forms of the equations, little has been done for cases where the dissipative terms are non-negligible. We consider the consequence of non-negligible viscosity and diffusivity, and how the fine-tuning of these parameters could allow fluid dynamics to be used to indirectly study certain properties of magnetic fields.

  9. On Distributed Embedded Systems

    Directory of Open Access Journals (Sweden)

    Arvindra Sehmi

    2013-01-01

    Full Text Available Thinking of distributed embedded systems (DES—let alone the more general area of embedded computing—as a unified topic is difficult. Nevertheless, it is a vastly important topic and potentially represents a revolution in information technology (IT. DES is driven by the increasing capabilities and ever-declining costs of computing and communications devices, resulting in networked systems of embedded computers whose functional components are nearly invisible to end users. Systems have the potential to alter radically the way in which people interact with their environment by linking a range of devices and sensors that will allow information to be collected, shared, and processed in unprecedented ways.

  10. Embedded Fragments Registry (EFR)

    Data.gov (United States)

    Department of Veterans Affairs — In 2009, the Department of Defense estimated that approximately 40,000 service members who served in OEF/OIF may have embedded fragment wounds as the result of small...

  11. Electronics for embedded systems

    CERN Document Server

    Bindal, Ahmet

    2017-01-01

    This book provides semester-length coverage of electronics for embedded systems, covering most common analog and digital circuit-related issues encountered while designing embedded system hardware. It is written for students and young professionals who have basic circuit theory background and want to learn more about passive circuits, diode and bipolar transistor circuits, the state-of-the-art CMOS logic family and its interface with older logic families such as TTL, sensors and sensor physics, operational amplifier circuits to condition sensor signals, data converters and various circuits used in electro-mechanical device control in embedded systems. The book also provides numerous hardware design examples by integrating the topics learned in earlier chapters. The last chapter extensively reviews the combinational and sequential logic design principles to be able to design the digital part of embedded system hardware.

  12. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very...... specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention...... and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generation. Describes tools and programming models for multicore embedded systems Emphasizes throughout performance per watt scalability Discusses realistic limits of software parallelization Enables...

  13. Embedded Data Representations.

    Science.gov (United States)

    Willett, Wesley; Jansen, Yvonne; Dragicevic, Pierre

    2017-01-01

    We introduce embedded data representations, the use of visual and physical representations of data that are deeply integrated with the physical spaces, objects, and entities to which the data refers. Technologies like lightweight wireless displays, mixed reality hardware, and autonomous vehicles are making it increasingly easier to display data in-context. While researchers and artists have already begun to create embedded data representations, the benefits, trade-offs, and even the language necessary to describe and compare these approaches remain unexplored. In this paper, we formalize the notion of physical data referents - the real-world entities and spaces to which data corresponds - and examine the relationship between referents and the visual and physical representations of their data. We differentiate situated representations, which display data in proximity to data referents, and embedded representations, which display data so that it spatially coincides with data referents. Drawing on examples from visualization, ubiquitous computing, and art, we explore the role of spatial indirection, scale, and interaction for embedded representations. We also examine the tradeoffs between non-situated, situated, and embedded data displays, including both visualizations and physicalizations. Based on our observations, we identify a variety of design challenges for embedded data representation, and suggest opportunities for future research and applications.

  14. Reframing in dentistry: Revisited

    Directory of Open Access Journals (Sweden)

    Sivakumar Nuvvula

    2013-01-01

    Full Text Available The successful practice of dentistry involves a good combination of technical skills and soft skills. Soft skills or communication skills are not taught extensively in dental schools and it can be challenging to learn and at times in treating dental patients. Guiding the child′s behavior in the dental operatory is one of the preliminary steps to be taken by the pediatric dentist and one who can successfully modify the behavior can definitely pave the way for a life time comprehensive oral care. This article is an attempt to revisit a simple behavior guidance technique, reframing and explain the possible psychological perspectives behind it for better use in the clinical practice.

  15. Deterministic Graphical Games Revisited

    DEFF Research Database (Denmark)

    Andersson, Klas Olof Daniel; Hansen, Kristoffer Arnsfelt; Miltersen, Peter Bro

    2012-01-01

    Starting from Zermelo’s classical formal treatment of chess, we trace through history the analysis of two-player win/lose/draw games with perfect information and potentially infinite play. Such chess-like games have appeared in many different research communities, and methods for solving them......, such as retrograde analysis, have been rediscovered independently. We then revisit Washburn’s deterministic graphical games (DGGs), a natural generalization of chess-like games to arbitrary zero-sum payoffs. We study the complexity of solving DGGs and obtain an almost-linear time comparison-based algorithm...... for finding optimal strategies in such games. The existence of a linear time comparison-based algorithm remains an open problem....

  16. The bar instability revisited

    CERN Document Server

    Chiodi, Filippo; Claudin, Philippe

    2012-01-01

    The river bar instability is revisited, using a hydrodynamical model based on Reynolds averaged Navier-Stokes equations. The results are contrasted with the standard analysis based on shallow water Saint-Venant equations. We first show that the stability of both transverse modes (ripples) and of small wavelength inclined modes (bars) predicted by the Saint-Venant approach are artefacts of this hydrodynamical approximation. When using a more reliable hydrodynamical model, the dispersion relation does not present any maximum of the growth rate when the sediment transport is assumed to be locally saturated. The analysis therefore reveals the fundamental importance of the relaxation of sediment transport towards equilibrium as it it is responsible for the stabilisation of small wavelength modes. This dynamical mechanism is characterised by the saturation number, defined as the ratio of the saturation length to the water depth Lsat/H. This dimensionless number controls the transition from ripples (transverse patte...

  17. Life quality index revisited

    DEFF Research Database (Denmark)

    Ditlevsen, Ove Dalager

    2004-01-01

    The derivation of the life quality index (LQI) is revisited for a revision. This revision takes into account the unpaid but necessary work time needed to stay alive in clean and healthy conditions to be fit for effective wealth producing work and to enjoyable free time. Dimension analysis...... consistency problems with the standard power function expression of the LQI are pointed out. It is emphasized that the combination coefficient in the convex differential combination between the relative differential of the gross domestic product per capita and the relative differential of the expected life...... at birth should not vary between countries. Finally the distributional assumptions are relaxed as compared to the assumptions made in an earlier work by the author. These assumptions concern the calculation of the life expectancy change due to the removal of an accident source. Moreover a simple public...

  18. Lorentz violation naturalness revisited

    CERN Document Server

    Belenchia, Alessio; Liberati, Stefano

    2016-01-01

    We revisit here the naturalness problem of Lorentz invariance violations on a simple toy model of a scalar field coupled to a fermion field via a Yukawa interaction. We first review some well-known results concerning the low-energy percolation of Lorentz violation from high energies, presenting some details of the analysis not explicitly discussed in the literature and discussing some previously unnoticed subtleties. We then show how a separation between the scale of validity of the effective field theory and that one of Lorentz invariance violations can hinder this low-energy percolation. While such protection mechanism was previously considered in the literature, we provide here a simple illustration of how it works and of its general features. Finally, we consider a case in which dissipation is present, showing that the dissipative behaviour does not percolate generically to lower mass dimension operators albeit dispersion does. Moreover, we show that a scale separation can protect from unsuppressed low-en...

  19. Firewall Configuration Errors Revisited

    CERN Document Server

    Wool, Avishai

    2009-01-01

    The first quantitative evaluation of the quality of corporate firewall configurations appeared in 2004, based on Check Point FireWall-1 rule-sets. In general that survey indicated that corporate firewalls were often enforcing poorly written rule-sets, containing many mistakes. The goal of this work is to revisit the first survey. The current study is much larger. Moreover, for the first time, the study includes configurations from two major vendors. The study also introduce a novel "Firewall Complexity" (FC) measure, that applies to both types of firewalls. The findings of the current study indeed validate the 2004 study's main observations: firewalls are (still) poorly configured, and a rule-set's complexity is (still) positively correlated with the number of detected risk items. Thus we can conclude that, for well-configured firewalls, ``small is (still) beautiful''. However, unlike the 2004 study, we see no significant indication that later software versions have fewer errors (for both vendors).

  20. Deterministic Graphical Games Revisited

    DEFF Research Database (Denmark)

    Andersson, Klas Olof Daniel; Hansen, Kristoffer Arnsfelt; Miltersen, Peter Bro

    2012-01-01

    Starting from Zermelo’s classical formal treatment of chess, we trace through history the analysis of two-player win/lose/draw games with perfect information and potentially infinite play. Such chess-like games have appeared in many different research communities, and methods for solving them......, such as retrograde analysis, have been rediscovered independently. We then revisit Washburn’s deterministic graphical games (DGGs), a natural generalization of chess-like games to arbitrary zero-sum payoffs. We study the complexity of solving DGGs and obtain an almost-linear time comparison-based algorithm...... for finding optimal strategies in such games. The existence of a linear time comparison-based algorithm remains an open problem....

  1. Revisiting the Lambert's Problem

    CERN Document Server

    Izzo, Dario

    2014-01-01

    The orbital boundary value problem, also known as Lambert Problem, is revisited. Building upon Lancaster and Blanchard approach, new relations are revealed and a new variable representing all problem classes, under L-similarity, is used to express the time of flight equation. In the new variable, the time of flight curves have two oblique asymptotes and they mostly appear to be conveniently approximated by piecewise continuous lines. We use and invert such a simple approximation to provide an efficient initial guess to an Householder iterative method that is then able to converge, for the single revoltuion case, in only two iterations. The resulting algorithm is compared to Gooding's procedure revealing to be numerically as accurate, while having a smaller computational complexity.

  2. Klein's double discontinuity revisited

    DEFF Research Database (Denmark)

    Winsløw, Carl; Grønbæk, Niels

    2014-01-01

    mathematics courses which are mandatory to become a high school teacher of mathematics. To what extent does the “advanced” experience enable them to approach the high school calculus in a deeper and more autonomous way ? To what extent can “capstone” courses support such an approach ? How could it be hindered......Much effort and research has been invested into understanding and bridging the ‘gaps’ which many students experience in terms of contents and expectations as they begin university studies with a heavy component of mathematics, typically in the form of calculus courses. We have several studies...... of bridging measures, success rates and many other aspects of these “entrance transition” problems. In this paper, we consider the inverse transition, experienced by university students as they revisit core parts of high school mathematics (in particular, calculus) after completing the undergraduate...

  3. Seven Issues Revisited

    DEFF Research Database (Denmark)

    Grønbæk, Kaj; Whitehead, Jim; De Bra, Paul

    2002-01-01

    It has been 15 years since the original presentation by Frank Halasz at Hypertext'87 on seven issues for the next generation of hypertext systems. These issues are: Search and Query Composites Virtual Structures Computation in/over hypertext network Versioning Collaborative Work Extensibility...... and Tailorability Since that time, these issues have formed the nucleus of multiple research agendas within the Hypertext community. Befitting this direction-setting role, the issues have been revisited several times, by Halasz in his 1991 Hypertext keynote talk, and by Randy Trigg in his 1996 Hypertext keynote...... five years later. Additionally, over the intervening 15 years, many research systems have addressed the original seven issues, and new research avenues have opened up. The goal of this panel is to begin the process of developing a new set of seven issues for the next generation of hypertext system...

  4. Embedded Systems Design: Optimization Challenges

    DEFF Research Database (Denmark)

    Pop, Paul

    2005-01-01

    Summary form only given. Embedded systems are everywhere: from alarm clocks to PDAs, from mobile phones to cars, almost all the devices we use are controlled by embedded systems. Over 99% of the microprocessors produced today are used in embedded systems, and recently the number of embedded systems...

  5. EMBEDDING FLOWS AND SMOOTH CONJUGACY

    Institute of Scientific and Technical Information of China (English)

    ZHANGMEIRONG; LIWEIGU

    1997-01-01

    The authors use the functional equation for embedding vector fields to study smooth embedding flows of one-dimensional diffeomorphisms. The existence and uniqueness for smooth embedding flows and vector fields are proved. As an application of embedding flows, some classification results about local and giobal diffeomorphisms under smooth conjugacy are given.

  6. "The Melting Pot" Revisited.

    Science.gov (United States)

    Wahab, Zaher

    A complete restructuring of American institutions, values, ideals, economy, politics, and culture is required to overcome the peripheralization and injustices caused by the racism that is endemic and embedded in the capitalist fabric of American society. Race relations have declined during the 1980s as evidenced by the erosion of many of the gains…

  7. Smart multicore embedded systems

    CERN Document Server

    Bertels, Koen; Karlsson, Sven; Pacull, François

    2014-01-01

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very often they are forced to rewrite sequential programs into parallel software, taking into account all the low level features and peculiarities of the underlying platforms. Readers will benefit from these authors’ approach, which takes into account both the application requirements and the platform specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generati...

  8. Embedded data representations

    DEFF Research Database (Denmark)

    Willett, Wesley; Jansen, Yvonne; Dragicevic, Pierre

    2017-01-01

    We introduce embedded data representations, the use of visual and physical representations of data that are deeply integrated with the physical spaces, objects, and entities to which the data refers. Technologies like lightweight wireless displays, mixed reality hardware, and autonomous vehicles...... are making it increasingly easier to display data in-context. While researchers and artists have already begun to create embedded data representations, the benefits, trade-offs, and even the language necessary to describe and compare these approaches remain unexplored. In this paper, we formalize the notion...... of physical data referents – the real-world entities and spaces to which data corresponds – and examine the relationship between referents and the visual and physical representations of their data. We differentiate situated representations, which display data in proximity to data referents, and embedded...

  9. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Steinmann, Casper; Ruud, Kenneth

    2015-01-01

    We present a new QM/QM/MM-based model for calculating molecular properties and excited states of solute-solvent systems. We denote this new approach the polarizable density embedding (PDE) model and it represents an extension of our previously developed polarizable embedding (PE) strategy. The PDE...... model is a focused computational approach in which a core region of the system studied is represented by a quantum-chemical method, whereas the environment is divided into two other regions: an inner and an outer region. Molecules belonging to the inner region are described by their exact densities...

  10. Embedded foveation image coding.

    Science.gov (United States)

    Wang, Z; Bovik, A C

    2001-01-01

    The human visual system (HVS) is highly space-variant in sampling, coding, processing, and understanding. The spatial resolution of the HVS is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. By taking advantage of this fact, it is possible to remove considerable high-frequency information redundancy from the peripheral regions and still reconstruct a perceptually good quality image. Great success has been obtained previously by a class of embedded wavelet image coding algorithms, such as the embedded zerotree wavelet (EZW) and the set partitioning in hierarchical trees (SPIHT) algorithms. Embedded wavelet coding not only provides very good compression performance, but also has the property that the bitstream can be truncated at any point and still be decoded to recreate a reasonably good quality image. In this paper, we propose an embedded foveation image coding (EFIC) algorithm, which orders the encoded bitstream to optimize foveated visual quality at arbitrary bit-rates. A foveation-based image quality metric, namely, foveated wavelet image quality index (FWQI), plays an important role in the EFIC system. We also developed a modified SPIHT algorithm to improve the coding efficiency. Experiments show that EFIC integrates foveation filtering with foveated image coding and demonstrates very good coding performance and scalability in terms of foveated image quality measurement.

  11. Embedded computer vision

    CERN Document Server

    Kisacanin, Branislav

    2008-01-01

    Brings together experiences from researchers in the field of embedded computer vision, from both academic and industrial research centers, and covers a broad range of challenges and trade-offs brought about by this paradigm shift. This title offers emphasis on tackling important problems for society, safety, security, health, and mobility.

  12. Embedded-monolith armor

    Science.gov (United States)

    McElfresh, Michael W.; Groves, Scott E; Moffet, Mitchell L.; Martin, Louis P.

    2016-07-19

    A lightweight armor system utilizing a face section having a multiplicity of monoliths embedded in a matrix supported on low density foam. The face section is supported with a strong stiff backing plate. The backing plate is mounted on a spall plate.

  13. Lorentz violation naturalness revisited

    Energy Technology Data Exchange (ETDEWEB)

    Belenchia, Alessio; Gambassi, Andrea; Liberati, Stefano [SISSA - International School for Advanced Studies, via Bonomea 265, 34136 Trieste (Italy); INFN, Sezione di Trieste, via Valerio 2, 34127 Trieste (Italy)

    2016-06-08

    We revisit here the naturalness problem of Lorentz invariance violations on a simple toy model of a scalar field coupled to a fermion field via a Yukawa interaction. We first review some well-known results concerning the low-energy percolation of Lorentz violation from high energies, presenting some details of the analysis not explicitly discussed in the literature and discussing some previously unnoticed subtleties. We then show how a separation between the scale of validity of the effective field theory and that one of Lorentz invariance violations can hinder this low-energy percolation. While such protection mechanism was previously considered in the literature, we provide here a simple illustration of how it works and of its general features. Finally, we consider a case in which dissipation is present, showing that the dissipative behaviour does not percolate generically to lower mass dimension operators albeit dispersion does. Moreover, we show that a scale separation can protect from unsuppressed low-energy percolation also in this case.

  14. Dynamic causal modelling revisited.

    Science.gov (United States)

    Friston, K J; Preller, Katrin H; Mathys, Chris; Cagnan, Hayriye; Heinzle, Jakob; Razi, Adeel; Zeidman, Peter

    2017-02-17

    This paper revisits the dynamic causal modelling of fMRI timeseries by replacing the usual (Taylor) approximation to neuronal dynamics with a neural mass model of the canonical microcircuit. This provides a generative or dynamic causal model of laminar specific responses that can generate haemodynamic and electrophysiological measurements. In principle, this allows the fusion of haemodynamic and (event related or induced) electrophysiological responses. Furthermore, it enables Bayesian model comparison of competing hypotheses about physiologically plausible synaptic effects; for example, does attentional modulation act on superficial or deep pyramidal cells - or both? In this technical note, we describe the resulting dynamic causal model and provide an illustrative application to the attention to visual motion dataset used in previous papers. Our focus here is on how to answer long-standing questions in fMRI; for example, do haemodynamic responses reflect extrinsic (afferent) input from distant cortical regions, or do they reflect intrinsic (recurrent) neuronal activity? To what extent do inhibitory interneurons contribute to neurovascular coupling? What is the relationship between haemodynamic responses and the frequency of induced neuronal activity? This paper does not pretend to answer these questions; rather it shows how they can be addressed using neural mass models of fMRI timeseries. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  15. Revisiting energy efficiency fundamentals

    Energy Technology Data Exchange (ETDEWEB)

    Perez-Lombard, L.; Velazquez, D. [Grupo de Termotecnia, Escuela Superior de Ingenieros, Universidad de Sevilla, Camino de los Descubrimientos s/n, 41092 Seville (Spain); Ortiz, J. [Building Research Establishment (BRE), Garston, Watford, WD25 9XX (United Kingdom)

    2013-05-15

    Energy efficiency is a central target for energy policy and a keystone to mitigate climate change and to achieve a sustainable development. Although great efforts have been carried out during the last four decades to investigate the issue, focusing into measuring energy efficiency, understanding its trends and impacts on energy consumption and to design effective energy efficiency policies, many energy efficiency-related concepts, some methodological problems for the construction of energy efficiency indicators (EEI) and even some of the energy efficiency potential gains are often ignored or misunderstood, causing no little confusion and controversy not only for laymen but even for specialists. This paper aims to revisit, analyse and discuss some efficiency fundamental topics that could improve understanding and critical judgement of efficiency stakeholders and that could help in avoiding unfounded judgements and misleading statements. Firstly, we address the problem of measuring energy efficiency both in qualitative and quantitative terms. Secondly, main methodological problems standing in the way of the construction of EEI are discussed, and a sequence of actions is proposed to tackle them in an ordered fashion. Finally, two key topics are discussed in detail: the links between energy efficiency and energy savings, and the border between energy efficiency improvement and renewable sources promotion.

  16. “Dreamers Often Lie”: On “Compromise”, the subversive documentation of an Israeli- Palestinian political adaptation of Shakespeare’s Romeo and Juliet

    Directory of Open Access Journals (Sweden)

    Yael Munk

    2010-03-01

    Full Text Available

    Is Romeo and Juliet relevant to a description of the Middle-East conflict? This is the question raised in Compromise, an Israeli documentary that follows the

  17. Benjamin Franklin and Mesmerism, revisited.

    Science.gov (United States)

    McConkey, Kevin M; Perry, Campbell

    2002-10-01

    The authors revisit and update their previous historiographical note (McConkey & Perry, 1985) on Benjamin Franklin's involvement with and investigation of animal magnetism or mesmerism. They incorporate more recent literature and offer additional comment about Franklin's role in and views about mesmerism. Franklin had a higher degree of personal involvement with and a more detailed opinion of mesmerism than has been previously appreciated.

  18. Leadership and Management Theories Revisited

    DEFF Research Database (Denmark)

    Madsen, Mona Toft

    2001-01-01

    The goal of the paper is to revisit and analyze key contributions to the understanding of leadership and management. As a part of the discussion a role perspective that allows for additional and/or integrated leader dimensions, including a change-centered, will be outlined. Seemingly, a major...

  19. A remote coal deposit revisited

    DEFF Research Database (Denmark)

    Bojesen-Kofoed, Jørgen A.; Kalkreuth, Wolfgang; Petersen, Henrik I.

    2012-01-01

    In 1908, members of the “Danmark Expedition” discovered a coal deposit in a very remote area in western Germania Land, close to the margin of the inland ice in northeast Greenland. The deposit was, however, neither sampled nor described, and was revisited in 2009 for the first time since its disc...

  20. Revisiting Inter-Genre Similarity

    DEFF Research Database (Denmark)

    Sturm, Bob L.; Gouyon, Fabien

    2013-01-01

    We revisit the idea of ``inter-genre similarity'' (IGS) for machine learning in general, and music genre recognition in particular. We show analytically that the probability of error for IGS is higher than naive Bayes classification with zero-one loss (NB). We show empirically that IGS does...

  1. ORAL GLUCOSE TOLERANCE TEST REVISITED

    African Journals Online (AJOL)

    Determinant for the usefulness or otherwise of oral glucose tolerance test for the diagnosis ... personnel, poverty and poor economic management, 8'9 that are known to .... Symptoms of diabetes plus casual plasma glucose ... WHO 2-hr plasma glucose criteria of 1l.1mmol/L .... Diagnostic criteria and performance revisited.

  2. Emerging Trends in Embedded Processors

    Directory of Open Access Journals (Sweden)

    Gurvinder Singh

    2014-05-01

    Full Text Available An Embedded Processors is simply a µProcessors that has been “Embedded” into a device. Embedded systems are important part of human life. For illustration, one cannot visualize life without mobile phones for personal communication. Embedded systems are used in many places like healthcare, automotive, daily life, and in different offices and industries.Embedded Processors develop new research area in the field of hardware designing.

  3. Embedment of Employee?

    DEFF Research Database (Denmark)

    Buhl, Henrik

    1998-01-01

    The purpose of the paper is to discuss the influence of different approaches and work life conditions on the conception of embedment of employee participation. The discussion is based on three connected approaches: a theoretical research, a research into participation in working life and an empir......The purpose of the paper is to discuss the influence of different approaches and work life conditions on the conception of embedment of employee participation. The discussion is based on three connected approaches: a theoretical research, a research into participation in working life...... and an empirical case study. My starting point will be a case study of a Danish ABB company which will form the framework of my discussion and reflect my present experience. This analysis will emphasize the possibilities of making employee participation a permanent part of the company at all levels....

  4. Embeddings of Iteration Trees

    OpenAIRE

    Mitchell, William

    1992-01-01

    This paper, dating from May 1991, contains preliminary (and unpublishable) notes on investigations about iteration trees. They will be of interest only to the specialist. In the first two sections I define notions of support and embeddings for tree iterations, proving for example that every tree iteration is a direct limit of finite tree iterations. This is a generalization to models with extenders of basic ideas of iterated ultrapowers using only ultrapowers. In the final section (which is m...

  5. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  6. Nutational Damping Revisited

    Science.gov (United States)

    Burns, J. A.; Sharma, I.

    2000-10-01

    Motivated by the recent detection of complex rotational states for several asteroids and comets, as well as by the ongoing and planned spacecraft missions to such bodies, which should allow their rotational states to be accurately determined, we revisit the problem of the nutational damping of small solar system bodies. The nutational damping of asteroids has been approximately analyzed by Prendergast (1958), Burns and Safronov (1973), and Efroimsky and Lazarian (2000). Many other similar dynamical studies concern planetary wobble decay (e.g., Peale 1973; Yoder and Ward 1979), interstellar dust grain alignment (e.g., Purcell 1979; Lazarian and Efroimsky 1999) and damping of Earth's Chandler wobble (Lambeck 1980). Recall that rotational energy loss for an isolated body aligns the body's angular momentum vector with its axis of maximum inertia. Assuming anelastic dissipation, simple dimensional analysis determines a functional form of the damping timescale, on which all the above authors agree. However, the numerical coefficients of published results are claimed to differ by orders of magnitude. Differences have been ascribed to absent physics, to solutions that fail to satisfy boundary conditions perfectly, and to unphysical choices for the Q parameter. The true reasons for the discrepancy are unclear since, despite contrary claims, the full 3D problem (nutational damping of an anelastic ellipsoid) is analytically intractable so far. To move the debate forward, we compare the solution of a related 2D problem to the expressions found previously, and we present results from a finite element model. On this basis, we feel that previous rates for the decay of asteroidal tumbling (Harris 1994), derived from Burns and Safronov (1973), are likely to be accurate, at least to a factor of a few. Funded by NASA.

  7. PEXSI-$\\Sigma$: A Green's function embedding method for Kohn-Sham density functional theory

    CERN Document Server

    Li, Xiantao; Lu, Jianfeng

    2016-01-01

    As Kohn-Sham density functional theory (KSDFT) being applied to increasingly more complex materials, the periodic boundary condition associated with supercell approaches also becomes unsuitable for a number of important scenarios. Green's function embedding methods allow a more versatile treatment of complex boundary conditions, and hence provide an attractive alternative to describe complex systems that cannot be easily treated in supercell approaches. In this paper, we first revisit the literature of Green's function embedding methods from a numerical linear algebra perspective. We then propose a new Green's function embedding method called PEXSI-$\\Sigma$. The PEXSI-$\\Sigma$ method approximates the density matrix using a set of nearly optimally chosen Green's functions evaluated at complex frequencies. For each Green's function, the complex boundary conditions are described by a self energy matrix $\\Sigma$ constructed from a physical reference Green's function, which can be computed relatively easily. In th...

  8. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  9. Molecular interactions with ice: Molecular embedding, adsorption, detection, and release

    Energy Technology Data Exchange (ETDEWEB)

    Gibson, K. D.; Langlois, Grant G.; Li, Wenxin; Sibener, S. J., E-mail: s-sibener@uchicago.edu [The James Franck Institute and Department of Chemistry, The University of Chicago, 929 E. 57th Street, Chicago, Illinois 60637 (United States); Killelea, Daniel R. [Department of Chemistry and Biochemistry, Loyola University Chicago, 1068 W. Sheridan Ave., Chicago, Illinois 60660 (United States)

    2014-11-14

    The interaction of atomic and molecular species with water and ice is of fundamental importance for chemistry. In a previous series of publications, we demonstrated that translational energy activates the embedding of Xe and Kr atoms in the near surface region of ice surfaces. In this paper, we show that inert molecular species may be absorbed in a similar fashion. We also revisit Xe embedding, and further probe the nature of the absorption into the selvedge. CF{sub 4} molecules with high translational energies (≥3 eV) were observed to embed in amorphous solid water. Just as with Xe, the initial adsorption rate is strongly activated by translational energy, but the CF{sub 4} embedding probability is much less than for Xe. In addition, a larger molecule, SF{sub 6}, did not embed at the same translational energies that both CF{sub 4} and Xe embedded. The embedding rate for a given energy thus goes in the order Xe > CF{sub 4} > SF{sub 6}. We do not have as much data for Kr, but it appears to have a rate that is between that of Xe and CF{sub 4}. Tentatively, this order suggests that for Xe and CF{sub 4}, which have similar van der Waals radii, the momentum is the key factor in determining whether the incident atom or molecule can penetrate deeply enough below the surface to embed. The more massive SF{sub 6} molecule also has a larger van der Waals radius, which appears to prevent it from stably embedding in the selvedge. We also determined that the maximum depth of embedding is less than the equivalent of four layers of hexagonal ice, while some of the atoms just below the ice surface can escape before ice desorption begins. These results show that energetic ballistic embedding in ice is a general phenomenon, and represents a significant new channel by which incident species can be trapped under conditions where they would otherwise not be bound stably as surface adsorbates. These findings have implications for many fields including environmental science, trace gas

  10. Unsteady Flame Embedding

    KAUST Repository

    El-Asrag, Hossam A.

    2011-01-01

    Direct simulation of all the length and time scales relevant to practical combustion processes is computationally prohibitive. When combustion processes are driven by reaction and transport phenomena occurring at the unresolved scales of a numerical simulation, one must introduce a dynamic subgrid model that accounts for the multiscale nature of the problem using information available on a resolvable grid. Here, we discuss a model that captures unsteady flow-flame interactions- including extinction, re-ignition, and history effects-via embedded simulations at the subgrid level. The model efficiently accounts for subgrid flame structure and incorporates detailed chemistry and transport, allowing more accurate prediction of the stretch effect and the heat release. In this chapter we first review the work done in the past thirty years to develop the flame embedding concept. Next we present a formulation for the same concept that is compatible with Large Eddy Simulation in the flamelet regimes. The unsteady flame embedding approach (UFE) treats the flame as an ensemble of locally one-dimensional flames, similar to the flamelet approach. However, a set of elemental one-dimensional flames is used to describe the turbulent flame structure directly at the subgrid level. The calculations employ a one-dimensional unsteady flame model that incorporates unsteady strain rate, curvature, and mixture boundary conditions imposed by the resolved scales. The model is used for closure of the subgrid terms in the context of large eddy simulation. Direct numerical simulation (DNS) data from a flame-vortex interaction problem is used for comparison. © Springer Science+Business Media B.V. 2011.

  11. Spatially Embedded Inequality

    DEFF Research Database (Denmark)

    Holck, Lotte

    2016-01-01

    /methodology/approach: – The (re)production of inequality is explored by linking research on organizational space with HRM diversity management. Data from an ethnographic study undertaken in a Danish municipal center illustrates how a substructure of inequality is spatially upheld alongside a formal diversity policy. Archer...... the more subtle, spatially embedded forms of inequality. Originality/value: – Theoretical and empirical connections between research on organizational space and HRM diversity management have thus far not been systematically studied. This combination might advance knowledge on the persistence of micro...

  12. Quantization of submanifold embeddings

    Energy Technology Data Exchange (ETDEWEB)

    Bahns, Dorothea; Zahn, Jochen [Courant Research Centre ' ' Higher Order Structures' ' , Universitaet Goettingen (Germany); Rejzner, Katarzyna [II. Institut fuer Theoretische Physik, Universitaet Hamburg (Germany)

    2013-07-01

    We describe a perturbative quantization of the embedding of d-dimensional submanifolds into n-dimensional Minkowski space, based on suitable generalizations of the Nambu-Goto action. We use tools from perturbative algebraic quantum field theory, quantum field theory on curved spacetimes, and the Batalin-Vilkovisky formalism. The resulting theory is perturbatively non-renormalizable, but well-defined as an effective theory, i.e., there are no anomalies, for any dimension d,n. In particular there is no critical dimension for the case of string theory (d=2).

  13. Shutters with embedded microprocessors

    Science.gov (United States)

    Stephenson, S.

    2015-06-01

    Shutters are used to periodically provide a non-uniformity correction (NUC) calibration surface to micro bolometers. Many bolometer applications, such as TWS and DVE, require compact, power efficient actuators. Actuators in these applications, such as bistable solenoids and stepper motors, benefit from complex drive schemes. Consumer electronics products have generated compact, low-cost drive components that can be used to embed complex drives into these shutters. Shutter drives using these components maintain compactness and power efficiency while simplifying interfaces at minimal cost. Recently, several commercially available shutter systems have been created that incorporate embedded microprocessors into shutters usable for NUC correction of micro bolometers.

  14. Embedded microcontroller interfacing

    CERN Document Server

    Gupta, Gourab Sen

    2010-01-01

    Mixed-Signal Embedded Microcontrollers are commonly used in integrating analog components needed to control non-digital electronic systems. They are used in automatically controlled devices and products, such as automobile engine control systems, wireless remote controllers, office machines, home appliances, power tools, and toys. Microcontrollers make it economical to digitally control even more devices and processes by reducing the size and cost, compared to a design that uses a separate microprocessor, memory, and input/output devices. In many undergraduate and post-graduate courses, teachi

  15. Dynamic Topography Revisited

    Science.gov (United States)

    Moresi, Louis

    2015-04-01

    Dynamic Topography Revisited Dynamic topography is usually considered to be one of the trinity of contributing causes to the Earth's non-hydrostatic topography along with the long-term elastic strength of the lithosphere and isostatic responses to density anomalies within the lithosphere. Dynamic topography, thought of this way, is what is left over when other sources of support have been eliminated. An alternate and explicit definition of dynamic topography is that deflection of the surface which is attributable to creeping viscous flow. The problem with the first definition of dynamic topography is 1) that the lithosphere is almost certainly a visco-elastic / brittle layer with no absolute boundary between flowing and static regions, and 2) the lithosphere is, a thermal / compositional boundary layer in which some buoyancy is attributable to immutable, intrinsic density variations and some is due to thermal anomalies which are coupled to the flow. In each case, it is difficult to draw a sharp line between each contribution to the overall topography. The second definition of dynamic topography does seem cleaner / more precise but it suffers from the problem that it is not measurable in practice. On the other hand, this approach has resulted in a rich literature concerning the analysis of large scale geoid and topography and the relation to buoyancy and mechanical properties of the Earth [e.g. refs 1,2,3] In convection models with viscous, elastic, brittle rheology and compositional buoyancy, however, it is possible to examine how the surface topography (and geoid) are supported and how different ways of interpreting the "observable" fields introduce different biases. This is what we will do. References (a.k.a. homework) [1] Hager, B. H., R. W. Clayton, M. A. Richards, R. P. Comer, and A. M. Dziewonski (1985), Lower mantle heterogeneity, dynamic topography and the geoid, Nature, 313(6003), 541-545, doi:10.1038/313541a0. [2] Parsons, B., and S. Daly (1983), The

  16. Enceladus' tidal dissipation revisited

    Science.gov (United States)

    Tobie, Gabriel; Behounkova, Marie; Choblet, Gael; Cadek, Ondrej; Soucek, Ondrej

    2016-10-01

    A series of chemical and physical evidence indicates that the intense activity at Enceladus' South Pole is related to a subsurface salty water reservoir underneath the tectonically active ice shell. The detection of a significant libration implies that this water reservoir is global and that the average ice shell thickness is about 20-25km (Thomas et al. 2016). The interpretation of gravity and topography data further predicts large variations in ice shell thickness, resulting in a shell potentially thinner than 5 km in the South Polar Terrain (SPT) (Cadek et al. 2016). Such an ice shell structure requires a very strong heat source in the interior, with a focusing mechanism at the SPT. Thermal diffusion through the ice shell implies that at least 25-30 GW is lost into space by passive diffusion, implying a very efficient dissipation mechanism in Enceladus' interior to maintain such an ocean/ice configuration thermally stable.In order to determine in which conditions such a large dissipation power may be generated, we model the tidal response of Enceladus including variable ice shell thickness. For the rock core, we consider a wide range of rheological parameters representative of water-saturated porous rock materials. We demonstrate that the thinning toward the South Pole leads to a strong increase in heat production in the ice shell, with a optimal thickness obtained between 1.5 and 3 km, depending on the assumed ice viscosity. Our results imply that the heat production in the ice shell within the SPT may be sufficient to counterbalance the heat loss by diffusion and to power eruption activity. However, outside the SPT, a strong dissipation in the porous core is required to counterbalance the diffusive heat loss. We show that about 20 GW can be generated in the core, for an effective viscosity of 1012 Pa.s, which is comparable to the effective viscosity estimated in water-saturated glacial tills on Earth. We will discuss the implications of this revisited tidal

  17. Big Data Revisited

    DEFF Research Database (Denmark)

    Kallinikos, Jannis; Constantiou, Ioanna

    2015-01-01

    We elaborate on key issues of our paper New games, new rules: big data and the changing context of strategy as a means of addressing some of the concerns raised by the paper’s commentators. We initially deal with the issue of social data and the role it plays in the current data revolution...... and the technological recording of facts. We further discuss the significance of the very mechanisms by which big data is produced as distinct from the very attributes of big data, often discussed in the literature. In the final section of the paper, we qualify the alleged importance of algorithms and claim...... that the structures of data capture and the architectures in which data generation is embedded are fundamental to the phenomenon of big data....

  18. Hybrid manifold embedding.

    Science.gov (United States)

    Liu, Yang; Liu, Yan; Chan, Keith C C; Hua, Kien A

    2014-12-01

    In this brief, we present a novel supervised manifold learning framework dubbed hybrid manifold embedding (HyME). Unlike most of the existing supervised manifold learning algorithms that give linear explicit mapping functions, the HyME aims to provide a more general nonlinear explicit mapping function by performing a two-layer learning procedure. In the first layer, a new clustering strategy called geodesic clustering is proposed to divide the original data set into several subsets with minimum nonlinearity. In the second layer, a supervised dimensionality reduction scheme called locally conjugate discriminant projection is performed on each subset for maximizing the discriminant information and minimizing the dimension redundancy simultaneously in the reduced low-dimensional space. By integrating these two layers in a unified mapping function, a supervised manifold embedding framework is established to describe both global and local manifold structure as well as to preserve the discriminative ability in the learned subspace. Experiments on various data sets validate the effectiveness of the proposed method.

  19. Remembered Experiences and Revisit Intentions

    DEFF Research Database (Denmark)

    Barnes, Stuart; Mattsson, Jan; Sørensen, Flemming

    2016-01-01

    Tourism is an experience-intensive sector in which customers seek and pay for experiences above everything else. Remembering past tourism experiences is also crucial for an understanding of the present, including the predicted behaviours of visitors to tourist destinations. We adopt a longitudinal...... approach to memory data collection from psychological science, which has the potential to contribute to our understanding of tourist behaviour. In this study, we examine the impact of remembered tourist experiences in a safari park. In particular, using matched survey data collected longitudinally and PLS...... path modelling, we examine the impact of positive affect tourist experiences on the development of revisit intentions. We find that longer-term remembered experiences have the strongest impact on revisit intentions, more so than predicted or immediate memory after an event. We also find that remembered...

  20. The Damped String Problem Revisited

    CERN Document Server

    Gesztesy, Fritz

    2010-01-01

    We revisit the damped string equation on a compact interval with a variety of boundary conditions and derive an infinite sequence of trace formulas associated with it, employing methods familiar from supersymmetric quantum mechanics. We also derive completeness and Riesz basis results (with parentheses) for the associated root functions under less smoothness assumptions on the coefficients than usual, using operator theoretic methods (rather than detailed eigenvalue and root function asymptotics) only.

  1. Revisiting SU(N) integrals

    CERN Document Server

    Zuber, Jean-Bernard

    2016-01-01

    In this note, I revisit integrals over $\\SU(N)$ of the form $ \\int DU\\, U_{i_1j_1}\\cdots U_{i_pj_p}\\Ud_{k_1l_1}\\cdots \\Ud_{k_nl_n}$. While the case $p=n$ is well known, it seems that explicit expressions for $p=n+N$ had not appeared in the literature. Similarities and differences, in particular in the large $N$ limit, between the two cases are discussed

  2. Design Methods for Embedded Security

    Directory of Open Access Journals (Sweden)

    I. Verbauwhede

    2009-11-01

    Full Text Available Embedded devices need both an efficient and a secure implementation of cryptographic algorithms. In this overview paper we show a typical top-down approach for secure and efficient implementation of embedded systems. We outline the security pyramid by illustrating the five primary abstraction levels in an embedded system. Focusing only on two levels - architecture and circuit level - we show how the design can be implemented to be both efficient and secure.

  3. Advances in embedded computer vision

    CERN Document Server

    Kisacanin, Branislav

    2014-01-01

    This illuminating collection offers a fresh look at the very latest advances in the field of embedded computer vision. Emerging areas covered by this comprehensive text/reference include the embedded realization of 3D vision technologies for a variety of applications, such as stereo cameras on mobile devices. Recent trends towards the development of small unmanned aerial vehicles (UAVs) with embedded image and video processing algorithms are also examined. The authoritative insights range from historical perspectives to future developments, reviewing embedded implementation, tools, technolog

  4. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  5. Embedded Systems Design with FPGAs

    CERN Document Server

    Pnevmatikatos, Dionisios; Sklavos, Nicolas

    2013-01-01

    This book presents methodologies for modern applications of embedded systems design, using field programmable gate array (FPGA) devices.  Coverage includes state-of-the-art research from academia and industry on a wide range of topics, including advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, dynamic reconfiguration and applications. Describes a variety of methodologies for modern embedded systems design;  Implements methodologies presented on FPGAs; Covers a wide variety of applications for reconfigurable embedded systems, including Bioinformatics, Communications and networking, Application acceleration, Medical solutions, Experiments for high energy physics, Astronomy, Aerospace, Biologically inspired systems and Computational fluid dynamics (CFD).

  6. Embedded sensor systems

    CERN Document Server

    Agrawal, Dharma Prakash

    2017-01-01

    This inspiring textbook provides an introduction to wireless technologies for sensors, explores potential use of sensors for numerous applications, and utilizes probability theory and mathematical methods as a means of embedding sensors in system design. It discusses the need for synchronization and underlying limitations, inter-relation between given coverage and connectivity to number of sensors needed, and the use of geometrical distance to determine location of the base station for data collection and explore use of anchor nodes for relative position determination of sensors. The book explores energy conservation, communication using TCP, the need for clustering and data aggregation, and residual energy determination and energy harvesting. It covers key topics of sensor communication like mobile base stations and relay nodes, delay-tolerant sensor networks, and remote sensing and possible applications. The book defines routing methods and do performance evaluation for random and regular sensor topology an...

  7. Watermark Embedding and Detection

    CERN Document Server

    Zhong, Jidong

    2006-01-01

    The embedder and the detector (or decoder) are the two most important components of the digital watermarking systems. Thus in this work, we discuss how to design a better embedder and detector (or decoder). I first give a summary of the prospective applications of watermarking technology and major watermarking schemes in the literature. My review on the literature closely centers upon how the side information is exploited at both embedders and detectors. In Chapter 3, I explore the optimum detector or decoder according to a particular probability distribution of the host signals. We found that the performance of both multiplicative and additive spread spectrum schemes depends on the shape parameter of the host signals. For spread spectrum schemes, the performance of the detector or the decoder is reduced by the host interference. Thus I present a new host-interference rejection technique for the multiplicative spread spectrum schemes. Its embedding rule is tailored to the optimum detection or decoding rule. T...

  8. Adaptable Embedded Systems

    CERN Document Server

    Lisbôa, Carlos; Carro, Luigi

    2013-01-01

    As embedded systems become more complex, designers face a number of challenges at different levels: they need to boost performance, while keeping energy consumption as low as possible, they need to reuse existent software code, and at the same time they need to take advantage of the extra logic available in the chip, represented by multiple processors working together.  This book describes several strategies to achieve such different and interrelated goals, by the use of adaptability. Coverage includes reconfigurable systems, dynamic optimization techniques such as binary translation and trace reuse, new memory architectures including homogeneous and heterogeneous multiprocessor systems, communication issues and NOCs, fault tolerance against fabrication defects and soft errors, and finally, how one can combine several of these techniques together to achieve higher levels of performance and adaptability.  The discussion also includes how to employ specialized software to improve this new adaptive system, and...

  9. Embedding potentials for excited states of embedded species.

    Science.gov (United States)

    Wesolowski, Tomasz A

    2014-05-14

    Frozen-Density-Embedding Theory (FDET) is a formalism to obtain the upper bound of the ground-state energy of the total system and the corresponding embedded wavefunction by means of Euler-Lagrange equations [T. A. Wesolowski, Phys. Rev. A 77(1), 012504 (2008)]. FDET provides the expression for the embedding potential as a functional of the electron density of the embedded species, electron density of the environment, and the field generated by other charges in the environment. Under certain conditions, FDET leads to the exact ground-state energy and density of the whole system. Following Perdew-Levy theorem on stationary states of the ground-state energy functional, the other-than-ground-state stationary states of the FDET energy functional correspond to excited states. In the present work, we analyze such use of other-than-ground-state embedded wavefunctions obtained in practical calculations, i.e., when the FDET embedding potential is approximated. Three computational approaches based on FDET, that assure self-consistent excitation energy and embedded wavefunction dealing with the issue of orthogonality of embedded wavefunctions for different states in a different manner, are proposed and discussed.

  10. Computer algebra in spacetime embedding

    CERN Document Server

    Roque, Waldir L

    2014-01-01

    In this paper we describe an algorithm to determine the vectors normal to a space-time V4 embedded in a pseudo-Euclidean manifold M4+n. An application of this algorithm is given considering the Schwarzchild space-time geometry embedded in a 6 dimensional pseudo-Euclidean manifold, using the algebraic computing system REDUCE.

  11. Molecular Properties through Polarizable Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2011-01-01

    We review the theory related to the calculation of electric and magnetic molecular properties through polarizable embedding. In particular, we derive the expressions for the response functions up to the level of cubic response within the density functional theory-based polarizable embedding (PE-D...

  12. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, Rene Rydhof

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety...

  13. Hybridity in Embedded Computing Systems

    Institute of Scientific and Technical Information of China (English)

    虞慧群; 孙永强

    1996-01-01

    An embedded system is a system that computer is used as a component in a larger device.In this paper,we study hybridity in embedded systems and present an interval based temporal logic to express and reason about hybrid properties of such kind of systems.

  14. Collaborative development of embedded systems

    NARCIS (Netherlands)

    Verhoef, Marcel; Pierce, Kenneth; Gamble, Carl; Broenink, Jan; Fitzgerald, John; Larsen, Peter Gorm; Verhoef, Marcel

    2014-01-01

    This chapter presents motivation for taking a collaborative multi-disciplinary approach to the model-based development of embedded systems. Starting from a consideration of the ubiquity of embedded systems in daily life it identifies challenges faced by industry in developing products in a timely ma

  15. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...

  16. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2002-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...

  17. Asymmetric distances for binary embeddings.

    Science.gov (United States)

    Gordo, Albert; Perronnin, Florent; Gong, Yunchao; Lazebnik, Svetlana

    2014-01-01

    In large-scale query-by-example retrieval, embedding image signatures in a binary space offers two benefits: data compression and search efficiency. While most embedding algorithms binarize both query and database signatures, it has been noted that this is not strictly a requirement. Indeed, asymmetric schemes that binarize the database signatures but not the query still enjoy the same two benefits but may provide superior accuracy. In this work, we propose two general asymmetric distances that are applicable to a wide variety of embedding techniques including locality sensitive hashing (LSH), locality sensitive binary codes (LSBC), spectral hashing (SH), PCA embedding (PCAE), PCAE with random rotations (PCAE-RR), and PCAE with iterative quantization (PCAE-ITQ). We experiment on four public benchmarks containing up to 1M images and show that the proposed asymmetric distances consistently lead to large improvements over the symmetric Hamming distance for all binary embedding techniques.

  18. Maximum Genus of Strong Embeddings

    Institute of Scientific and Technical Information of China (English)

    Er-ling Wei; Yan-pei Liu; Han Ren

    2003-01-01

    The strong embedding conjecture states that any 2-connected graph has a strong embedding on some surface. It implies the circuit double cover conjecture: Any 2-connected graph has a circuit double cover.Conversely, it is not true. But for a 3-regular graph, the two conjectures are equivalent. In this paper, a characterization of graphs having a strong embedding with exactly 3 faces, which is the strong embedding of maximum genus, is given. In addition, some graphs with the property are provided. More generally, an upper bound of the maximum genus of strong embeddings of a graph is presented too. Lastly, it is shown that the interpolation theorem is true to planar Halin graph.

  19. Lattice Embedding of Heronian Simplices

    CERN Document Server

    Lunnon, W Fred

    2012-01-01

    A rational triangle has rational edge-lengths and area; a rational tetrahedron has rational faces and volume; either is Heronian when its edge-lengths are integer, and proper when its content is nonzero. A variant proof is given, via complex number GCD, of the previously known result that any Heronian triangle may be embedded in the Cartesian lattice Z^2; it is then shown that, for a proper triangle, such an embedding is unique modulo lattice isometry; finally the method is extended via quaternion GCD to tetrahedra in Z^3, where uniqueness no longer obtains, and embeddings also exist which are unobtainable by this construction. The requisite complex and quaternionic number theoretic background is summarised beforehand. Subsequent sections engage with subsidiary implementation issues: initial rational embedding, canonical reduction, exhaustive search for embeddings additional to those yielded via GCD; and illustrative numerical examples are provided. A counter-example shows that this approach must fail in high...

  20. Metric embeddings bilipschitz and coarse embeddings into Banach spaces

    CERN Document Server

    Ostrovskii, Mikhail I

    2013-01-01

    Embeddings of discrete metric spaces into Banach spaces recently became an important tool in computer science and topology. The book will help readers to enter and to work in this very rapidly developing area having many important connections with different parts of mathematics and computer science. The purpose of the book is to present some of the most important techniques and results, mostly on bilipschitz and coarse embeddings. The topics include embeddability of locally finite metric spaces into Banach spaces is finitely determined, constructions of embeddings, distortion in terms of Poinc

  1. Jesus and the law revisited

    Directory of Open Access Journals (Sweden)

    William R.G. Loader

    2011-06-01

    Full Text Available This article revisited the issue of Jesus’ attitude towards the Torah on the basis of a critical discussion of the most recent extensive treatment of the theme by Meier in his A marginal Jew: Rethinking the historical Jesus: Volume four: Law and love (2009. It engaged Meier’s contribution in the light of contemporary research, concluding that, whilst Meier provided an erudite analysis, his thesis that Jesus’ teaching on divorce and oaths revoked Mosaic law did not convince, for it did not adequately consider the extent to which the contemporary interpretation of the Torah could encompass such radicalisation.

  2. Phylogenetic trees and Euclidean embeddings.

    Science.gov (United States)

    Layer, Mark; Rhodes, John A

    2017-01-01

    It was recently observed by de Vienne et al. (Syst Biol 60(6):826-832, 2011) that a simple square root transformation of distances between taxa on a phylogenetic tree allowed for an embedding of the taxa into Euclidean space. While the justification for this was based on a diffusion model of continuous character evolution along the tree, here we give a direct and elementary explanation for it that provides substantial additional insight. We use this embedding to reinterpret the differences between the NJ and BIONJ tree building algorithms, providing one illustration of how this embedding reflects tree structures in data.

  3. Embedded systems circuits and programming

    CERN Document Server

    Sanchez, Julio

    2012-01-01

    During the development of an engineered product, developers often need to create an embedded system--a prototype--that demonstrates the operation/function of the device and proves its viability. Offering practical tools for the development and prototyping phases, Embedded Systems Circuits and Programming provides a tutorial on microcontroller programming and the basics of embedded design. The book focuses on several development tools and resources: Standard and off-the-shelf components, such as input/output devices, integrated circuits, motors, and programmable microcontrollers The implementat

  4. McLean's second variation formula revisited

    Science.gov (United States)

    Lê, Hông Vân; Vanžura, Jiří

    2017-03-01

    We revisit McLean's second variation formulas for calibrated submanifolds in exceptional geometries, and correct his formulas concerning associative submanifolds and Cayley submanifolds, using a unified treatment based on the (relative) calibration method and Harvey-Lawson's identities.

  5. Cognitive Research on the Systematicity of Love Metaphors in Shakespeare's Play of Romeo and Juliet%《罗密欧与朱丽叶》中“爱情”隐喻的系统性认知研究

    Institute of Scientific and Technical Information of China (English)

    车明明; 陈瑞敏

    2015-01-01

    Based on the three types of conceptual metaphor from Shakespeare's play ofRomeo and Juli-et ,namely,love is fire,love is a journey and love is light,this paper analyzes the systematicity of the love metaphors from the cognitive perspective.The paper holds the belief that it is the systematicity of conceptual metaphor and the selective feature of the cognitive subject that lead to the openness and multidimensionality of metaphor,thus,it is hoped that the cognitive analysis from the perspective of systematicity will entail full cognition of the openness and multidimensionality of the love metaphors in the play.%基于《罗密欧与朱丽叶》中“爱情是火”、“爱情是旅程”及“爱情是光”三种概念隐喻,文章从认知视角对其爱情隐喻的系统性特征进行了剖析和论证。认为概念隐喻的系统性和认知主体的主体选择性决定了隐喻具有开放性和多维性,因此,基于对该剧中爱情隐喻系统性的了解便可全面认知其隐喻的开放性和多维性。

  6. Evaluation and Choice of Various Branch Predictors for Low-Power Embedded Processor

    Institute of Scientific and Technical Information of China (English)

    FAN DongRui (范东睿); YANG HongBo (杨洪波); GAO GuangRong (高光荣); ZHAO RongCai (赵荣彩)

    2003-01-01

    Power is an important design constraint in embedded computing systems. To meet the power constraint, microarchitecture and hardware designed to achieve high performance need to be revisited, from both performance and power angles. This paper studies one of them:branch predictor. As well known, branch prediction is critical to exploit instruction level parallelism effectively, but may incur additional power consumption due to the hardware resource dedicated for branch prediction and the extra power consumed on mispredicted branches. This paper explores the design space of branch prediction mechanisms and tries to find the most beneficial one to realize low-power embedded processor. The sample processor studied is Godson-like processor, which is a dual-issue, out-of-order processor with deep pipeline, supporting MIPS instruction set.

  7. Observability of multivariate differential embeddings

    Energy Technology Data Exchange (ETDEWEB)

    Aguirre, Luis Antonio [Laboratorio de Modelagem, Analise e Controle de Sistemas Nao Lineares, Departamento de Engenharia Eletronica, Universidade Federeal de Minas Gerais, Av. Antonio Carlos 6627, 31270-901 Belo Horizonte, MG (Brazil); Letellier, Christophe [Universite de Rouen-CORIA UMR 6614, Av. de l' Universite, BP 12, F-76801 Saint-Etienne du Rouvray Cedex (France)

    2005-07-15

    The present paper extends some results recently developed for the analysis of observability in nonlinear dynamical systems. The aim of the paper is to address the problem of embedding an attractor using more than one observable. A multivariate nonlinear observability matrix is proposed which includes the monovariable nonlinear and linear observability matrices as particular cases. Using the developed framework and a number of worked examples, it is shown that the choice of embedding coordinates is critical. Moreover, in some cases, to reconstruct the dynamics using more than one observable could be worse than to reconstruct using a scalar measurement. Finally, using the developed framework it is shown that increasing the embedding dimension, observability problems diminish and can even be eliminated. This seems to be a physically meaningful interpretation of the Takens embedding theorem.

  8. Embedded Systems Design: Optimization Challenges

    DEFF Research Database (Denmark)

    Pop, Paul

    2005-01-01

    of designing such systems is becoming increasingly important and difficult at the same time. New automated design optimization techniques are needed, which are able to: successfully manage the complexity of embedded systems, meet the constraints imposed by the application domain, shorten the time...... in use has become larger than the number of humans on the planet. The complexity of embedded systems is growing at a very high pace and the constraints in terms of functionality, performance, low energy consumption, reliability, cost and time-to-market are getting tighter. Therefore, the task......-to-market, and reduce development and manufacturing costs. In this paper, the author introduces several embedded systems design problems, and shows how they can be formulated as optimization problems. Solving such challenging design optimization problems are the key to the success of the embedded systems design...

  9. Visualizing spacetimes via embedding diagrams

    CERN Document Server

    Hledik, Stanislav; Cipko, Alois

    2016-01-01

    It is hard to imagine curved spacetimes of General Relativity. A simple but powerful way how to achieve this is visualizing them via embedding diagrams of both ordinary geometry and optical reference geometry. They facilitate to gain an intuitive insight into the gravitational field rendered into a curved spacetime, and to assess the influence of parameters like electric charge and spin of a black hole, magnetic field or cosmological constant. Optical reference geometry and related inertial forces and their relationship to embedding diagrams are particularly useful for investigation of test particles motion. Embedding diagrams of static and spherically symmetric, or stationary and axially symmetric black-hole and naked-singularity spacetimes thus present a useful concept for intuitive understanding of these spacetimes' nature. We concentrate on general way of embedding into 3-dimensional Euclidean space, and give a set of illustrative examples.

  10. Hardware Support for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2012-01-01

    The general Java runtime environment is resource hungry and unfriendly for real-time systems. To reduce the resource consumption of Java in embedded systems, direct hardware support of the language is a valuable option. Furthermore, an implementation of the Java virtual machine in hardware enables...... worst-case execution time analysis of Java programs. This chapter gives an overview of current approaches to hardware support for embedded and real-time Java....

  11. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2002-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...... be answered affirmatively for an idealized Haskell-like language and discuss to which extent Haskell can be used as a meta-language....

  12. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...... be answered affirmatively for an idealized Haskell-like language and discuss to which extent Haskell can be used as a meta-language....

  13. Multilingual Word Embeddings using Multigraphs

    OpenAIRE

    Soricut, Radu; Ding, Nan

    2016-01-01

    We present a family of neural-network--inspired models for computing continuous word representations, specifically designed to exploit both monolingual and multilingual text. This framework allows us to perform unsupervised training of embeddings that exhibit higher accuracy on syntactic and semantic compositionality, as well as multilingual semantic similarity, compared to previous models trained in an unsupervised fashion. We also show that such multilingual embeddings, optimized for semant...

  14. Hardware Support for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2012-01-01

    The general Java runtime environment is resource hungry and unfriendly for real-time systems. To reduce the resource consumption of Java in embedded systems, direct hardware support of the language is a valuable option. Furthermore, an implementation of the Java virtual machine in hardware enables...... worst-case execution time analysis of Java programs. This chapter gives an overview of current approaches to hardware support for embedded and real-time Java....

  15. Fresnel Lens with Embedded Vortices

    Directory of Open Access Journals (Sweden)

    Sunil Vyas

    2012-01-01

    Full Text Available Vortices of different charges are embedded in a wavefront that has quadratic phase variation, and the intensity distribution near the focal plane is studied. This method may be useful in realizing complicated beam profiles. We have experimentally demonstrated the generation of vortex arrays having integer as well as fractional topological charges that produce different intensity profiles at the focal plane. The phase variation realized on a spatial light modulator (SLM acts as a Fresnel lens with embedded vortices.

  16. Embedded Linux projects using Yocto project cookbook

    CERN Document Server

    González, Alex

    2015-01-01

    If you are an embedded developer learning about embedded Linux with some experience with the Yocto project, this book is the ideal way to become proficient and broaden your knowledge with examples that are immediately applicable to your embedded developments. Experienced embedded Yocto developers will find new insight into working methodologies and ARM specific development competence.

  17. The power reinforcement framework revisited

    DEFF Research Database (Denmark)

    Nielsen, Jeppe; Andersen, Kim Normann; Danziger, James N.

    2016-01-01

    Whereas digital technologies are often depicted as being capable of disrupting long-standing power structures and facilitating new governance mechanisms, the power reinforcement framework suggests that information and communications technologies tend to strengthen existing power arrangements within...... public organizations. This article revisits the 30-yearold power reinforcement framework by means of an empirical analysis on the use of mobile technology in a large-scale programme in Danish public sector home care. It explores whether and to what extent administrative management has controlled decision......-dominated and centrally controlled technologies that were the main focus of the 1970s and 1980s studies. Yet this study concludes that there is general support for the reinforcement framework in the contemporary application of mobile technology in public sector home care....

  18. Orthopaedic service lines-revisited.

    Science.gov (United States)

    Patterson, Cheryl

    2008-01-01

    This article revisits the application of orthopaedic service lines from early introduction and growth of this organizational approach in the 1980s, through the 1990s, and into the current decade. The author has experienced and worked in various service-line structures through these three decades, as well as the preservice-line era of 1970s orthopaedics. Past lessons learned during earlier phases and then current trends and analysis by industry experts are summarized briefly, with indication given of the future for service lines. Variation versus consistency of certain elements in service-line definitions and in operational models is discussed. Main components of service-line structures and typical processes are described briefly, along with a more detailed section on the service-line director/manager role. Current knowledge contained here will help guide the reader to more "out-of-the-box" thinking toward comprehensive orthopaedic centers of excellence.

  19. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  20. Design Methodologies for Secure Embedded Systems

    CERN Document Server

    Biedermann, Alexander

    2011-01-01

    Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? And how can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration o

  1. Embedding Graphs in Lorentzian Spacetime

    CERN Document Server

    Clough, James R

    2016-01-01

    Geometric approaches to network analysis combine simply defined models with great descriptive power. In this work we provide a method for embedding directed acyclic graphs into Minkowski spacetime using Multidimensional scaling (MDS). First we generalise the classical MDS algorithm, defined only for metrics with a Euclidean signature, to manifolds of any metric signature. We then use this general method to develop an algorithm to be used on networks which have causal structure allowing them to be embedded in Lorentzian manifolds. The method is demonstrated by calculating embeddings for both causal sets and citation networks in Minkowski spacetime. We finally suggest a number of applications in citation analysis such as paper recommendation, identifying missing citations and fitting citation models to data using this geometric approach.

  2. Embedded Processor Oriented Compiler Infrastructure

    Directory of Open Access Journals (Sweden)

    DJUKIC, M.

    2014-08-01

    Full Text Available In the recent years, research of special compiler techniques and algorithms for embedded processors broaden the knowledge of how to achieve better compiler performance in irregular processor architectures. However, industrial strength compilers, besides ability to generate efficient code, must also be robust, understandable, maintainable, and extensible. This raises the need for compiler infrastructure that provides means for convenient implementation of embedded processor oriented compiler techniques. Cirrus Logic Coyote 32 DSP is an example that shows how traditional compiler infrastructure is not able to cope with the problem. That is why the new compiler infrastructure was developed for this processor, based on research. in the field of embedded system software tools and experience in development of industrial strength compilers. The new infrastructure is described in this paper. Compiler generated code quality is compared with code generated by the previous compiler for the same processor architecture.

  3. Phase space embedding of electrocardiograms

    CERN Document Server

    Richter, M; Richter, Marcus; Schreiber, Thomas

    1998-01-01

    We study properties of the human electrocardiogram under the working hypothesis that fluctuations beyond the regular structure of single cardiac cycles are unpredictable. On this background we discuss the possibility to use the phase space embedding method for this kind of signal. In particular, the specific nature of the stochastic or high dimensional component allows to use phase space embeddings for certain signal processing tasks. As practical applications, we discuss noise filtering, fetal ECG extraction, and the automatic detection of clinically relevant features. The main purpose of the paper is to connect results of embedding theory which had not been previously applied in practise, and practical applications which had not yet been justified theoretically.

  4. Strong embeddings of minimum genus

    CERN Document Server

    Mohar, Bojan

    2009-01-01

    A "folklore conjecture, probably due to Tutte" (as described in [P.D. Seymour, Sums of circuits, Graph theory and related topics (Proc. Conf., Univ. Waterloo, 1977), pp. 341-355, Academic Press, 1979]) asserts that every bridgeless cubic graph can be embedded on a surface of its own genus in such a way that the face boundaries are cycles of the graph. In this paper we consider closed 2-cell embeddings of graphs and show that certain (cubic) graphs (of any fixed genus) have closed 2-cell embedding only in surfaces whose genus is very large (proportional to the order of these graphs), thus providing plethora of strong counterexamples to the above conjecture. The main result yielding such counterexamples may be of independent interest.

  5. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, Rene Rydhof

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety......-critical applications, a predictable Java processor built with FPGA technology, and an Eclipse based application development environment that binds the profile and the platform together and provides analyses that help to provide evidence that can be used as part of a safety case. This paper summarizes key contributions...

  6. Homogeneous Spaces and Equivariant Embeddings

    CERN Document Server

    Timashev, DA

    2011-01-01

    Homogeneous spaces of linear algebraic groups lie at the crossroads of algebraic geometry, theory of algebraic groups, classical projective and enumerative geometry, harmonic analysis, and representation theory. By standard reasons of algebraic geometry, in order to solve various problems on a homogeneous space it is natural and helpful to compactify it keeping track of the group action, i.e. to consider equivariant completions or, more generally, open embeddings of a given homogeneous space. Such equivariant embeddings are the subject of this book. We focus on classification of equivariant em

  7. Graph Embedding for Pattern Analysis

    CERN Document Server

    Ma, Yunqian

    2013-01-01

    Graph Embedding for Pattern Analysis covers theory methods, computation, and applications widely used in statistics, machine learning, image processing, and computer vision. This book presents the latest advances in graph embedding theories, such as nonlinear manifold graph, linearization method, graph based subspace analysis, L1 graph, hypergraph, undirected graph, and graph in vector spaces. Real-world applications of these theories are spanned broadly in dimensionality reduction, subspace learning, manifold learning, clustering, classification, and feature selection. A selective group of experts contribute to different chapters of this book which provides a comprehensive perspective of this field.

  8. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Hansen, René Rydhof; Ravn, Anders P.;

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety......-critical applications, a predictable Java processor built with FPGA technology, and an Eclipse based application development environment that binds the profile and the platform together and provides analyses that help to provide evidence that can be used as part of a safety case. This paper summarizes key contributions...

  9. Habitual Tastes and Embedded Taste

    DEFF Research Database (Denmark)

    Hedegaard, Liselotte

    2016-01-01

    of the national cuisine indicates continuity over time. There seems, hence, to be a gap between the multiplicity of instances of experience and recollection that belongs to the sphere of the individual and a historical memory embedded in the larger context of a society. From a common-sense perspective, this gap...... may be bridged by story-telling or other ways of handing over historically embedded practices, but this leaves a more fundamental question unanswered. Namely, that given that all remembrance has individual recollection as the point of departure, then how does individual recollection of tastes...

  10. Perturbation Theory of Embedded Eigenvalues

    DEFF Research Database (Denmark)

    Engelmann, Matthias

    We study problems connected to perturbation theory of embedded eigenvalues in two different setups. The first part deals with second order perturbation theory of mass shells in massive translation invariant Nelson type models. To this end an expansion of the eigenvalues w.r.t. fiber parameter up...... project gives a general and systematic approach to analytic perturbation theory of embedded eigenvalues. The spectral deformation technique originally developed in the theory of dilation analytic potentials in the context of Schrödinger operators is systematized by the use of Mourre theory. The group...

  11. Evolution of Deeply Embedded Protostars

    DEFF Research Database (Denmark)

    Frimann, Søren

    of this comparison is both to benchmark the simulations by testing if observational results can be reproduced, and to use the simulations to aid in the interpretation of the observations. The research deals with the earliest stages of star formation – the protostellar phase – where the protostars are still embedded...... tolink evidence of accretion bursts together with evidence of circumstellardisks. The study targets 20 embedded protostars in the Perseusmolecular cloud, and reveals plenty of evidence for variable accretionthrough observations of C18O (an optically thin isotopologue of CO).The study also reveals...

  12. Embedded EZ-Source Inverters

    DEFF Research Database (Denmark)

    Chiang Loh, Poh; Gao, Feng; Blaabjerg, Frede

    2010-01-01

    of embedded EZ-source inverters that can produce the same gain as the Z-source inverters but with smoother and smaller current/voltage maintained across the dc input source and within the impedance network. These latter features are attained without using any additional passive filter, which surely...... is a favorable advantage, since an added filter will raise the system cost and, at times, can complicate the dynamic tuning and resonant consideration of the inverters. The same embedded concept can also be used for designing a full range of voltage- and current-type inverters with each of them tested...

  13. Embedded EZ-Source Inverters

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Loh, Poh Chiang; Gao, F.

    2008-01-01

    -voltage oscillations to the system. Therefore, Z-source inverters are in effect safer and less complex, and can be implemented using only passive elements with no additional active semiconductor needed. Believing in the prospects of Z-source inverters, this paper contributes by introducing a new family of embedded EZ...... since an added filter will raise the system cost, and at times can complicate the dynamic tuning and resonant consideration of the inverters. The same embedded concept can also be used for designing a full range of voltage and current-type inverters with each of them tested experimentally using a number...

  14. A Brief Analysis of Characteristics of Pun in Romeo and Juliet%《罗密欧与朱丽叶》中双关语特点浅析

    Institute of Scientific and Technical Information of China (English)

    陈艳; 徐慧

    2014-01-01

    Pun as a figure of speech uses a word or phrase to have two meanings:literal meaning and connotation meaning. What's more, as a one of the very important figure of speech, pun occupies a great place in Chinese and English rhetoric figure. However, if we want to make future understanding of pun, we first have to understand the characteristics of pun. The thesis will make a brief analysis of characteristics of pun from phonetic correlation, semantic ambiguity and double context with the aid of Romeo and Juliet.%双关语作为“言在此而意在彼”的一种修辞方式,利用一个词语或词组所关涉的表里两层意思来达到一箭双雕的修辞功能。作为一种重要的修辞方式,无存在汉语修辞还是在英语修辞中,都起着举足轻重的重要地位,然而要想进一步了解双关语,我们不得不首先对其特点做一了解。本文乃借助莎士比亚戏剧作品之一《罗密欧与朱丽叶》从语音上的相关性;语义上的多歧义性以及双重语境三个方面来对英语中的双关语特点作一浅要分析。

  15. An Adaptive and Hybrid Approach for Revisiting the Visibility Pipeline

    Directory of Open Access Journals (Sweden)

    Ícaro Lins Leitão da Cunha

    2016-04-01

    Full Text Available We revisit the visibility problem, which is traditionally known in Computer Graphics and Vision fields as the process of computing a (potentially visible set of primitives in the computational model of a scene. We propose a hybrid solution that uses a dry structure (in the sense of data reduction, a triangulation of the type J1a, to accelerate the task of searching for visible primitives. We came up with a solution that is useful for real-time, on-line, interactive applications as 3D visualization. In such applications the main goal is to load the minimum amount of primitives from the scene during the rendering stage, as possible. For this purpose, our algorithm executes the culling by using a hybrid paradigm based on viewing-frustum, back-face culling and occlusion models. Results have shown substantial improvement over these traditional approaches if applied separately. This novel approach can be used in devices with no dedicated processors or with low processing power, as cell phones or embedded displays, or to visualize data through the Internet, as in virtual museums applications.

  16. Morphware - Fremtidens Embedded System Platform

    DEFF Research Database (Denmark)

    Madsen, Jan

    2006-01-01

    FPGA'er bliver i stigende grad brugt som komponenter i embedded systemer. Faldende priser, større kapacitet og en større felksibilitet har gjort FPGA'en til en attraktiv og konkurrencedygtig teknologi der tillader en stadig stigende grad af system integration, hvor traditionel hardware og software...

  17. Software for Embedded Control Systems

    NARCIS (Netherlands)

    Broenink, Jan F.; Hilderink, Gerald H.; Jovanovic, Dusko S.

    2001-01-01

    The research of our team deals with the realization of control schemes on digital computers. As such the emphasis is on embedded control software implementation. Applications are in the field of mechatronic devices, using a mechatronic design approach (the integrated and optimal design of a mechanic

  18. Simulation and Embedded Smart Control

    DEFF Research Database (Denmark)

    Conrad, Finn; Fan, Zhun; Sørensen, Torben

    2006-01-01

    The paper presents results obtained from a Danish mechatronic research program focusing on intelligent motion control, simulation and embedded smart controllers for hydraulic actuators and robots as well as results from the EU projects. A mechatronic test facility with digital controllers...... and algorithms. Furthermore, a developed IT-tool concept for controller and system design utilizing the ISO 10303 STEP Standard is proposed....

  19. Embedding Sensors During Additive Manufacturing

    Energy Technology Data Exchange (ETDEWEB)

    Sbriglia, Lexey Raylene [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-08-10

    This PowerPoint presentation had the following headings: Fused deposition modeling (FDM); Open source 3D printing; Objectives; Vibration analysis; Equipment; Design; Material choices; Failure causes, such as tension, bubbling; Potential solutions; Simulations; Embedding the sensors; LabView programming; Alternate data acquisition; Problem and proposed solution; and, Conclusions

  20. Embedding Laboratory Experience in Lectures

    Science.gov (United States)

    Morgan, James R.; Barroso, Luciana R.; Simpson, Nancy

    2009-01-01

    Demonstrations can be very effective at enhancing student learning and represent a mechanism for embedding laboratory experiences within a classroom setting. A key component to an effective demonstration is active student engagement throughout the entire process, leading to a guided laboratory experience in a lecture setting. Students are involved…

  1. Revisiting tourist behavior via destination brand worldness

    Directory of Open Access Journals (Sweden)

    Murat Kayak

    2016-11-01

    Full Text Available Taking tourists’ perspective rather than destination offerings as its core concept, this study introduces “perceived destination brand worldness” as a variable. Perceived destination brand worldness is defined as the positive perception that a tourist has of a country that is visited by tourists from all over the world. Then, the relationship between perceived destination brand worldness and intention to revisit is analyzed using partial least squares regression. This empirical study selects Taiwanese tourists as its sample, and the results show that perceived destination brand worldness is a direct predictor of intention to revisit. In light of these empirical findings and observations, practical and theoretical implications are discussed.

  2. Density Matrix Embedding: A Strong-Coupling Quantum Embedding Theory.

    Science.gov (United States)

    Knizia, Gerald; Chan, Garnet Kin-Lic

    2013-03-12

    We extend our density matrix embedding theory (DMET) [Phys. Rev. Lett.2012, 109, 186404] from lattice models to the full chemical Hamiltonian. DMET allows the many-body embedding of arbitrary fragments of a quantum system, even when such fragments are open systems and strongly coupled to their environment (e.g., by covalent bonds). In DMET, empirical approaches to strong coupling, such as link atoms or boundary regions, are replaced by a small, rigorous quantum bath designed to reproduce the entanglement between a fragment and its environment. We describe the theory and demonstrate its feasibility in strongly correlated hydrogen ring and grid models; these are not only beyond the scope of traditional embeddings but even challenge conventional quantum chemistry methods themselves. We find that DMET correctly describes the notoriously difficult symmetric dissociation of a 4 × 3 hydrogen atom grid, even when the treated fragments are as small as single hydrogen atoms. We expect that DMET will open up new ways of treating complex strongly coupled, strongly correlated systems in terms of their individual fragments.

  3. Leukemia and ionizing radiation revisited

    Energy Technology Data Exchange (ETDEWEB)

    Cuttler, J.M. [Cuttler & Associates Inc., Vaughan, Ontario (Canada); Welsh, J.S. [Loyola University-Chicago, Dept. or Radiation Oncology, Stritch School of Medicine, Maywood, Illinois (United States)

    2016-03-15

    A world-wide radiation health scare was created in the late 19508 to stop the testing of atomic bombs and block the development of nuclear energy. In spite of the large amount of evidence that contradicts the cancer predictions, this fear continues. It impairs the use of low radiation doses in medical diagnostic imaging and radiation therapy. This brief article revisits the second of two key studies, which revolutionized radiation protection, and identifies a serious error that was missed. This error in analyzing the leukemia incidence among the 195,000 survivors, in the combined exposed populations of Hiroshima and Nagasaki, invalidates use of the LNT model for assessing the risk of cancer from ionizing radiation. The threshold acute dose for radiation-induced leukemia, based on about 96,800 humans, is identified to be about 50 rem, or 0.5 Sv. It is reasonable to expect that the thresholds for other cancer types are higher than this level. No predictions or hints of excess cancer risk (or any other health risk) should be made for an acute exposure below this value until there is scientific evidence to support the LNT hypothesis. (author)

  4. The mycorrhiza helper bacteria revisited.

    Science.gov (United States)

    Frey-Klett, P; Garbaye, J; Tarkka, M

    2007-01-01

    In natural conditions, mycorrhizal fungi are surrounded by complex microbial communities, which modulate the mycorrhizal symbiosis. Here, the focus is on the so-called mycorrhiza helper bacteria (MHB). This concept is revisited, and the distinction is made between the helper bacteria, which assist mycorrhiza formation, and those that interact positively with the functioning of the symbiosis. After considering some examples of MHB from the literature, the ecological and evolutionary implications of the relationships of MHB with mycorrhizal fungi are discussed. The question of the specificity of the MHB effect is addressed, and an assessment is made of progress in understanding the mechanisms of the MHB effect, which has been made possible through the development of genomics. Finally, clear evidence is presented suggesting that some MHB promote the functioning of the mycorrhizal symbiosis. This is illustrated for three critical functions of practical significance: nutrient mobilization from soil minerals, fixation of atmospheric nitrogen, and protection of plants against root pathogens. The review concludes with discussion of future research priorities regarding the potentially very fruitful concept of MHB.

  5. On Embeddings of Tori in Euclidean Spaces

    Institute of Scientific and Technical Information of China (English)

    Matija CENCELJ; Du(s)an REPOV(S)

    2005-01-01

    Using the relation between the set of embeddings of tori into Euclidean spaces modulo ambient isotopies and the homotopy groups of Stiefel manifolds, we prove new results on embeddings of tori into Euclidean spaces.

  6. Embedding complementarity in HCI methods

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Levinsen, Karin

    2007-01-01

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...... in the techniques and the tools that we apply. We lack a framework for discussing what and who we are, when we talk about a person as the user of an ICT system that has to be designed, developed and implemented. As a framework, we suggest a theory of complementary positions that insists on solid accounts from all...... observer posi-tions in relation to perspective, standpoint and focus. We need to develop com-plementary theories that embed complexity, and we need to reflect critically upon forty years of dominance by rationalistic, empirical understandings of the user as illustrated in the literature and practice within...

  7. Revisiting separation properties of convex fuzzy sets

    Science.gov (United States)

    Separation of convex sets by hyperplanes has been extensively studied on crisp sets. In a seminal paper separability and convexity are investigated, however there is a flaw on the definition of degree of separation. We revisited separation on convex fuzzy sets that have level-wise (crisp) disjointne...

  8. The Faraday effect revisited: General theory

    DEFF Research Database (Denmark)

    Cornean, Horia Decebal; Nenciu, Gheorghe; Pedersen, Thomas Garm

    This paper is the first in a series revisiting the Faraday effect, or more generally, the theory of electronic quantum transport/optical response in bulk media in the presence of a constant magnetic field. The independent electron approximation is assumed. For free electrons, the transverse...

  9. The Faraday effect revisited: General theory

    DEFF Research Database (Denmark)

    Cornean, Horia Decebal; Nenciu, Gheorghe; Pedersen, Thomas Garm

    2006-01-01

    This paper is the first in a series revisiting the Faraday effect, or more generally, the theory of electronic quantum transport/optical response in bulk media in the presence of a constant magnetic field. The independent electron approximation is assumed. At zero temperature and zero frequency...

  10. The Future of Engineering Education--Revisited

    Science.gov (United States)

    Wankat, Phillip C.; Bullard, Lisa G.

    2016-01-01

    This paper revisits the landmark CEE series, "The Future of Engineering Education," published in 2000 (available free in the CEE archives on the internet) to examine the predictions made in the original paper as well as the tools and approaches documented. Most of the advice offered in the original series remains current. Despite new…

  11. Revisiting Basic Counseling Skills with Children

    Science.gov (United States)

    Van Velsor, Patricia

    2004-01-01

    Counseling with children can be challenging for counselors whose training focused on adult clients. The purpose of this article is to offer information to counselors seeking to improve their skills with children, revisiting a topic discussed in an earlier Journal of Counseling & Development article by P. Erdman and R. Lampe (1996). Examples of…

  12. Revisiting three intellectual pillars of monetary policy

    National Research Council Canada - National Science Library

    Borio, Claudio

    2016-01-01

    ... not. More specifically, I would like to revisit and question three deeply held beliefs that underpin current monetary policy received wisdom. The first belief is that it is appropriate to define equilibrium (or natural) rates as those consistent with output at potential and with stable prices (inflation) in any given period--the so-called Wi...

  13. Revisiting the Regenerative Possibilities of Ortiz

    Science.gov (United States)

    Duques, Matthew

    2004-01-01

    The author of this article revisits Simon Ortiz's poem, "From Sand Creek," in which the latter can in so few words convey both the horrific tragedy of conquest and colonization, while at the same time find a space for possibility, a means for recovery that is never about forgetting but always occurs as a kind of recuperative remembering. Ortiz…

  14. Corrosion Monitors for Embedded Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Robinson, Alex L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pfeifer, Kent B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Casias, Adrian L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Howell, Stephen W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sorensen, Neil R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Missert, Nancy A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-05-01

    We have developed and characterized novel in-situ corrosion sensors to monitor and quantify the corrosive potential and history of localized environments. Embedded corrosion sensors can provide information to aid health assessments of internal electrical components including connectors, microelectronics, wires, and other susceptible parts. When combined with other data (e.g. temperature and humidity), theory, and computational simulation, the reliability of monitored systems can be predicted with higher fidelity.

  15. Characterization of Embedded BPM Collimators

    CERN Document Server

    VALENTINO, Gianluca

    2015-01-01

    During LS1, 16 tertiary collimators (TCTs) and 2 secondary collimators (TCSGs) in IR6 were replaced by new embedded BPM collimators. The BPM functionality allows the possibility to align the collimators more quickly and therefore be able to respond faster to machine configuration changes, as well as a direct monitoring of the beam orbit at the collimators. Following an initial commissioning phase, an MD was carried out to test the new collimators and acquisition electronics with beam in the LHC.

  16. Cybersecurity of embedded computers systems

    OpenAIRE

    Carlioz, Jean

    2016-01-01

    International audience; Several articles have recently raised the issue of computer security of commercial flights by evoking the "connected aircraft, hackers target" or "Wi-Fi on planes, an open door for hackers ? " Or "Can you hack the computer of an Airbus or a Boeing ?". The feared scenario consists in a takeover of operational aircraft software that intentionally cause an accident. Moreover, several computer security experts have lately announced they had detected flaws in embedded syste...

  17. Fundamental cycles and graph embeddings

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    In this paper, we investigate fundamental cycles in a graph G and their relations with graph embeddings. We show that a graph G may be embedded in an orientable surface with genus at least g if and only if for any spanning tree T , there exists a sequence of fundamental cycles C1, C2, . . . , C2g with C2i-1 ∩ C2i≠ф for 1≤ i ≤g. In particular, among β(G) fundamental cycles of any spanning tree T of a graph G, there are exactly 2γM (G) cycles C1, C2, . . . , C2γM (G) such that C2i-1 ∩ C2i≠ф for 1 ≤i≤γM (G), where β(G) and γM (G) are the Betti number and the maximum genus of G, respectively. This implies that it is possible to construct an orientable embedding with large genus of a graph G from an arbitrary spanning tree T (which may have very large number of odd components in G\\E(T )). This is different from the earlier work of Xuong and Liu, where spanning trees with small odd components are needed. In fact, this makes a common generalization of Xuong, Liu and Fu et al. Furthermore, we show that (1) this result is useful for locating the maximum genus of a graph having a specific edge-cut. Some known results for embedded graphs are also concluded; (2) the maximum genus problem may be reduced to the maximum matching problem. Based on this result and the algorithm of Micali-Vazirani, we present a new efficient algorithm to determine the maximum genus of a graph in O((β(G)) 25 ) steps. Our method is straight and quite different from the algorithm of Furst, Gross and McGeoch which depends on a result of Giles where matroid parity method is needed.

  18. Embedded multiprocessors scheduling and synchronization

    CERN Document Server

    Sriram, Sundararajan

    2009-01-01

    Techniques for Optimizing Multiprocessor Implementations of Signal Processing ApplicationsAn indispensable component of the information age, signal processing is embedded in a variety of consumer devices, including cell phones and digital television, as well as in communication infrastructure, such as media servers and cellular base stations. Multiple programmable processors, along with custom hardware running in parallel, are needed to achieve the computation throughput required of such applications. Reviews important research in key areas related to the multiprocessor implementation of multi

  19. Embedding initial data for black hole collisions

    CERN Document Server

    Romano, J D; Romano, Joseph D; Price, Richard H

    1994-01-01

    We discuss isometric embedding diagrams for the visualization of initial data for the problem of the head-on collision of two black holes. The problem of constructing the embedding diagrams is explicitly presented for the best studied initial data, the Misner geometry. We present a partial solution of the embedding diagrams and discuss issues related to completing the solution.

  20. Embedded Services in Chinese Academic Libraries

    Science.gov (United States)

    Si, Li; Xing, Wenming; Zhou, Limei; Liu, Sha

    2012-01-01

    Embedded librarianship service describes the practice of librarians integrating actively into the user's environment, rather than remaining in the library to await requests for service. This paper examines the concept of embedded service in the recent literature, within the past 5 years. It reports on a survey of embedded service in Chinese…

  1. Indoor Positioning Using GPS Revisited

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun; Blunck, Henrik; Godsk, Torben

    2010-01-01

    It has been considered a fact that GPS performs too poorly inside buildings to provide usable indoor positioning. We analyze results of a measurement campaign to improve on the understanding of indoor GPS reception characteristics. The results show that using state-of-the-art receivers GPS...... low signal-to-noise ratios, multipath phenomena or bad satellite constellation geometry. We have also measured the indoor performance of embedded GPS receivers in mobile phones which provided lower availability and accuracy than state-of-the-art ones. Finally, we consider how the GPS performance...

  2. Revisiting the 1761 Transatlantic Tsunami

    Science.gov (United States)

    Baptista, Maria Ana; Wronna, Martin; Miranda, Jorge Miguel

    2016-04-01

    The tsunami catalogs of the Atlantic include two transatlantic tsunamis in the 18th century the well known 1st November 1755 and the 31st March 1761. The 31st March 1761 earthquake struck Portugal, Spain, and Morocco. The earthquake occurred around noontime in Lisbon alarming the inhabitants and throwing down ruins of the past 1st November 1755 earthquake. According to several sources, the earthquake was followed by a tsunami observed as far as Cornwall (United Kingdom), Cork (Ireland) and Barbados (Caribbean). The analysis of macroseismic information and its compatibility with tsunami travel time information led to a source area close to the Ampere Seamount with an estimated epicenter circa 34.5°N 13°W. The estimated magnitude of the earthquake was 8.5. In this study, we revisit the tsunami observations, and we include a report from Cadiz not used before. We use the results of the compilation of the multi-beam bathymetric data, that covers the area between 34°N - 38°N and 12.5°W - 5.5°W and use the recent tectonic map published for the Southwest Iberian Margin to select among possible source scenarios. Finally, we use a non-linear shallow water model that includes the discretization and explicit leap-frog finite difference scheme to solve the shallow water equations in the spherical or Cartesian coordinate to compute tsunami waveforms and tsunami inundation and check the results against the historical descriptions to infer the source of the event. This study received funding from project ASTARTE- Assessment Strategy and Risk Reduction for Tsunamis in Europe a collaborative project Grant 603839, FP7-ENV2013 6.4-3

  3. Isometric embeddings in cosmology and astrophysics

    Indian Academy of Sciences (India)

    Gareth Amery; Jothi Moodley; James Paul Londal

    2011-09-01

    Recent interest in higher-dimensional cosmological models has prompted some signifi-cant work on the mathematical technicalities of how one goes about embedding spacetimes into some higher-dimensional space. We survey results in the literature (existence theorems and simple explicit embeddings); briefly outline our work on global embeddings as well as explicit results for more complex geometries; and provide some examples. These results are contextualized physically, so as to provide a foundation for a detailed commentary on several key issues in the field such as: the meaning of `Ricci equivalent’ embeddings; the uniqueness of local (or global) embeddings; symmetry inheritance properties; and astrophysical constraints.

  4. Node Embedding via Word Embedding for Network Community Discovery

    CERN Document Server

    Ding, Weicong; Ishwar, Prakash

    2016-01-01

    Neural node embeddings have recently emerged as a powerful representation for supervised learning tasks involving graph-structured data. We leverage this recent advance to develop a novel algorithm for unsupervised community discovery in graphs. Through extensive experimental studies on simulated and real-world data, we demonstrate that the proposed approach consistently improves over the current state-of-the-art. Specifically, our approach empirically attains the information-theoretic limits for community recovery under the benchmark Stochastic Block Models for graph generation and exhibits better stability and accuracy over both Spectral Clustering and Acyclic Belief Propagation in the community recovery limits.

  5. A Literary Study on Embedding Therapy

    Directory of Open Access Journals (Sweden)

    Kwang-Ho Lee

    2003-12-01

    Full Text Available Background : This study focuses on a new acupuncture method of embedding method which inserts a substance on the acupuncture points for continuous stimulation. Clinical applications and cautions were examined through literary investigations. Results : Based on the literary consideration of embedding method, the following results were obtained: 1. Embedding method is a combination of traditional and embedding technique to provide longer duration of stimulation on the acupuncture points. 2. To administer the embedding method, one needs to utilize a embedding thread besides acupuncture apparatus. Sheep gut is commonly used in China and the surgical thread is the choice in Korea. 3. Embedding method may vary from the patient to patient, depending on the nature and location of the illness. Piercing, embedding, and tying are some of the possibilities. 4. Embedding method may have different arrangement of threads based on the choice of usage. 5. Embedding method is effective for various chronic illnesses such as aches, functional diseases, and the diseases of internal organs. 6. When using the embedding methods, cautions against infection and side effects due to strong stimulation are mandatory.

  6. Architecture design of a virtualized embedded system

    Directory of Open Access Journals (Sweden)

    A.Sbaa

    2013-01-01

    Full Text Available Nowadays, embedded systems have become a major driver of technological developments particularly in the industrial sector. In an embedded system, the hardware and software components are so intertwined that evolution is often a big issue. Thanks to the contributions of virtualization it is possible to design more flexible and scalable embedded systems. In fact, virtualization adds an abstraction layer between the hardware and the software to make it less intimately dependent. In this paper we propose system architecture based on embedded virtualization that will be modeled by the multi-agent systems. In the first part, we will discuss the state of the art with respect to embedded systems, multi-agent systems and the concept of virtualization. In the second part, we explain theissues related to traditional embedded systems and the constraints associated with their architecture. Subsequently, we propose a virtualization based architecture for embedded systems. In the last part we will showcase this architecture through a prototype.

  7. Multipole moments for embedding potentials

    DEFF Research Database (Denmark)

    Nørby, Morten Steen; Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2016-01-01

    Polarizable quantum mechanical (QM)/molecular mechanics (MM)-embedding methods are currently among the most promising methods for computationally feasible, yet reliable, production calculations of localized excitations and molecular response properties of large molecular complexes, such as proteins...... extended with site polarizabilities including internal charge transfer terms. We present a new way of dealing with well-known problems in relation to the use of basis sets with diffuse functions in conventional atomic allocation algorithms, avoiding numerical integration schemes. Using this approach, we...

  8. Testing Complex and Embedded Systems

    CERN Document Server

    Pries, Kim H

    2010-01-01

    Many enterprises regard system-level testing as the final piece of the development effort, rather than as a tool that should be integrated throughout the development process. As a consequence, test teams often execute critical test plans just before product launch, resulting in much of the corrective work being performed in a rush and at the last minute. Presenting combinatorial approaches for improving test coverage, Testing Complex and Embedded Systems details techniques to help you streamline testing and identify problems before they occur--including turbocharged testing using Six Sigma and

  9. Professional Windows Embedded Compact 7

    CERN Document Server

    Phung, Samuel; Joubert, Thierry; Hall, Mike

    2011-01-01

    Learn to program an array of customized devices and solutions As a compact, highly efficient, scalable operating system, Windows Embedded Compact 7 (WEC7) is one of the best options for developing a new generation of network-enabled, media-rich, and service-oriented devices. This in-depth resource takes you through the benefits and capabilities of WEC7 so that you can start using this performance development platform today. Divided into several major sections, the book begins with an introduction and then moves on to coverage of OS design, application development, advanced application developm

  10. Audio Steganography with Embedded Text

    Science.gov (United States)

    Teck Jian, Chua; Chai Wen, Chuah; Rahman, Nurul Hidayah Binti Ab.; Hamid, Isredza Rahmi Binti A.

    2017-08-01

    Audio steganography is about hiding the secret message into the audio. It is a technique uses to secure the transmission of secret information or hide their existence. It also may provide confidentiality to secret message if the message is encrypted. To date most of the steganography software such as Mp3Stego and DeepSound use block cipher such as Advanced Encryption Standard or Data Encryption Standard to encrypt the secret message. It is a good practice for security. However, the encrypted message may become too long to embed in audio and cause distortion of cover audio if the secret message is too long. Hence, there is a need to encrypt the message with stream cipher before embedding the message into the audio. This is because stream cipher provides bit by bit encryption meanwhile block cipher provide a fixed length of bits encryption which result a longer output compare to stream cipher. Hence, an audio steganography with embedding text with Rivest Cipher 4 encryption cipher is design, develop and test in this project.

  11. Testing framework for embedded languages

    Science.gov (United States)

    Leskó, Dániel; Tejfel, Máté

    2012-09-01

    Embedding a new programming language into an existing one is a widely used technique, because it fastens the development process and gives a part of a language infrastructure for free (e.g. lexical, syntactical analyzers). In this paper we are presenting a new advantage of this development approach regarding to adding testing support for these new languages. Tool support for testing is a crucial point for a newly designed programming language. It could be done in the hard way by creating a testing tool from scratch, or we could try to reuse existing testing tools by extending them with an interface to our new language. The second approach requires less work, and also it fits very well for the embedded approach. The problem is that the creation of such interfaces is not straightforward at all, because the existing testing tools were mostly not designed to be extendable and to be able to deal with new languages. This paper presents an extendable and modular model of a testing framework, in which the most basic design decision was to keep the - previously mentioned - interface creation simple and straightforward. Other important aspects of our model are the test data generation, the oracle problem and the customizability of the whole testing phase.

  12. Information embedding meets distributed control

    CERN Document Server

    Grover, Pulkit; Sahai, Anant

    2010-01-01

    We consider the problem of information embedding where the encoder modifies a white Gaussian host signal in a power-constrained manner to encode the message, and the decoder recovers both the embedded message and the modified host signal. This extends the recent work of Sumszyk and Steinberg to the continuous-alphabet Gaussian setting. We show that a dirty-paper-coding based strategy achieves the optimal rate for perfect recovery of the modified host and the message. We also provide bounds for the extension wherein the modified host signal is recovered only to within a specified distortion. When specialized to the zero-rate case, our results provide the tightest known lower bounds on the asymptotic costs for the vector version of a famous open problem in distributed control -- the Witsenhausen counterexample. Using this bound, we characterize the asymptotically optimal costs for the vector Witsenhausen problem numerically to within a factor of 1.3 for all problem parameters, improving on the earlier best know...

  13. Drilling azimuth gamma embedded design

    Directory of Open Access Journals (Sweden)

    Zhou Yi Ren

    2016-01-01

    Full Text Available Embedded drilling azimuth gamma design, the use of radioactive measuring principle embedded gamma measurement while drilling a short section analysis. Monte Carlo method, in response to the density of horizontal well logging numerical simulation of 16 orientation, the orientation of horizontal well analysed, calliper, bed boundary location, space, different formation density, formation thickness, and other factors inclined strata dip the impact by simulating 137Cs sources under different formation conditions of the gamma distribution, to determine the orientation of drilling density tool can detect window size and space, draw depth of the logging methods. The data 360° azimuth imaging, image processing method to obtain graph, display density of the formation, dip and strata thickness and other parameters, the logging methods obtain real-time geo-steering. To establish a theoretical basis for the orientation density logging while drilling method implementation and application of numerical simulation in-depth study of the MWD azimuth and density log response factors of horizontal wells.

  14. Revisiting the Diffusion Problem in a Capillary Tube Geometry

    CERN Document Server

    Sullivan, Eric

    2012-01-01

    The present work revisits the problem of modeling diffusion above a stagnant liquid interface in a capillary tube geometry. In this revisitation we elucidate a misconception found in the classical model proposed by Bird et. al. Furthermore, we propose alternative explanations for thermally forced diffusion and provide a description of natural convection in the absence of forcing terms.

  15. Hyperinflation in Brazil, Israel, and Nicaragua revisited

    OpenAIRE

    Szybisz, M A; Szybisz, L.

    2016-01-01

    The aim of this work is to address the description of hyperinflation regimes in economy. The spirals of hyperinflation developed in Brazil, Israel, and Nicaragua are revisited. This new analysis of data indicates that the episodes occurred in Brazil and Nicaragua can be understood within the frame of the model available in the literature, which is based on a nonlinear feedback (NLF) characterized by an exponent $\\beta>0$. In the NLF model the accumulated consumer price index carries a finite ...

  16. Spine revisited: Principles and parlance redefined

    Directory of Open Access Journals (Sweden)

    Kothari M

    2005-01-01

    Full Text Available A revised appreciation of the evolution and the nature of bone in general and of vertebrae in particular, allows revisiting the human spine to usher in some new principles and more rational parlance, that embody spine′s phylogeny, ontogeny, anatomy and physiology. Such an approach accords primacy to spine′s soft-tissues, and relegates to its bones a secondary place.

  17. The Actinide Transition Revisited by Gutzwiller Approximation

    Science.gov (United States)

    Xu, Wenhu; Lanata, Nicola; Yao, Yongxin; Kotliar, Gabriel

    2015-03-01

    We revisit the problem of the actinide transition using the Gutzwiller approximation (GA) in combination with the local density approximation (LDA). In particular, we compute the equilibrium volumes of the actinide series and reproduce the abrupt change of density found experimentally near plutonium as a function of the atomic number. We discuss how this behavior relates with the electron correlations in the 5 f states, the lattice structure, and the spin-orbit interaction. Our results are in good agreement with the experiments.

  18. Revisiting Cementoblastoma with a Rare Case Presentation.

    Science.gov (United States)

    Subramani, Vijayanirmala; Narasimhan, Malathi; Ramalingam, Suganya; Anandan, Soumya; Ranganathan, Subhashini

    2017-01-01

    Cementoblastoma is a rare benign odontogenic neoplasm which is characterized by the proliferation of cellular cementum. Diagnosis of cementoblastoma is challenging because of its protracted clinical, radiographic features, and bland histological appearance; most often cementoblastoma is often confused with other cementum and bone originated lesions. The aim of this article is to overview/revisit, approach the diagnosis of cementoblastoma, and also present a unique radiographic appearance of a cementoblastoma lesion associated with an impacted tooth.

  19. Revisiting Cementoblastoma with a Rare Case Presentation

    Directory of Open Access Journals (Sweden)

    Vijayanirmala Subramani

    2017-01-01

    Full Text Available Cementoblastoma is a rare benign odontogenic neoplasm which is characterized by the proliferation of cellular cementum. Diagnosis of cementoblastoma is challenging because of its protracted clinical, radiographic features, and bland histological appearance; most often cementoblastoma is often confused with other cementum and bone originated lesions. The aim of this article is to overview/revisit, approach the diagnosis of cementoblastoma, and also present a unique radiographic appearance of a cementoblastoma lesion associated with an impacted tooth.

  20. Conditional mean embeddings as regressors - supplementary

    CERN Document Server

    Grünewälder, Steffen; Baldassarre, Luca; Patterson, Sam; Gretton, Arthur; Pontil, Massimilano

    2012-01-01

    We demonstrate an equivalence between reproducing kernel Hilbert space (RKHS) embeddings of conditional distributions and vector-valued regressors. This connection introduces a natural regularized loss function which the RKHS embeddings minimise, providing an intuitive understanding of the embeddings and a justification for their use. Furthermore, the equivalence allows the application of vector-valued regression methods and results to the problem of learning conditional distributions. Using this link we derive a sparse version of the embedding by considering alternative formulations. Further, by applying convergence results for vector-valued regression to the embedding problem we derive minimax convergence rates which are O(\\log(n)/n) -- compared to current state of the art rates of O(n^{-1/4}) -- and are valid under milder and more intuitive assumptions. These minimax upper rates coincide with lower rates up to a logarithmic factor, showing that the embedding method achieves nearly optimal rates. We study o...

  1. Operating System Performance Analyzer for Embedded Systems

    Directory of Open Access Journals (Sweden)

    Shahzada Khayyam Nisar

    2011-11-01

    Full Text Available RTOS provides a number of services to an embedded system designs such as case management, memory management, and Resource Management to build a program. Choosing the best OS for an embedded system is based on the available OS for system designers and their previous knowledge and experience. This can cause an imbalance between the OS and embedded systems. RTOS performance analysis is critical in the design and integration of embedded software to ensure that limits the application meet at runtime. To select an appropriate operating system for an embedded system for a particular application, the OS services to be analyzed. These OS services are identified by parameters to establish performance metrics. Performance Metrics selected include context switching, Preemption time and interrupt latency. Performance Metrics are analyzed to choose the right OS for an embedded system for a particular application.

  2. Graphical Model Debugger Framework for Embedded Systems

    DEFF Research Database (Denmark)

    Zeng, Kebin; Guo, Yu; Angelov, Christo K.

    2010-01-01

    Model Driven Software Development has offered a faster way to design and implement embedded real-time software by moving the design to a model level, and by transforming models to code. However, the testing of embedded systems has remained at the code level. This paper presents a Graphical Model...... Debugger Framework, providing an auxiliary avenue of analysis of system models at runtime by executing generated code and updating models synchronously, which allows embedded developers to focus on the model level. With the model debugger, embedded developers can graphically test their design model...

  3. Power optimized programmable embedded controller

    CERN Document Server

    Kamaraju, M; Tilak, A V N; 10.5121/ijcnc.2010.2409

    2010-01-01

    Now a days, power has become a primary consideration in hardware design, and is critical in computer systems especially for portable devices with high performance and more functionality. Clock-gating is the most common technique used for reducing processor's power. In this work clock gating technique is applied to optimize the power of fully programmable Embedded Controller (PEC) employing RISC architecture. The CPU designed supports i) smart instruction set, ii) I/O port, UART iii) on-chip clocking to provide a range of frequencies , iv) RISC as well as controller concepts. The whole design is captured using VHDL and is implemented on FPGA chip using Xilinx .The architecture and clock gating technique together is found to reduce the power consumption by 33.33% of total power consumed by this chip.

  4. The embedded operating system project

    Science.gov (United States)

    Campbell, R. H.

    1985-01-01

    The design and construction of embedded operating systems for real-time advanced aerospace applications was investigated. The applications require reliable operating system support that must accommodate computer networks. Problems that arise in the construction of such operating systems, reconfiguration, consistency and recovery in a distributed system, and the issues of real-time processing are reported. A thesis that provides theoretical foundations for the use of atomic actions to support fault tolerance and data consistency in real-time object-based system is included. The following items are addressed: (1) atomic actions and fault-tolerance issues; (2) operating system structure; (3) program development; (4) a reliable compiler for path Pascal; and (5) mediators, a mechanism for scheduling distributed system processes.

  5. BHQ revisited (2): Texture development

    Science.gov (United States)

    Kilian, Rüdiger; Heilbronner, Renée

    2016-04-01

    appears that grains can be unfavourably oriented for glide despite their c-axis direction falling in those positions which were used in the "classical" interpretation. Additionally, it turns out that grain-scale dispersion axes can be used to describe the kinematic behaviour in a more consistent way compared to the rotations axes obtained from intragranular misorientations in the range of 2-10°. The implications derived from the experimental data set will be compared to data obtained from natural quartz mylonites which formed in a comparable recrystallization regime. This is the companion poster to "BHQ revisited (I) looking at grain size" where the development of the dynamically recrystallized grain size is addressed. Reference cited: Heilbronner, R., and J. Tullis (2006), Evolution of c axis pole figures and grain size during dynamic recrystallization: Results from experimentally sheared quartzite, J. Geophys. Res., 111, B10202, doi:10.1029/2005JB004194.

  6. Revisiting the Meaning of Requirements

    Institute of Scientific and Technical Information of China (English)

    Zhi Jin

    2006-01-01

    Understanding the meaning of requirements can help elicit the real world requirements and refine their specifications. But what do the requirements of a desired software mean is not a well-explained question yet though there are many software development methods available. This paper suggests that the meaning of requirements could be depicted by the will-to-be environments of the desired software, and the optative interactions of the software with its environments as well as the causal relationships among these interactions. This paper also emphasizes the necessity of distinguishing the external manifestation from the internal structure of each system component during the process of requirements decomposition and refinement. Several decomposition strategies have been given to support the continuous decomposition. The external manifestation and the internal structure of the system component have been defined. The roles of the knowledge about the environments have been explicitly described. A simple but meaningful example embedded in the paper illustrates the main ideas as well as how to conduct the requirements decomposition and refinement by using these proposed strategies.

  7. Improvements of embedded zerotree wavelet (EZW) coding

    Science.gov (United States)

    Li, Jin; Cheng, Po-Yuen; Kuo, C.-C. Jay

    1995-04-01

    In this research, we investigate several improvements of embedded zerotree wavelet (EZW) coding. Several topics addressed include: the choice of wavelet transforms and boundary conditions, the use of arithmetic coder and arithmetic context and the design of encoding order for effective embedding. The superior performance of our improvements is demonstrated with extensive experimental results.

  8. Solid methane toward deeply embedded protostars

    NARCIS (Netherlands)

    Boogert, ACA; Schutte, WA; Tielens, AGGM; Whittet, DCB; Helmich, FP; Ehrenfreund, P; Wesselius, PR; deGraauw, T; Prusti, T

    1996-01-01

    We report on the detection of an absorption feature near 7.67 mu m toward the deeply embedded protostellar objects W 33A and NGC 7538 : IRS9. Comparison with laboratory spectra shows that this feature can be identified as the v(4) ('deformation') mode of solid state CH4 embedded in polar molecules

  9. Multithreading for Embedded Reconfigurable Multicore Systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  10. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems.......This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  11. Teaching Embedded System Concepts for Technological Literacy

    Science.gov (United States)

    Winzker, M.; Schwandt, A.

    2011-01-01

    A basic understanding of technology is recognized as important knowledge even for students not connected with engineering and computer science. This paper shows that embedded system concepts can be taught in a technological literacy course. An embedded system teaching block that has been used in an electronics module for non-engineers is…

  12. Embedded Systems Design with 8051 Microcontrollers

    DEFF Research Database (Denmark)

    Karakahayov, Zdravko; Winther, Ole; Christensen, Knud Smed

    Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator.......Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator....

  13. Virtually Embedded: Library Instruction within Second Life

    Science.gov (United States)

    Davis, Marian G.; Smith, Carol E.

    2009-01-01

    Embedded librarianship in distance learning courses taught within virtual environments such as Second Life is an emerging, leading-edge practice. This paper describes the experiences of librarians embedded in undergraduate English composition courses taught entirely in Second Life and presents the results of an empirical research study to assess…

  14. Free Embedding Potentials in General Relativity

    CERN Document Server

    Bustamante, M D; Brachet, M E; Bustamante, Miguel D.; Debbasch, Fabrice; Brachet, Marc-Etienne

    2005-01-01

    The embedding approach to General Relativity (GR), in which the 4-dimensional space-time is embedded in a N-dimensional ($N\\geq 10$) flat host space with hyperbolic signature, is reconsidered. All objections raised by previous authors against this approach are answered. The equations for the embedding potentials are shown to be completely equivalent to the standard GR Einstein equations for the metric, provided that two conditions are met. The first condition is that the embedding fulfills a property closely related to Nash's freeness and the second that physically consistent boundary conditions are considered in the Einstein-Hilbert action. Explicit examples of embeddings whose deformations DO describe gravitational waves around their respective backgrounds are given for both (4-D) cases of flat space-time and Schwarzschild black hole. Beside the Einstein-Hilbert action, a new action principle is considered that is also equivalent to standard GR at both levels of equations of motion and perturbations (waves)...

  15. Graphical Model Debugger Framework for Embedded Systems

    DEFF Research Database (Denmark)

    Zeng, Kebin

    2010-01-01

    Debugger Framework, providing an auxiliary avenue of analysis of system models at runtime by executing generated code and updating models synchronously, which allows embedded developers to focus on the model level. With the model debugger, embedded developers can graphically test their design model......Model Driven Software Development has offered a faster way to design and implement embedded real-time software by moving the design to a model level, and by transforming models to code. However, the testing of embedded systems has remained at the code level. This paper presents a Graphical Model...... and check the running status of the system, which offers a debugging capability on a higher level of abstraction. The framework intends to contribute a tool to the Eclipse society, especially suitable for model-driven development of embedded systems....

  16. Stellar Properties of Embedded Protostars

    CERN Document Server

    White, R J; Doppmann, G W; Covey, Kevin R; Hillenbrand, L A

    2006-01-01

    (Abridged) High dispersion spectrographs on large aperture telescopes have recently allowed observers to study the stellar and accretion properties of deeply embedded young stars, commonly referred to as Class I stars. We summarize these newly determined properties and compare them with observations of more optically revealed Class II (T Tauri) stars. Class I stars have spectral types and stellar luminosities similar to those of Class II stars, suggesting similar masses and ages. Estimates of stellar luminosity and age, however, are especially uncertain given the large extinctions, scattered light emission and continuum excesses typical of Class I stars. Several candidate Class I brown dwarfs are identified. Class I stars appear to rotate more rapidly than T Tauri stars, by roughly a factor of 2. Likewise, Class I disk accretion rates are only a factor of two larger than those of T Tauri stars, less than the mass infall rates predicted by envelope models by 1-2 orders of magnitude. In at least a few cases the...

  17. Sloan Digital Sky Survey Photometric Calibration Revisited

    Science.gov (United States)

    Marriner, J.

    2016-05-01

    The Sloan Digital Sky Survey calibration is revisited to obtain the most accurate photometric calibration. A small but significant error is found in the flat-fielding of the Photometric telescope used for calibration. Two SDSS star catalogs are compared and the average difference in magnitude as a function of right ascension and declination exhibits small systematic errors in relative calibration. The photometric transformation from the SDSS Photometric Telescope to the 2.5 m telescope is recomputed and compared to synthetic magnitudes computed from measured filter bandpasses.

  18. Polynomial chaotic inflation in supergravity revisited

    Directory of Open Access Journals (Sweden)

    Kazunori Nakayama

    2014-10-01

    Full Text Available We revisit a polynomial chaotic inflation model in supergravity which we proposed soon after the Planck first data release. Recently some issues have been raised in Ref. [12], concerning the validity of our polynomial chaotic inflation model. We study the inflaton dynamics in detail, and confirm that the inflaton potential is very well approximated by a polynomial potential for the parameters of our interest in any practical sense, and in particular, the spectral index and the tensor-to-scalar ratio can be estimated by single-field approximation. This justifies our analysis of the polynomial chaotic inflation in supergravity.

  19. Seed dispersal effectiveness revisited: a conceptual review

    OpenAIRE

    Schupp, Eugene W.; JORDANO, Pedro; Gómez Reyes, José M.

    2010-01-01

    Growth in seed dispersal studies has been fast-paced since the seed disperser effec- tiveness (SDE) framework was developed 17 yr ago. Thus, the time is ripe to revisit the framework in light of accumulated new insight. Here, we first present an over- view of the framework, how it has been applied, and what we know and do not know. We then introduce the SDE landscape as the two-dimensional representa- tion of the possible combinations of the quantity and the quality of dispersal and with ele...

  20. Sloan Digital Sky Survey Photometric Calibration Revisited

    Energy Technology Data Exchange (ETDEWEB)

    Marriner, John; /Fermilab

    2012-06-29

    The Sloan Digital Sky Survey calibration is revisited to obtain the most accurate photometric calibration. A small but significant error is found in the flat-fielding of the Photometric telescope used for calibration. Two SDSS star catalogs are compared and the average difference in magnitude as a function of right ascension and declination exhibits small systematic errors in relative calibration. The photometric transformation from the SDSS Photometric Telescope to the 2.5 m telescope is recomputed and compared to synthetic magnitudes computed from measured filter bandpasses.

  1. Revisiting Fermat's Factorization for the RSA Modulus

    CERN Document Server

    Gupta, Sounak

    2009-01-01

    We revisit Fermat's factorization method for a positive integer $n$ that is a product of two primes $p$ and $q$. Such an integer is used as the modulus for both encryption and decryption operations of an RSA cryptosystem. The security of RSA relies on the hardness of factoring this modulus. As a consequence of our analysis, two variants of Fermat's approach emerge. We also present a comparison between the two methods' effective regions. Though our study does not yield a new state-of-the-art algorithm for integer factorization, we believe that it reveals some interesting observations that are open for further analysis.

  2. Quantum scattering on a cone revisited

    Science.gov (United States)

    Barroso, V. S.; Pitelli, J. P. M.

    2017-07-01

    We revisit the scattering of quantum test particles on the conical (2 +1 )-dimensional spacetime and find the scattering amplitude as a function of the boundary conditions imposed at the apex of the cone. We show that the boundary condition is responsible for a purely analytical term in the scattering amplitude, in addition to those coming from purely topological effects. Since it is possible to have nonequivalent physical evolutions for the wave packet (each one corresponding to a different boundary condition), it seems crucial to have an observable quantity specifying which evolution has been prescribed.

  3. Guessing Revisited: A Large Deviations Approach

    CERN Document Server

    Hanawal, Manjesh Kumar

    2010-01-01

    The problem of guessing a random string is revisited. A close relation between guessing and compression is first established. Then it is shown that if the sequence of distributions of the information spectrum satisfies the large deviation property with a certain rate function, then the limiting guessing exponent exists and is a scalar multiple of the Legendre-Fenchel dual of the rate function. Other sufficient conditions related to certain continuity properties of the information spectrum are briefly discussed. This approach highlights the importance of the information spectrum in determining the limiting guessing exponent. All known prior results are then re-derived as example applications of our unifying approach.

  4. The art of designing embedded systems

    CERN Document Server

    Ganssle, Jack G

    2000-01-01

    Art of Designing Embedded Systems is apart primer and part reference, aimed at practicing embedded engineers, whether working on the code or the hardware design. Embedded systems suffer from a chaotic, ad hoc development process. This books lays out a very simple seven-step plan to get firmware development under control. There are no formal methodologies to master; the ideas are immediately useful. Most designers are unaware that code complexity grows faster than code size. This book shows a number of ways to linearize the complexity/size curve and get products out faster

  5. On Injective Embeddings of Tree Patterns

    CERN Document Server

    Michaliszyn, Jakub; Staworko, Sławek; Wieczorek, Piotr; Wu, Zhilin

    2012-01-01

    We study three different kinds of embeddings of tree patterns: weakly-injective, ancestor-preserving, and lca-preserving. While each of them is often referred to as injective embedding, they form a proper hierarchy and their computational properties vary (from P to NP-complete). We present a thorough study of the complexity of the model checking problem i.e., is there an embedding of a given tree pattern in a given tree, and we investigate the impact of various restrictions imposed on the tree pattern: bound on the degree of a node, bound on the height, and type of allowed labels and edges.

  6. Technology report on Railway Embedded Network solutions

    OpenAIRE

    Wahl, M; BERNOCCHI, M; Just, P.; WEISS, AH; GOIKOETXEA, J; BILLION, J; NEMORIN, J

    2007-01-01

    Deliverable D3D.3.1 Technology report on Railway Embedded Network solutions is a deliverable of Work Package SP3D_WP3 ICOM Specification & Telecom Interfaces of Onboard and Train Train Networks. It takes place within the InteGRail Task 3D_03.1 State of the Art in Embedded Networks. The objectives of this deliverable are: - to consider which embedded communication network technologies are already into ser-vice within the trains; - to analyse Ethernet-based technologies; - to evaluate how Ethe...

  7. Secure smart embedded devices, platforms and applications

    CERN Document Server

    Markantonakis, Konstantinos

    2013-01-01

    New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and consider

  8. Embedded Solenoid Transformer for Power Conversion

    DEFF Research Database (Denmark)

    2015-01-01

    A resonant power converter for operation in the radio frequency range, preferably in the VHF, comprises at least one PCB-embedded transformer. The transformer is configured for radio frequency operation and comprises a printed circuit board defining a horizontal plane, the printed circuit board...... and second embedded solenoids are formed in the conductive layers of the printed circuit board, wherein each full turn of an embedded solenoid has a horizontal top portion formed in an upper conductive layer, a horizontal bottom portion formed in a lower conductive layer, and two vertical side portions...

  9. Horton Revisited: African Traditional Thought and Western Science ...

    African Journals Online (AJOL)

    Horton Revisited: African Traditional Thought and Western Science. ... he refers to as the 'continuity thesis' according to which there are theoretical similarities between African traditional thought and modern Western science. ... Article Metrics.

  10. Revisiting the importance of childhood activity | van Rensburg ...

    African Journals Online (AJOL)

    Revisiting the importance of childhood activity. ... There has been a drastic increase in documented childhood morbidity and mortality relating to poor nutrition and ... such as obesity, type 2 diabetes, high blood cholesterol and hypertension.

  11. Ground Zero revisits shape outbreaks: Zika and beyond

    CERN Document Server

    Manrique, Pedro D; Johnson, Neil F

    2016-01-01

    During an infection outbreak, many people continue to revisit Ground Zero - such as the one square mile of Miami involved in the current Zika outbreak- for work, family or social reasons. Public health planning must account for the counterintuitive ways in which this human flow affects the outbreak's duration, severity and time-to-peak. Managing this flow of revisits can allow the outbreak's evolution to be tailored.

  12. Regime change: re-visiting the 1961 Single Convention on Narcotic Drugs.

    Science.gov (United States)

    Bewley-Taylor, David; Jelsma, Martin

    2012-01-01

    March 2011 marked the 50th anniversary of the Single Convention on Narcotic Drugs. This legal instrument, the bedrock of the current United Nations based global drug control regime, is often viewed as merely a consolidating treaty bringing together the multilateral drug control agreements that preceded it; an erroneous position that does little to provide historical context for contemporary discussions surrounding revision of the international treaty system. This article applies both historical and international relations perspectives to revisit the development of the Convention. Framing discussion within the context of regime theory, a critique of the foundational pre-1961 treaties is followed by detailed content analysis of the official records of the United Nations conference for the adoption of a Single Convention on Narcotic Drugs and, mindful of later treaties, an examination of the treaty's status as a 'single' convention. The Single Convention on Narcotic Drugs represents a significant break with the regulative focus of the preceding multilateral treaties; a shift towards a more prohibitive outlook that within international relations terms can be regarded as a change of regime rather than the straightforward codification of earlier instruments. In this respect, the article highlights the abolition of drug use that for centuries had been embedded in the social, cultural and religious traditions of many non-Western states. Further, although often-overlooked, the Convention has failed in its aim of being the 'single' instrument within international drug control. The supplementing treaties developed in later years and under different socio-economic and political circumstances have resulted in significant inconsistencies within the control regime. Having established that a shift in normative focus has taken place in the past, the article concludes that it is timely for the international community to revisit the Single Convention on Narcotic Drugs with a view to

  13. Coccolithophorids in polar waters: Wigwamma spp. revisited

    DEFF Research Database (Denmark)

    Thomsen, Helge Abildhauge; Østergaard, Jette B.; Heldal, Mikal

    2013-01-01

    A contingent of weakly calcified coccolithophorid genera and species were described from polar regions almost 40 years ago. In the interim period a few additional findings have been reported enlarging the realm of some of the species. The genus Wigwamma is revisited here with the purpose of provi......A contingent of weakly calcified coccolithophorid genera and species were described from polar regions almost 40 years ago. In the interim period a few additional findings have been reported enlarging the realm of some of the species. The genus Wigwamma is revisited here with the purpose...... of providing, based on additional sampling from both polar regions, an update on species morphology, life history events and biogeography that can serve as a reference for the future. A new genus, Pseudowigwamma gen. nov. is described to accommodate Wigwamma scenozonion, a species which critically deviates...... from a core group of five Wigwamma species in terms of coccolith morphology and life history events. Wigwamma armatura sp. nov. is described on the basis of material from the Weddell Sea, Antarctica. While fitting nicely into the Wigwamma generic concept, the species adds new dimensions to the overall...

  14. Power for Vehicle Embedded MEMS Sensors Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Embedded wireless sensors of the future will enable flight vehicle systems to be "highly aware" of onboard health and performance parameters, as well as the external...

  15. Embedding Moodle into Ubiquitous Computing Environments

    NARCIS (Netherlands)

    Glahn, Christian; Specht, Marcus

    2010-01-01

    Glahn, C., & Specht, M. (2010). Embedding Moodle into Ubiquitous Computing Environments. In M. Montebello, et al. (Eds.), 9th World Conference on Mobile and Contextual Learning (MLearn2010) (pp. 100-107). October, 19-22, 2010, Valletta, Malta.

  16. Conforming finite elements with embedded strong discontinuities

    NARCIS (Netherlands)

    Dias-da-Costa, D.; Alfaiate, J.; Sluys, L.J.; Areias, P.; Fernandes, C.; Julio, E.

    2012-01-01

    The possibility of embedding strong discontinuities into finite elements allowed the simulation of different problems, namely, brickwork masonry fracture, dynamic fracture, failure in finite strain problems and simulation of reinforcement concrete members. However, despite the significant contributi

  17. Power for Vehicle Embedded MEMS Sensors Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Embedded wireless sensors of the future will enable flight vehicle systems to be "highly aware" of onboard health and performance parameters, as well as the...

  18. Female Climacteric Syndrome Treated by Ear Embedding

    Institute of Scientific and Technical Information of China (English)

    王勤

    2003-01-01

    @@ Female climacteric syndrome is a common disease occurring before and after menopause. The author has treated the disease with ear embedding therapy, and achieved satisfactory therapeutic results. The following is a report of the clinical observation.

  19. A randomized model for communicating embedded systems

    NARCIS (Netherlands)

    Bujorianu, M.C.; Bujorianu, L.M.

    2008-01-01

    Nowadays, there is an intense research activity in designing systems that operate in real life, physical environments. This research is spanned by various areas in computer science and engineering: embedded systems, reactive systems, wireless communications, hybrid systems, stochastic processes, etc

  20. Using Buildroot for building Embedded Linux Systems

    OpenAIRE

    Ruiz González, Mariano

    2013-01-01

    This document describes the basic steps to developed and embedded Linux-based system using the BeagleBoard. The document has been specifically written to use a BeagleBoard development system based on the OMAP `processor.

  1. Piecewise flat embeddings for hyperspectral image analysis

    Science.gov (United States)

    Hayes, Tyler L.; Meinhold, Renee T.; Hamilton, John F.; Cahill, Nathan D.

    2017-05-01

    Graph-based dimensionality reduction techniques such as Laplacian Eigenmaps (LE), Local Linear Embedding (LLE), Isometric Feature Mapping (ISOMAP), and Kernel Principal Components Analysis (KPCA) have been used in a variety of hyperspectral image analysis applications for generating smooth data embeddings. Recently, Piecewise Flat Embeddings (PFE) were introduced in the computer vision community as a technique for generating piecewise constant embeddings that make data clustering / image segmentation a straightforward process. In this paper, we show how PFE arises by modifying LE, yielding a constrained ℓ1-minimization problem that can be solved iteratively. Using publicly available data, we carry out experiments to illustrate the implications of applying PFE to pixel-based hyperspectral image clustering and classification.

  2. Time-Scale Invariant Audio Data Embedding

    Directory of Open Access Journals (Sweden)

    Mansour Mohamed F

    2003-01-01

    Full Text Available We propose a novel algorithm for high-quality data embedding in audio. The algorithm is based on changing the relative length of the middle segment between two successive maximum and minimum peaks to embed data. Spline interpolation is used to change the lengths. To ensure smooth monotonic behavior between peaks, a hybrid orthogonal and nonorthogonal wavelet decomposition is used prior to data embedding. The possible data embedding rates are between 20 and 30 bps. However, for practical purposes, we use repetition codes, and the effective embedding data rate is around 5 bps. The algorithm is invariant after time-scale modification, time shift, and time cropping. It gives high-quality output and is robust to mp3 compression.

  3. A randomized model for communicating embedded systems

    NARCIS (Netherlands)

    Bujorianu, M.C.; Bujorianu, L.M.

    2008-01-01

    Nowadays, there is an intense research activity in designing systems that operate in real life, physical environments. This research is spanned by various areas in computer science and engineering: embedded systems, reactive systems, wireless communications, hybrid systems, stochastic processes,

  4. Apparatuses And Systems For Embedded Thermoelectric Generators

    KAUST Repository

    Hussain, Muhammad M.

    2013-08-08

    An apparatus and a system for embedded thermoelectric generators are disclosed. In one embodiment, the apparatus is embedded in an interface where the ambient temperatures on two sides of the interface are different. In one embodiment, the apparatus is fabricated with the interface in integrity as a unitary piece. In one embodiment, the apparatus includes a first thermoelectric material embedded through the interface. The apparatus further includes a second thermoelectric material embedded through the interface. The first thermoelectric material is electrically coupled to the second thermoelectric material. In one embodiment, the apparatus further includes an output structure coupled to the first thermoelectric material and the second thermoelectric material and configured to output a voltage.

  5. Embedded Face Detection and Recognition

    Directory of Open Access Journals (Sweden)

    Göksel Günlü

    2012-10-01

    Full Text Available The need to increase security in open or public spaces has in turn given rise to the requirement to monitor these spaces and analyse those images on‐site and on‐time. At this point, the use of smart cameras ‐ of which the popularity has been increasing ‐ is one step ahead. With sensors and Digital Signal Processors (DSPs, smart cameras generate ad hoc results by analysing the numeric images transmitted from the sensor by means of a variety of image‐processing algorithms. Since the images are not transmitted to a distance processing unit but rather are processed inside the camera, it does not necessitate high‐ bandwidth networks or high processor powered systems; it can instantaneously decide on the required access. Nonetheless, on account of restricted memory, processing power and overall power, image processing algorithms need to be developed and optimized for embedded processors. Among these algorithms, one of the most important is for face detection and recognition. A number of face detection and recognition methods have been proposed recently and many of these methods have been tested on general‐purpose processors. In smart cameras ‐ which are real‐life applications of such methods ‐ the widest use is on DSPs. In the present study, the Viola‐Jones face detection method ‐ which was reported to run faster on PCs ‐ was optimized for DSPs; the face recognition method was combined with the developed sub‐region and mask‐based DCT (Discrete Cosine Transform. As the employed DSP is a fixed‐point processor, the processes were performed with integers insofar as it was possible. To enable face recognition, the image was divided into sub‐ regions and from each sub‐region the robust coefficients against disruptive elements ‐ like face expression, illumination, etc. ‐ were selected as the features. The discrimination of the selected features was enhanced via LDA (Linear Discriminant Analysis and then employed for

  6. Embedded Face Detection and Recognition

    Directory of Open Access Journals (Sweden)

    Göksel Günlü

    2012-10-01

    Full Text Available The need to increase security in open or public spaces has in turn given rise to the requirement to monitor these spaces and analyse those images on-site and on-time. At this point, the use of smart cameras – of which the popularity has been increasing – is one step ahead. With sensors and Digital Signal Processors (DSPs, smart cameras generate ad hoc results by analysing the numeric images transmitted from the sensor by means of a variety of image-processing algorithms. Since the images are not transmitted to a distance processing unit but rather are processed inside the camera, it does not necessitate high-bandwidth networks or high processor powered systems; it can instantaneously decide on the required access. Nonetheless, on account of restricted memory, processing power and overall power, image processing algorithms need to be developed and optimized for embedded processors. Among these algorithms, one of the most important is for face detection and recognition. A number of face detection and recognition methods have been proposed recently and many of these methods have been tested on general-purpose processors. In smart cameras – which are real-life applications of such methods – the widest use is on DSPs. In the present study, the Viola-Jones face detection method – which was reported to run faster on PCs – was optimized for DSPs; the face recognition method was combined with the developed sub-region and mask-based DCT (Discrete Cosine Transform. As the employed DSP is a fixed-point processor, the processes were performed with integers insofar as it was possible. To enable face recognition, the image was divided into sub-regions and from each sub-region the robust coefficients against disruptive elements – like face expression, illumination, etc. – were selected as the features. The discrimination of the selected features was enhanced via LDA (Linear Discriminant Analysis and then employed for recognition. Thanks to its

  7. Multimode FPGA with Flexible Embedded FPUS

    OpenAIRE

    G.Murugaboopathi; S.Hariharasitaraman; Sankar, G.

    2012-01-01

    The Performance of field-programmable gate arrays used for Floating-point applications are poor due to complexity of floating-point arithmetic. Implementing floating-point units on FPGAs consume a large amount of resources. This makes FPGAs less attractive for use in floating-point intensive applications. There is a need for embedded FPUs in FPGAs. We proposed a flexible multimode embedded FPU for FPGAs that can be configured to perform a wide range of operations. The floatingpoint adder and ...

  8. Embedded adhesive connection for laminated glass plates

    DEFF Research Database (Denmark)

    Hansen, Jens Zangenberg; Poulsen, S.H.; Bagger, A.

    2012-01-01

    The structural behavior of a new connection design, the embedded adhesive connection, used for laminated glass plates is investigated. The connection consists of an aluminum plate encapsulated in-between two adjacent triple layered laminated glass plates. Fastening between glass and aluminum...... usage in a design situation. The embedded connection shows promising potential as a future fastening system for load-carrying laminated glass plates....

  9. Five years of density matrix embedding theory

    CERN Document Server

    Wouters, Sebastian; Chan, Garnet K -L

    2016-01-01

    Density matrix embedding theory (DMET) describes finite fragments in the presence of a surrounding environment. In contrast to most embedding methods, DMET explicitly allows for quantum entanglement between both. In this chapter, we discuss both the ground-state and response theory formulations of DMET, and review several applications. In addition, a proof is given that the local density of states can be obtained by working with a Fock space of bath orbitals.

  10. Accelerated Monte Carlo by Embedded Cluster Dynamics

    Science.gov (United States)

    Brower, R. C.; Gross, N. A.; Moriarty, K. J. M.

    1991-07-01

    We present an overview of the new methods for embedding Ising spins in continuous fields to achieve accelerated cluster Monte Carlo algorithms. The methods of Brower and Tamayo and Wolff are summarized and variations are suggested for the O( N) models based on multiple embedded Z2 spin components and/or correlated projections. Topological features are discussed for the XY model and numerical simulations presented for d=2, d=3 and mean field theory lattices.

  11. Embedded Operating System for MicroBlaze

    OpenAIRE

    2006-01-01

    This paper presents a work in progress on experiments with embedded operating systems for the MicroBlaze processor. Modern embedded systems based on a configurable platform incorporating a similar processor core are gaining importance with the ongoing effort to minimize cost and development time. After an overview of the configurable platform based on this processor core, we devote our attention to uClinux OS. This OS has been successfully ported for the MicroBlaze processor, and we present o...

  12. Embedded Lattice and Properties of Gram Matrix

    Directory of Open Access Journals (Sweden)

    Futa Yuichi

    2017-03-01

    Full Text Available In this article, we formalize in Mizar [14] the definition of embedding of lattice and its properties. We formally define an inner product on an embedded module. We also formalize properties of Gram matrix. We formally prove that an inverse of Gram matrix for a rational lattice exists. Lattice of Z-module is necessary for lattice problems, LLL (Lenstra, Lenstra and Lov´asz base reduction algorithm [16] and cryptographic systems with lattice [17].

  13. Embedding capacity estimation of reversible watermarking schemes

    Indian Academy of Sciences (India)

    Rishabh Iyer; Rushikesh Borse; Subhasis Chaudhuri

    2014-12-01

    Estimation of the embedding capacity is an important problem specifically in reversible multi-pass watermarking and is required for analysis before any image can be watermarked. In this paper, we propose an efficient method for estimating the embedding capacity of a given cover image under multi-pass embedding, without actually embedding the watermark. We demonstrate this for a class of reversible watermarking schemes which operate on a disjoint group of pixels, specifically for pixel pairs. The proposed algorithm iteratively updates the co-occurrence matrix at every stage to estimate the multi-pass embedding capacity, and is much more efficient vis-a-vis actual watermarking. We also suggest an extremely efficient, pre-computable tree based implementation which is conceptually similar to the cooccurrence based method, but provides the estimates in a single iteration, requiring a complexity akin to that of single pass capacity estimation. We also provide upper bounds on the embedding capacity.We finally evaluate performance of our algorithms on recent watermarking algorithms.

  14. Arm To Arm Interface Using Embedded C

    Directory of Open Access Journals (Sweden)

    Mohanraj.C

    2013-02-01

    Full Text Available Embedded systems are the most emerging field in these recent years. In this paper a different number of ARM processors (LPC2148 and LPC2378 are interconnected using C for distributed services. N numbers of processors are connected as the network and each processing devices are interlinked with each other, so that the each data that is processed by the devices and it can be used by the other device to activate their entire process. All the processed data’s are communicated to other device through Xbee interface card. LPC2148 and LPC2378 ARM processors are used in this prototype and winXtalk is used as a software terminal window. In this paper, the ultimate benefits of multiple processor interactions related to the embedded applications and design issues of processor interconnection are discussed. The features of multiple processor interaction in inter process communication and executions of embedded multitasking are also discussed. In modern embedded computing platform, embedded processor used in various applications like home automation, industrial control, medical system, access control, etc. In this paper, using embedded processor interactions, the several data communication is established.

  15. Accurate basis set truncation for wavefunction embedding

    Science.gov (United States)

    Barnes, Taylor A.; Goodpaster, Jason D.; Manby, Frederick R.; Miller, Thomas F.

    2013-07-01

    Density functional theory (DFT) provides a formally exact framework for performing embedded subsystem electronic structure calculations, including DFT-in-DFT and wavefunction theory-in-DFT descriptions. In the interest of efficiency, it is desirable to truncate the atomic orbital basis set in which the subsystem calculation is performed, thus avoiding high-order scaling with respect to the size of the MO virtual space. In this study, we extend a recently introduced projection-based embedding method [F. R. Manby, M. Stella, J. D. Goodpaster, and T. F. Miller III, J. Chem. Theory Comput. 8, 2564 (2012)], 10.1021/ct300544e to allow for the systematic and accurate truncation of the embedded subsystem basis set. The approach is applied to both covalently and non-covalently bound test cases, including water clusters and polypeptide chains, and it is demonstrated that errors associated with basis set truncation are controllable to well within chemical accuracy. Furthermore, we show that this approach allows for switching between accurate projection-based embedding and DFT embedding with approximate kinetic energy (KE) functionals; in this sense, the approach provides a means of systematically improving upon the use of approximate KE functionals in DFT embedding.

  16. Exponentially many maximum genus embeddings and genus embeddings for complete graphs

    Institute of Scientific and Technical Information of China (English)

    REN Han; BAI Yun

    2008-01-01

    There are many results on the maximum genus,among which most are written for the existence of values of such embeddings,and few attention has been paid to the estimation of such embeddings and their applications.In this paper we study the number of maximum genus embeddings for a graph and find an exponential lower bound for such numbers.Our results show that in general case,a simple connected graph has exponentially many distinct maximum genus embeddings.In particular,a connected cubie graph G of order n always has at least (√2)m+n+α/2 distinct maximum genus embeddings,where α and m denote,respectively,the number of inner vertices and odd compo-nents of an optimal tree T.What surprise us most is that such two extremal embeddings (i.e.,the maximum genus embeddings and the genus embeddings) are sometimes closely related with each other.In fact,as applications,we show that for a sufficient large natural number n,there are at least C2n/4 many genus embeddings for complete graph Kn with n=4,7,10 (mod12),where C is a constance depending on the Value of n of residue 12.These results improve the bounds obtained by Korzhik and Voss and the methods used here are much simpler and straight.

  17. A Comparative Study on The Peony Pavilion and Romeo and Juliet from the Aspect of Chinese and Western Cultures%中西文化互观下的《牡丹亭》与《罗密欧与朱丽叶》

    Institute of Scientific and Technical Information of China (English)

    李丹

    2014-01-01

    Tang Xianzu ,the writer of The Peony Pavilion ,and Shakespeare of Romeo and Juliet both lived in the later half of the 16th century enjoying fame as great playwright similarly in the Orient and the West .There is hardly any connection between the creation of the two great works ,however ,they surpris-ingly share some sparkling ideas .Du Liniang and Juliet are almost the same in their pursuit of ideal love , rebellion against restriction and bandage as well as seeking of spiritual liberation and freedom .In this es-say ,a comparative study is made on the two works from the perspectives of cultural differences between the Orient and the West and a deep and through analysis is presented .%《牡丹亭》的创作者汤显祖与《罗密欧与茱丽叶》的作者莎士比亚共处于16世纪后期,也是这个时期分别在东西方享有盛誉的戏剧文学艺术家。在两人的这两部文学成就的制作上虽然不存在任何的关联,却不约而同地在某些闪光点上存在着一种相似的思想。朱丽叶和杜丽娘这两人在追求理想的爱情、反对束缚和枷锁、寻求思想解放和自由等方面而言,几乎是如出一辙。因此,作为文学的研究者之一,笔者将从中西文化的差异方面着手对两部著作进行比较,并进行深入的分析和探讨。

  18. Runtime support for reconfigurable real-time embedded systems

    NARCIS (Netherlands)

    Papp, Z.

    2001-01-01

    As the embedding environment becomes more and more complex so does the embedded system itself. An aspect of the complexity, the demand for robust and fault tolerant embedded solutions is ever increasing. Consequently the embedded system design and development face new challenges including modeling,

  19. Diverse Power Iteration Embeddings and Its Applications

    Energy Technology Data Exchange (ETDEWEB)

    Huang H.; Yoo S.; Yu, D.; Qin, H.

    2014-12-14

    Abstract—Spectral Embedding is one of the most effective dimension reduction algorithms in data mining. However, its computation complexity has to be mitigated in order to apply it for real-world large scale data analysis. Many researches have been focusing on developing approximate spectral embeddings which are more efficient, but meanwhile far less effective. This paper proposes Diverse Power Iteration Embeddings (DPIE), which not only retains the similar efficiency of power iteration methods but also produces a series of diverse and more effective embedding vectors. We test this novel method by applying it to various data mining applications (e.g. clustering, anomaly detection and feature selection) and evaluating their performance improvements. The experimental results show our proposed DPIE is more effective than popular spectral approximation methods, and obtains the similar quality of classic spectral embedding derived from eigen-decompositions. Moreover it is extremely fast on big data applications. For example in terms of clustering result, DPIE achieves as good as 95% of classic spectral clustering on the complex datasets but 4000+ times faster in limited memory environment.

  20. Autonomous Multicamera Tracking on Embedded Smart Cameras

    Directory of Open Access Journals (Sweden)

    Bischof Horst

    2007-01-01

    Full Text Available There is currently a strong trend towards the deployment of advanced computer vision methods on embedded systems. This deployment is very challenging since embedded platforms often provide limited resources such as computing performance, memory, and power. In this paper we present a multicamera tracking method on distributed, embedded smart cameras. Smart cameras combine video sensing, processing, and communication on a single embedded device which is equipped with a multiprocessor computation and communication infrastructure. Our multicamera tracking approach focuses on a fully decentralized handover procedure between adjacent cameras. The basic idea is to initiate a single tracking instance in the multicamera system for each object of interest. The tracker follows the supervised object over the camera network, migrating to the camera which observes the object. Thus, no central coordination is required resulting in an autonomous and scalable tracking approach. We have fully implemented this novel multicamera tracking approach on our embedded smart cameras. Tracking is achieved by the well-known CamShift algorithm; the handover procedure is realized using a mobile agent system available on the smart camera network. Our approach has been successfully evaluated on tracking persons at our campus.

  1. Group Theory for Embedded Random Matrix Ensembles

    CERN Document Server

    Kota, V K B

    2014-01-01

    Embedded random matrix ensembles are generic models for describing statistical properties of finite isolated quantum many-particle systems. For the simplest spinless fermion (or boson) systems with say $m$ fermions (or bosons) in $N$ single particle states and interacting with say $k$-body interactions, we have EGUE($k$) [embedded GUE of $k$-body interactions) with GUE embedding and the embedding algebra is $U(N)$. In this paper, using EGUE($k$) representation for a Hamiltonian that is $k$-body and an independent EGUE($t$) representation for a transition operator that is $t$-body and employing the embedding $U(N)$ algebra, finite-$N$ formulas for moments up to order four are derived, for the first time, for the transition strength densities (transition strengths multiplied by the density of states at the initial and final energies). In the asymptotic limit, these formulas reduce to those derived for the EGOE version and establish that in general bivariate transition strength densities take bivariate Gaussian ...

  2. Embedded Web Technology: Applying World Wide Web Standards to Embedded Systems

    Science.gov (United States)

    Ponyik, Joseph G.; York, David W.

    2002-01-01

    Embedded Systems have traditionally been developed in a highly customized manner. The user interface hardware and software along with the interface to the embedded system are typically unique to the system for which they are built, resulting in extra cost to the system in terms of development time and maintenance effort. World Wide Web standards have been developed in the passed ten years with the goal of allowing servers and clients to intemperate seamlessly. The client and server systems can consist of differing hardware and software platforms but the World Wide Web standards allow them to interface without knowing about the details of system at the other end of the interface. Embedded Web Technology is the merging of Embedded Systems with the World Wide Web. Embedded Web Technology decreases the cost of developing and maintaining the user interface by allowing the user to interface to the embedded system through a web browser running on a standard personal computer. Embedded Web Technology can also be used to simplify an Embedded System's internal network.

  3. Orthogonality of embedded wave functions for different states in frozen-density embedding theory

    Energy Technology Data Exchange (ETDEWEB)

    Zech, Alexander; Wesolowski, Tomasz A. [Département de Chimie Physique, Université de Genève, 30 quai Ernest-Ansermet, CH-1211 Genève 4 (Switzerland); Aquilante, Francesco [Dipartimento di Chimica “G. Ciamician,” Università di Bologna, Via Selmi 2, IT-40126 Bologna (Italy)

    2015-10-28

    Other than lowest-energy stationary embedded wave functions obtained in Frozen-Density Embedding Theory (FDET) [T. A. Wesolowski, Phys. Rev. A 77, 012504 (2008)] can be associated with electronic excited states but they can be mutually non-orthogonal. Although this does not violate any physical principles — embedded wave functions are only auxiliary objects used to obtain stationary densities — working with orthogonal functions has many practical advantages. In the present work, we show numerically that excitation energies obtained using conventional FDET calculations (allowing for non-orthogonality) can be obtained using embedded wave functions which are strictly orthogonal. The used method preserves the mathematical structure of FDET and self-consistency between energy, embedded wave function, and the embedding potential (they are connected through the Euler-Lagrange equations). The orthogonality is built-in through the linearization in the embedded density of the relevant components of the total energy functional. Moreover, we show formally that the differences between the expectation values of the embedded Hamiltonian are equal to the excitation energies, which is the exact result within linearized FDET. Linearized FDET is shown to be a robust approximation for a large class of reference densities.

  4. Exponentially many maximum genus embeddings and genus embeddings for complete graphs

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    There are many results on the maximum genus, among which most are written for the existence of values of such embeddings, and few attention has been paid to the estimation of such embeddings and their applications. In this paper we study the number of maximum genus embeddings for a graph and find an exponential lower bound for such numbers. Our results show that in gen-eral case, a simple connected graph has exponentially many distinct maximum genus embeddings. In particular, a connected cubic graph G of order n always has at least 2~1/2m+n+ α2 distinct maximum genus embeddings, where α and m denote, respectively, the number of inner vertices and odd compo-nents of an optimal tree T . What surprise us most is that such two extremal embeddings (i.e., the maximum genus embeddings and the genus embeddings) are sometimes closely related with each other. In fact, as applications, we show that for a suffcient large natural number n, there are at least C2 n4 dmeapneyn dgienngu os ne mthbee vdadliuneg soffonrocf ormespidleutee 1g2r.a pThh eKsen rwesiuthlt sn i m≡p r4o,v 7e, 1th0e ( mbooudn1d2)s, owbthaeirnee dC b iys Ka ocroznhsikta anncde Voss and the methods used here are much simpler and straight.

  5. IMB3-Miner: Mining Induced/Embedded Subtrees by Constraining the Level of Embedding

    NARCIS (Netherlands)

    Tan, H.; Dillon, T.S.; Hadzic, F.; Chang, E.; Feng, L.

    Tree mining has recently attracted a lot of interest in areas such as Bioinformatics, XML mining, Web mining, etc. We are mainly concerned with mining frequent induced and embedded subtrees. While more interesting patterns can be obtained when mining embedded subtrees, unfortunately mining such

  6. Seeing the unseen: Charles Bonnet syndrome revisited.

    Science.gov (United States)

    Nair, Aditya Gopinathan; Nair, Akshay Gopinathan; Shah, Bharat R; Gandhi, Rashmin Anilkumar

    2015-09-01

    Charles Bonnet syndrome (CBS) is a rare condition that encompasses three clinical features: complex visual hallucinations, ocular pathology causing visual deterioration, and preserved cognitive status. Common associated ocular pathologies include age-related macular degeneration, glaucoma, and cataracts. Several theories have been proposed to try to explain the visual hallucinations. However, the pathophysiology remains poorly understood, and treatment is largely based on anecdotal data. The lack of awareness of CBS among medical professionals often leads to inappropriate diagnosis and medication. In a country like India, where awareness of mental health is not widespread, cultural myths and stigma prevent patients from seeking professional help. Here we describe two cases of CBS and revisit different ocular morbidities that have been reported to occur in conjunction with CBS. Psychiatrists and ophthalmologists alike must be sensitive to this clinical condition to ensure prompt diagnosis and treatment.

  7. ADHM Revisited: Instantons and Wilson Lines

    CERN Document Server

    Tong, David

    2014-01-01

    We revisit the well-studied D0-D4 system of D-branes and its relationship to the ADHM construction. It is well known that the D0-branes appear as instantons in the D4-brane worldvolume. We add a Wilson line to the D4-brane in the guise of an extended fundamental string and determine how this affects the D0-brane dynamics. As the D0-brane moves in the presence of the Wilson line, it experiences a Lorentz force, proportional to its Yang-Mills gauge connection. From the perspective of the D0-brane quantum mechanics, this force emerges through the ADHM construction of the self-dual gauge connection.

  8. Elluminate Article: Revisiting Mega-Universities

    Directory of Open Access Journals (Sweden)

    Eugene Rubin

    2006-06-01

    Full Text Available The publisher of IRRODL, The Canadian Institute of Distance Education Research (CIDER, is pleased to link here to a series of eight online seminars that took place over Spring 2006, using Elluminate live e-learning and collaborative solutions. These interactive CIDER Sessions disseminate research emanating from Canada's vibrant DE research community, and we feel these archived recordings are highly relevant to many in the international distance education research community. To access these sessions, you must first download FREE software. Visit http://www.elluminate.com/support/ (Elluminate Support for details on how to download this FREE software. * Revisiting Mega-Universities Gene Rubin and Claudine SchWeber University of Maryland University College

  9. Resolution of Reflection Seismic Data Revisited

    DEFF Research Database (Denmark)

    Hansen, Thomas Mejer; Mosegaard, Klaus; Zunino, Andrea

    wavelength of the wavelet within the thin layer. Using a simple thin-layer parameterization Widess (1973) demonstrated that thin layers with thickness less that around λb/8 cannot be resolved from seismic data independent of the noise level. This has results since been widely adopted as a commonly accepted...... lower vertical resolution of reflection seismic data. In the following we will revisit think layer model and demonstrate that there is in practice no limit to the vertical resolution using the parameterization of Widess (1973), and that the vertical resolution is limited by the noise in the data....... In general, we discuss that the resolution of reflection seismic data is controlled by the noise level and the a priori information available...

  10. Visual Object Tracking Performance Measures Revisited.

    Science.gov (United States)

    Čehovin, Luka; Leonardis, Aleš; Kristan, Matej

    2016-03-01

    The problem of visual tracking evaluation is sporting a large variety of performance measures, and largely suffers from lack of consensus about which measures should be used in experiments. This makes the cross-paper tracker comparison difficult. Furthermore, as some measures may be less effective than others, the tracking results may be skewed or biased toward particular tracking aspects. In this paper, we revisit the popular performance measures and tracker performance visualizations and analyze them theoretically and experimentally. We show that several measures are equivalent from the point of information they provide for tracker comparison and, crucially, that some are more brittle than the others. Based on our analysis, we narrow down the set of potential measures to only two complementary ones, describing accuracy and robustness, thus pushing toward homogenization of the tracker evaluation methodology. These two measures can be intuitively interpreted and visualized and have been employed by the recent visual object tracking challenges as the foundation for the evaluation methodology.

  11. Post-Inflationary Gravitino Production Revisited

    CERN Document Server

    Ellis, John; Nanopoulos, Dimitri V; Olive, Keith A; Peloso, Marco

    2016-01-01

    We revisit gravitino production following inflation. As a first step, we review the standard calculation of gravitino production in the thermal plasma formed at the end of post-inflationary reheating when the inflaton has completely decayed. Next we consider gravitino production prior to the completion of reheating, assuming that the inflaton decay products thermalize instantaneously while they are still dilute. We then argue that instantaneous thermalization is in general a good approximation, and also show that the contribution of non-thermal gravitino production via the collisions of inflaton decay products prior to thermalization is relatively small. Our final estimate of the gravitino-to-entropy ratio is approximated well by a standard calculation of gravitino production in the post-inflationary thermal plasma assuming total instantaneous decay and thermalization at a time $t \\simeq 1.2/\\Gamma_\\phi$. Finally, in light of our calculations, we consider potential implications of upper limits on the gravitin...

  12. Seasonal dating of Sappho's 'Midnight Poem' revisited

    Science.gov (United States)

    Cuntz, Manfred; Gurdemir, Levent; George, Martin

    2016-04-01

    Sappho was a Greek lyric poet who composed a significant array of pristine poetry. Although much of it has been lost, her reputation has endured thanks to numerous surviving fragments. One of her contributions includes the so-called 'Midnight Poem', which contains a line about the Pleiades, setting sometime before midnight, and supposedly observed from the island of Lesbos. This poem also refers to the setting of the Moon. Sappho's Midnight Poem thus represents a prime example of where ancient poetry and astronomy merge, and it also offers the possibility of seasonal dating. Previously, Herschberg and Mebius (1990) estimated that the poem was composed in late winter/early spring, a time frame that is not unusual for lyrics of an amorous nature. The aim of our paper is to revisit this earlier finding by using modern-day software. Our study confirms Herschberg and Mebius' result, but also conveys further information.

  13. Revisiting R-invariant Direct Gauge Mediation

    CERN Document Server

    Chiang, Cheng-Wei; Ibe, Masahiro; Yanagida, Tsutomu T

    2015-01-01

    We revisit a special model of gauge mediated supersymmetry breaking, the "R-invariant direct gauge mediation." We pay particular attention to whether the model is consistent with the minimal model of the \\mu-term, i.e., a simple mass term of the Higgs doublets in the superpotential. Although the incompatibility is highlighted in view of the current experimental constraints on the superparticle masses and the observed Higgs boson mass, the minimal \\mu-term can be consistent with the R-invariant gauge mediation model via a careful choice of model parameters. We derive an upper limit on the gluino mass from the observed Higgs boson mass. We also discuss whether the model can explain the 3\\sigma excess of the Z+jets+$E_T^{\\rm miss}$ events reported by the ATLAS Collaboration.

  14. Neutrino Dark Energy -- Revisiting the Stability Issue

    CERN Document Server

    Bjaelde, Ole Eggers; van de Bruck, Carsten; Hannestad, Steen; Mota, David F; Schrempp, Lily; Tocchini-Valentini, Domenico

    2007-01-01

    A coupling between a light scalar field and neutrinos has been widely discussed as a mechanism for linking (time varying) neutrino masses and the present energy density and equation of state of dark energy. However, it has been pointed out that the viability of this scenario in the non-relativistic neutrino regime is threatened by the strong growth of hydrodynamic perturbations associated with a negative adiabatic sound speed squared. In this paper we revisit the stability issue in the framework of linear perturbation theory in a model independent way. The criterion for the stability of a model is translated into a constraint on the scalar-neutrino coupling, which depends on the ratio of the energy densities in neutrinos and cold dark matter. We illustrate our results by providing meaningful examples both for stable and unstable models.

  15. The Species Problem in Myxomycetes Revisited.

    Science.gov (United States)

    Walker, Laura M; Stephenson, Steven L

    2016-08-01

    Species identification in the myxomycetes (plasmodial slime molds or myxogastrids) poses particular challenges to researchers as a result of their morphological plasticity and frequent alteration between sexual and asexual life strategies. Traditionally, myxomycete morphology has been used as the primary method of species delimitation. However, with the increasing availability of genetic information, traditional myxomycete taxonomy is being increasingly challenged, and new hypotheses continue to emerge. Due to conflicts that sometimes occur between traditional and more modern species concepts that are based largely on molecular data, there is a pressing need to revisit the discussion surrounding the species concept used for myxomycetes. Biological diversity is being increasingly studied with molecular methods and data accumulates at ever-faster rates, making resolution of this matter urgent. In this review, currently used and potentially useful species concepts (biological, morphological, phylogenetic and ecological) are reviewed, and an integrated approach to resolve the myxomycete species problem is discussed. Copyright © 2016 Elsevier GmbH. All rights reserved.

  16. Revisiting Hafemeister's science and society tests

    Science.gov (United States)

    Brecha, R. J.; Berney, R.; Craver, B.

    2007-10-01

    We revisit a series of papers on science and society issues by David Hafemeister in the 1970s and 1980s. The emphasis in the present work is on world oil production limits and some consequences of various possible scenarios for the near future. Some of the data and scenarios used by Hafemeister are updated for U.S. oil production in the past two decades, and extended to an analysis of a peak in world oil production in the future. We discuss some simple scenarios for future energy use patterns and look at the consequence of these scenarios as world oil production begins to decline. We also provide a list of resources for critical investigations of natural resource extraction and depletion patterns.

  17. Revisiting gravitino dark matter in thermal leptogenesis

    Science.gov (United States)

    Ibe, Masahiro; Suzuki, Motoo; Yanagida, Tsutomu T.

    2017-02-01

    In this paper, we revisit the gravitino dark matter scenario in the presence of the bilinear R-parity violating interaction. In particular, we discuss a consistency with the thermal leptogenesis. For a high reheating temperature required for the thermal leptogenesis, the gravitino dark matter tends to be overproduced, which puts a severe upper limit on the gluino mass. As we will show, a large portion of parameter space of the gravitino dark matter scenario has been excluded by combining the constraints from the gravitino abundance and the null results of the searches for the superparticles at the LHC experiments. In particular, the models with the stau (and other charged slepton) NLSP has been almost excluded by the searches for the long-lived charged particles at the LHC unless the required reheating temperature is somewhat lowered by assuming, for example, a degenerated right-handed neutrino mass spectrum.

  18. Revisiting gravitino dark matter in thermal leptogenesis

    CERN Document Server

    Ibe, Masahiro; Yanagida, Tsutomu T

    2016-01-01

    In this paper, we revisit the gravitino dark matter scenario in the presence of the bilinear $R$-parity violating interaction. In particular, we discuss a consistency with the thermal leptogenesis. For a high reheating temperature required for the thermal leptogenesis, the gravitino dark matter tends to be overproduced, which puts a severe upper limit on the gluino mass. As we will show, a large portion of parameter space of the gravitino dark matter scenario has been excluded by combining the constraints from the gravitino abundance and the null results of the searches for the superparticles at the LHC experiments. In particular, the models with the stau (and other charged slepton) NLSP has been almost excluded by the searches for the long-lived charged particles at the LHC unless the required reheating temperature is somewhat lowered by assuming, for example, a degenerated right-handed neutrino mass spectrum.

  19. Neutrino dark energy. Revisiting the stability issue

    Energy Technology Data Exchange (ETDEWEB)

    Eggers Bjaelde, O.; Hannestad, S. [Aarhus Univ. (Denmark). Dept. of Physics and Astronomy; Brookfield, A.W. [Sheffield Univ. (United Kingdom). Dept. of Applied Mathematics and Dept. of Physics, Astro-Particle Theory and Cosmology Group; Van de Bruck, C. [Sheffield Univ. (United Kingdom). Dept. of Applied Mathematics, Astro-Particle Theory and Cosmology Group; Mota, D.F. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Institute of Theoretical Astrophysics, Oslo (Norway); Schrempp, L. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Tocchini-Valentini, D. [Johns Hopkins Univ., Baltimore, MD (United States). Dept. of Physics and Astronomy

    2007-05-15

    A coupling between a light scalar field and neutrinos has been widely discussed as a mechanism for linking (time varying) neutrino masses and the present energy density and equation of state of dark energy. However, it has been pointed out that the viability of this scenario in the non-relativistic neutrino regime is threatened by the strong growth of hydrodynamic perturbations associated with a negative adiabatic sound speed squared. In this paper we revisit the stability issue in the framework of linear perturbation theory in a model independent way. The criterion for the stability of a model is translated into a constraint on the scalar-neutrino coupling, which depends on the ratio of the energy densities in neutrinos and cold dark matter. We illustrate our results by providing meaningful examples both for stable and unstable models. (orig.)

  20. Revisiting Lepton Flavour Universality in B Decays

    Science.gov (United States)

    Paradisi, Paride

    2017-04-01

    Lepton flavour universality (LFU) in B-decays is revisited by considering a class of semileptonic operators defined at a scale Λ above the electroweak scale v. The importance of quantum effects is emphasised [F. Feruglio, P. Paradisi and A. Pattori, arxiv:arXiv:1606.00524 [hep-ph], to appear in PRL]. We construct the low-energy effective Lagrangian taking into account the running effects from Λ down to v through the one-loop renormalization group equations (RGE) in the limit of exact electroweak symmetry and QED RGEs from v down to the 1 GeV scale. The most important quantum effects turn out to be the modification of the leptonic couplings of the vector boson Z and the generation of a purely leptonic effective Lagrangian. Large LFU breaking effects in Z and τ decays as well as visible lepton flavour violating (LFV) effects in τ decays are induced.

  1. Analysis and Synthesis of Distributed Real-Time Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Paul; Eles, Petru; Peng, Zebo

    Embedded computer systems are now everywhere: from alarm clocks to PDAs, from mobile phones to cars, almost all the devices we use are controlled by embedded computers. An important class of embedded computer systems is that of hard real-time systems, which have to fulfill strict timing...... in important reductions of design costs. Analysis and Synthesis of Distributed Real-Time Embedded Systems will be of interest to advanced undergraduates, graduate students, researchers and designers involved in the field of embedded systems....

  2. On the embedding of Weyl manifolds

    Science.gov (United States)

    Avalos, R.; Dahia, F.; Romero, C.

    2017-01-01

    We discuss the possibility of extending different versions of the Campbell-Magaard theorem, which have already been established in the context of semi-Riemannian geometry, to the context of Weyl's geometry. We show that some of the known results can be naturally extended to the new geometric scenario, although new difficulties arise. In pursuit of solving the embedding problem, we have obtained some no-go theorems. We also highlight some of the difficulties that appear in the embedding problem, which are typical of the Weylian character of the geometry. The establishing of these new results may be viewed as part of a program that highlights the possible significance of embedding theorems of increasing degrees of generality in the context of modern higher-dimensional space-time theories.

  3. Embedded and real-time operating systems

    CERN Document Server

    Wang, K C

    2017-01-01

    This book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems. It includes all the foundational and background information on ARM architecture, ARM instructions and programming, toolchain for developing programs, virtual machines for software implementation and testing, program execution image, function call conventions, run-time stack usage and link C programs with assembly code. It describes the design and implementation of a complete OS for embedded systems in incremental steps, explaining the design principles and implementation techniques. For Symmetric Multiprocessing (SMP) embedded systems, the author examines the ARM MPcore processors, which include the SCU and GIC for interrupts routing and interprocessor communication and synchronization by Software Generated Interrupts (SGIs). Throughout the book, complete working sample systems demonstrate the design principles and...

  4. Design Technology for Heterogeneous Embedded Systems

    CERN Document Server

    O'Connor, Ian; Piguet, Christian

    2012-01-01

    Designing technology to address the problem of heterogeneous embedded systems, while remaining compatible with standard “More Moore” flows, i.e. capable of handling simultaneously both silicon complexity and system complexity, represents one of the most important challenges facing the semiconductor industry today. While the micro-electronics industry has built its own specific design methods to focus mainly on the management of complexity through the establishment of abstraction levels, the emergence of device heterogeneity requires new approaches enabling the satisfactory design of physically heterogeneous embedded systems for the widespread deployment of such systems. This book, compiled largely from a set of contributions from participants of past editions of the Winter School on Heterogeneous Embedded Systems Design Technology (FETCH), proposes a broad and holistic overview of design techniques used to tackle the various facets of heterogeneity in terms of technology and opportunities at the physical ...

  5. Locally Linear Discriminate Embedding for Face Recognition

    Directory of Open Access Journals (Sweden)

    Eimad E. Abusham

    2009-01-01

    Full Text Available A novel method based on the local nonlinear mapping is presented in this research. The method is called Locally Linear Discriminate Embedding (LLDE. LLDE preserves a local linear structure of a high-dimensional space and obtains a compact data representation as accurately as possible in embedding space (low dimensional before recognition. For computational simplicity and fast processing, Radial Basis Function (RBF classifier is integrated with the LLDE. RBF classifier is carried out onto low-dimensional embedding with reference to the variance of the data. To validate the proposed method, CMU-PIE database has been used and experiments conducted in this research revealed the efficiency of the proposed methods in face recognition, as compared to the linear and non-linear approaches.

  6. Embedded Based Miniaturized Universal Electrochemical Sensing Platform

    Directory of Open Access Journals (Sweden)

    Jiamin Chen

    2016-01-01

    Full Text Available We created an embedded sensing platform based on STM32 embedded system, with integrated carbon-electrode ionic sensor by using a self-made plug. Given ration of concentration-unknown nitrate liquid samples, this platform is able to measure the nitrate concentration in neutral environment. Response signals which were transmitted by the sensor can be displayed via a serial port to the computer screen or via Bluetooth to the smartphone. Processed by a fitting function, signals are transformed into related concentration. Through repeating the experiment many times, the accuracy and repeatability turned out to be excellent. The results can be automatically stored on smartphone via Bluetooth. We created this embedded sensing platform for field water quality measurement. This platform also can be applied for other micro sensors’ signal acquisition and data processing.

  7. Dynamic memory management for embedded systems

    CERN Document Server

    Atienza Alonso, David; Poucet, Christophe; Peón-Quirós, Miguel; Bartzas, Alexandros; Catthoor, Francky; Soudris, Dimitrios

    2015-01-01

    This book provides a systematic and unified methodology, including basic principles and reusable processes, for dynamic memory management (DMM) in embedded systems.  The authors describe in detail how to design and optimize the use of dynamic memory in modern, multimedia and network applications, targeting the latest generation of portable embedded systems, such as smartphones. Coverage includes a variety of design and optimization topics in electronic design automation of DMM, from high-level software optimization to microarchitecture-level hardware support. The authors describe the design of multi-layer dynamic data structures for the final memory hierarchy layers of the target portable embedded systems and how to create a low-fragmentation, cost-efficient, dynamic memory management subsystem out of configurable components for the particular memory allocation and de-allocation patterns for each type of application.  The design methodology described in this book is based on propagating constraints among de...

  8. On λ-Finitely Embedded Modules

    Institute of Scientific and Technical Information of China (English)

    O.A.S. Karamzadeh; Sh. Rahimpour

    2005-01-01

    In this article, we introduce and study the notion of λ-finitely embedded modules (a O-finitely embedded module is just a finitely embedded module). We extend some of the basic results of f.e. modules to λ-f.e. modules. We use this concept to give a new proof of a known result which essentially says that a module M has Krull dimension α if and only if each factor module of M is λ-f.e. for some λ≤α and α is the least ordinal with this property. It is observed that a semiprime ring R has Krull dimension λ if and only if R is λ-f.e. We improve the theorem of Matlis-Papp and some of its consequences.Finally, some known results in the literature are restated in terms of the above notion.

  9. Embedded Thermal Control for Spacecraft Subsystems Miniaturization

    Science.gov (United States)

    Didion, Jeffrey R.

    2014-01-01

    Optimization of spacecraft size, weight and power (SWaP) resources is an explicit technical priority at Goddard Space Flight Center. Embedded Thermal Control Subsystems are a promising technology with many cross cutting NSAA, DoD and commercial applications: 1.) CubeSatSmallSat spacecraft architecture, 2.) high performance computing, 3.) On-board spacecraft electronics, 4.) Power electronics and RF arrays. The Embedded Thermal Control Subsystem technology development efforts focus on component, board and enclosure level devices that will ultimately include intelligent capabilities. The presentation will discuss electric, capillary and hybrid based hardware research and development efforts at Goddard Space Flight Center. The Embedded Thermal Control Subsystem development program consists of interrelated sub-initiatives, e.g., chip component level thermal control devices, self-sensing thermal management, advanced manufactured structures. This presentation includes technical status and progress on each of these investigations. Future sub-initiatives, technical milestones and program goals will be presented.

  10. Architecture for Pseudo Acausal Evolvable Embedded Systems

    CERN Document Server

    Abubakr, Mohd

    2007-01-01

    Advances in semiconductor technology are contributing to the increasing complexity in the design of embedded systems. Architectures with novel techniques such as evolvable nature and autonomous behavior have engrossed lot of attention. This paper demonstrates conceptually evolvable embedded systems can be characterized basing on acausal nature. It is noted that in acausal systems, future input needs to be known, here we make a mechanism such that the system predicts the future inputs and exhibits pseudo acausal nature. An embedded system that uses theoretical framework of acausality is proposed. Our method aims at a novel architecture that features the hardware evolability and autonomous behavior alongside pseudo acausality. Various aspects of this architecture are discussed in detail along with the limitations.

  11. Embedded ubiquitous services on hospital information systems.

    Science.gov (United States)

    Kuroda, Tomohiro; Sasaki, Hiroshi; Suenaga, Takatoshi; Masuda, Yasushi; Yasumuro, Yoshihiro; Hori, Kenta; Ohboshi, Naoki; Takemura, Tadamasa; Chihara, Kunihiro; Yoshihara, Hiroyuki

    2012-11-01

    A Hospital Information Systems (HIS) have turned a hospital into a gigantic computer with huge computational power, huge storage and wired/wireless local area network. On the other hand, a modern medical device, such as echograph, is a computer system with several functional units connected by an internal network named a bus. Therefore, we can embed such a medical device into the HIS by simply replacing the bus with the local area network. This paper designed and developed two embedded systems, a ubiquitous echograph system and a networked digital camera. Evaluations of the developed systems clearly show that the proposed approach, embedding existing clinical systems into HIS, drastically changes productivity in the clinical field. Once a clinical system becomes a pluggable unit for a gigantic computer system, HIS, the combination of multiple embedded systems with application software designed under deep consideration about clinical processes may lead to the emergence of disruptive innovation in the clinical field.

  12. Spatially Partitioned Embedded Runge--Kutta Methods

    KAUST Repository

    Ketcheson, David I.

    2013-10-30

    We study spatially partitioned embedded Runge--Kutta (SPERK) schemes for partial differential equations (PDEs), in which each of the component schemes is applied over a different part of the spatial domain. Such methods may be convenient for problems in which the smoothness of the solution or the magnitudes of the PDE coefficients vary strongly in space. We focus on embedded partitioned methods as they offer greater efficiency and avoid the order reduction that may occur in nonembedded schemes. We demonstrate that the lack of conservation in partitioned schemes can lead to nonphysical effects and propose conservative additive schemes based on partitioning the fluxes rather than the ordinary differential equations. A variety of SPERK schemes are presented, including an embedded pair suitable for the time evolution of fifth-order weighted nonoscillatory spatial discretizations. Numerical experiments are provided to support the theory.

  13. Piezoresistance in p-type silicon revisited

    DEFF Research Database (Denmark)

    Richter, Jacob; Pedersen, Jesper; Brandbyge, Mads;

    2008-01-01

    We calculate the shear piezocoefficient pi44 in p-type Si with a 6×6 k·p Hamiltonian model using the Boltzmann transport equation in the relaxation-time approximation. Furthermore, we fabricate and characterize p-type silicon piezoresistors embedded in a (001) silicon substrate. We find that the ...

  14. Analysis of the Similarities and Dissimilarities between Chinese and Western Tragedies with "Romeo and Juliet"and"Butterfly Love"as an Example%以《罗密欧与朱丽叶》和《梁祝》为例分析中西方悲剧的异同

    Institute of Scientific and Technical Information of China (English)

    姚羚羚

    2013-01-01

      《梁山伯与祝英台》是我国四大民间传说之一,是世界非物质文化遗产,《罗密欧与朱丽叶》是欧洲文艺复兴时期英国剧作家莎士比亚的名作,二者虽然历史环境与文化背景不同,但是都描绘了惊世骇俗的爱情,讲述了一对年轻人相识相爱,最后殉情而死的悲剧故事。本文从人物塑造、社会背景、文化差异、结局构建等几个方面对两部爱情著作进行对比分析,比较中西方悲剧文化的异同。%"Butterfly Love"is one of China's four major folklores, and is also a world intangible cultural heritage."Romeo and Juli-et" is the British playwright Shakespeare's masterpiece in the European Renaissance period. The two are based on different historical and cultural background, but they all described the love shocking the common customs. From several aspects, this paper compares and analyzes the two masterpieces, and compares the similarities and dissimilarities between Chinese and Western cultures.

  15. Symplectic embeddings and continued fractions: a survey

    CERN Document Server

    McDuff, Dusa

    2009-01-01

    As has been known since the time of Gromov's Nonsqueezing Theorem, symplectic embedding questions lie at the heart of symplectic geometry. After surveying some of the most important ways of measuring the size of a symplectic set, these notes discuss some recent developments concerning the question of when a 4-dimensional ellipsoid can be symplectically embedded in a ball. This problem turns out to have unexpected relations to the properties of continued fractions and of exceptional curves in blow ups of the complex projective plane. It is also related to questions of lattice packing of planar triangles.

  16. Communicating embedded systems software and design

    CERN Document Server

    Jard, Claude

    2013-01-01

    The increased complexity of embedded systems coupled with quick design cycles to accommodate faster time-to-market requires increased system design productivity that involves both model-based design and tool-supported methodologies. Formal methods are mathematically-based techniques and provide a clean framework in which to express requirements and models of the systems, taking into account discrete, stochastic and continuous (timed or hybrid) parameters with increasingly efficient tools. This book deals with these formal methods applied to communicating embedded systems by presenting the

  17. Physical Activity Recognition from Smartphone Embedded Sensors

    DEFF Research Database (Denmark)

    Prudêncio, João; Aguiar, Ana; Roetter, Daniel Enrique Lucani

    2013-01-01

    The ubiquity of smartphones has motivated efforts to use the embedded sensors to detect various aspects of user context to transparently provide personalized and contextualized services to the user. One relevant piece of context is the physical activity of the smartphone user. In this paper, we...... propose a novel set of features for distinguishing five physical activities using only sensors embedded in the smartphone. Specifically, we introduce features that are normalized using the orientation sensor such that horizontal and vertical movements are explicitly computed. We evaluate a neural network...

  18. Embedding complementarity in HCI methods and techniques

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin;

    2006-01-01

    in the techniques and the tools that we apply. We lack a framework for discussing what and who we are, when we talk about a person as the user of an ICT system that has to be designed, developed and implemented. As a framework, we suggest a theory of complementary positions that insists on solid accounts from all......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...

  19. Global string embeddings for the nilpotent Goldstino

    Energy Technology Data Exchange (ETDEWEB)

    García-Etxebarria, Iñaki [Max Planck Institute for Physics,Föhringer Ring 6, 80805 Munich (Germany); Quevedo, Fernando [DAMTP, CMS, University of Cambridge,Wilberforce Road, Cambridge, CB3 0WA (United Kingdom); ICTP,Strada Costiera 11, 34151 Trieste (Italy); Valandro, Roberto [Dipartimento di Fisica, Università di Trieste,Strada Costiera 11, 34151 Trieste (Italy); INFN, Sezione di Trieste,Via Valerio 2, 34127 Trieste (Italy)

    2016-02-22

    We discuss techniques for embedding a nilpotent Goldstino sector both in weakly coupled type IIB compactifications and F-theory models at arbitrary coupling, providing examples of both scenarios in semi-realistic compactifications. We start by showing how to construct a local embedding for the nilpotent Goldstino in terms of an anti D3-brane in a local conifold throat, and then discuss how to engineer the required local structure in globally consistent compact models. We present two explicit examples, the last one supporting also chiral matter and Kähler moduli stabilisation.

  20. Global string embeddings for the nilpotent Goldstino

    Science.gov (United States)

    García-Etxebarria, Iñaki; Quevedo, Fernando; Valandro, Roberto

    2016-02-01

    We discuss techniques for embedding a nilpotent Goldstino sector both in weakly coupled type IIB compactifications and F-theory models at arbitrary coupling, providing examples of both scenarios in semi-realistic compactifications. We start by showing how to construct a local embedding for the nilpotent Goldstino in terms of an anti D3-brane in a local conifold throat, and then discuss how to engineer the required local structure in globally consistent compact models. We present two explicit examples, the last one supporting also chiral matter and Kähler moduli stabilisation.

  1. Converting VSAM in COBOL to embedded SQL

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Hai; Wang, Yamin; Tsai, Wei-Tek [Univ. of Minnesota, Minneapolis, MN (United States)

    1996-12-31

    VSAM databases we widely used on IBM mainframe systems. As new technology, such as relational database and client-server computing, becomes popular, there is a need to reengineer the VSAM databases to relational databases. This paper addresses the issues on converting COBOL programs that access VSAM database to COBOL programs that access relational databases with embedded SQL. It proposed a semi-automatic approach to the conversion of VSAM data sets to SQL tables and VSAM operations in COBOL program to embedded SQL queries. The proposed approach has been experimented on several industrial COBOL programs and a tool implementing the approach is under development.

  2. Global String Embeddings for the Nilpotent Goldstino

    CERN Document Server

    García-Etxebarria, Iñaki; Valandro, Roberto

    2015-01-01

    We discuss techniques for embedding a nilpotent Goldstino sector both in weakly coupled type IIB compactifications and F-theory models at arbitrary coupling, providing examples of both scenarios in semi-realistic compactifications. We start by showing how to construct a local embedding for the nilpotent Goldstino in terms of an anti D3-brane in a local conifold throat, and then discuss how to engineer the required local structure in globally consistent compact models. We present two explicit examples, the last one supporting also chiral matter and K\\"ahler moduli stabilisation.

  3. Modelling and Analyses of Embedded Systems Design

    DEFF Research Database (Denmark)

    Brekling, Aske Wiid

    We present the MoVES languages: a language with which embedded systems can be specified at a stage in the development process where an application is identified and should be mapped to an execution platform (potentially multi- core). We give a formal model for MoVES that captures and gives......-based verification is a promising approach for assisting developers of embedded systems. We provide examples of system verifications that, in size and complexity, point in the direction of industrially-interesting systems....

  4. Sentiment Analysis on Embedded Systems Blended Courses

    Directory of Open Access Journals (Sweden)

    Razvan Bogdan

    2017-04-01

    Full Text Available Massive Open Online Courses (MOOCs have been producing an electrified feeling in the academic circles since 2012. This was amplified once profit initiatives like Coursera and Udacity joined their forces with renowned universities like Stanford, Harvard and the Massachusetts Institute of Technology. This paper presents a modality of integrating Embedded Systems MOOCs into blended courses, but at the same time it provides an evaluation of this approach: the sentiment analysis technique. Such an evaluation not only reveals the polarity, but also valuable insights into improving the course content and integration of MOOCs into the intricacies of teaching embedded systems.

  5. Model-based testing for embedded systems

    CERN Document Server

    Zander, Justyna; Mosterman, Pieter J

    2011-01-01

    What the experts have to say about Model-Based Testing for Embedded Systems: "This book is exactly what is needed at the exact right time in this fast-growing area. From its beginnings over 10 years ago of deriving tests from UML statecharts, model-based testing has matured into a topic with both breadth and depth. Testing embedded systems is a natural application of MBT, and this book hits the nail exactly on the head. Numerous topics are presented clearly, thoroughly, and concisely in this cutting-edge book. The authors are world-class leading experts in this area and teach us well-used

  6. Tools for Embedded Computing Systems Software

    Science.gov (United States)

    1978-01-01

    A workshop was held to assess the state of tools for embedded systems software and to determine directions for tool development. A synopsis of the talk and the key figures of each workshop presentation, together with chairmen summaries, are presented. The presentations covered four major areas: (1) tools and the software environment (development and testing); (2) tools and software requirements, design, and specification; (3) tools and language processors; and (4) tools and verification and validation (analysis and testing). The utility and contribution of existing tools and research results for the development and testing of embedded computing systems software are described and assessed.

  7. The art of programming embedded systems

    CERN Document Server

    Ganssle, Jack

    1992-01-01

    Embedded systems are products such as microwave ovens, cars, and toys that rely on an internal microprocessor. This book is oriented toward the design engineer or programmer who writes the computer code for such a system. There are a number of problems specific to the embedded systems designer, and this book addresses them and offers practical solutions.Key Features* Offers cookbook routines, algorithms, and design techniques* Includes tips for handling debugging management and testing* Explores the philosophy of tightly coupling software and hardware in programming and dev

  8. Application of invariant embedding to reactor physics

    CERN Document Server

    Shimizu, Akinao; Parsegian, V L

    1972-01-01

    Application of Invariant Embedding to Reactor Physics describes the application of the method of invariant embedding to radiation shielding and to criticality calculations of atomic reactors. The authors intend to show how this method has been applied to realistic problems, together with the results of applications which will be useful to shielding design. The book is organized into two parts. Part A deals with the reflection and transmission of gamma rays by slabs. The chapters in this section cover topics such as the reflection and transmission problem of gamma rays; formulation of the probl

  9. Physical Activity Recognition from Smartphone Embedded Sensors

    DEFF Research Database (Denmark)

    Prudêncio, João; Aguiar, Ana; Roetter, Daniel Enrique Lucani

    2013-01-01

    The ubiquity of smartphones has motivated efforts to use the embedded sensors to detect various aspects of user context to transparently provide personalized and contextualized services to the user. One relevant piece of context is the physical activity of the smartphone user. In this paper, we...... propose a novel set of features for distinguishing five physical activities using only sensors embedded in the smartphone. Specifically, we introduce features that are normalized using the orientation sensor such that horizontal and vertical movements are explicitly computed. We evaluate a neural network...

  10. Growing Embedded Librarians Like Kudzu: How the Embedded Extension Service Creates More Embedded Librarians without Creating New Positions

    Science.gov (United States)

    Coltrain, Mark

    2014-01-01

    In an era of exploding online enrollment and tight budgets, Central Piedmont Community College (CPCC) struggles to meet the needs of online students. CPCC librarians went one step towards solving that problem in 2009-2010 by launching an embedded librarian program. CPCC's program became so successful that it struggled to meet demand. In 2013, CPCC…

  11. A Laboratory Testbed for Embedded Fuzzy Control

    Science.gov (United States)

    Srivastava, S.; Sukumar, V.; Bhasin, P. S.; Arun Kumar, D.

    2011-01-01

    This paper presents a novel scheme called "Laboratory Testbed for Embedded Fuzzy Control of a Real Time Nonlinear System." The idea is based upon the fact that project-based learning motivates students to learn actively and to use their engineering skills acquired in their previous years of study. It also fosters initiative and focuses…

  12. Web Service Architecture Framework for Embedded Devices

    Science.gov (United States)

    Yanzick, Paul David

    2009-01-01

    The use of Service Oriented Architectures, namely web services, has become a widely adopted method for transfer of data between systems across the Internet as well as the Enterprise. Adopting a similar approach to embedded devices is also starting to emerge as personal devices and sensor networks are becoming more common in the industry. This…

  13. Embedding Multiple Literacies into STEM Curricula

    Science.gov (United States)

    Soules, Aline; Nielsen, Sarah; LeDuc, Danika; Inouye, Caron; Singley, Jason; Wildy, Erica; Seitz, Jeff

    2014-01-01

    In fall 2012, an interdisciplinary team of science, English, and library faculty embedded reading, writing, and information literacy strategies in Science, Technology, Engineering, and Mathematics (STEM) curricula as a first step in improving student learning and retention in science courses and aligning them with the Next Generation Science and…

  14. Positioning embedded software maintenance within industrial maintenance

    OpenAIRE

    Karim, Ramin; Kajko-Mattsson, Mira; Söderholm, Peter; Candell, Olov; Tyrbern, Tommy; Öhlund, Hans; Johansson, Jan

    2008-01-01

    Little is known about of how software embedded in complex industrial technical systems is maintained. In this paper, we identify industrial maintenance process steps and position software maintenance activities within them. We do this in the context of JAS 39 Gripen, a multi-role combat aircraft developed by Saab.

  15. Views on Evolvability of Embedded Systems

    NARCIS (Netherlands)

    Laar, P. van de; Punter, T.

    2011-01-01

    Evolvability, the ability to respond effectively to change, represents a major challenge to today's high-end embedded systems, such as those developed in the medical domain by Philips Healthcare. These systems are typically developed by multi-disciplinary teams, located around the world, and are in

  16. Embedded-atom Potential for Oxygen

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The analytic embedded-atom potential for oxygen is developed from the experimental data and the results of the first-principle. The potential is used to predict the geometries and energies of O3, fcc, bcc, sc and diamond. The predictions are in good agreement with experimental data available and other theoretical results.

  17. Research on memory management in embedded systems

    Science.gov (United States)

    Huang, Xian-ying; Yang, Wu

    2005-12-01

    Memory is a scarce resource in embedded system due to cost and size. Thus, applications in embedded systems cannot use memory randomly, such as in desktop applications. However, data and code must be stored into memory for running. The purpose of this paper is to save memory in developing embedded applications and guarantee running under limited memory conditions. Embedded systems often have small memory and are required to run a long time. Thus, a purpose of this study is to construct an allocator that can allocate memory effectively and bear a long-time running situation, reduce memory fragmentation and memory exhaustion. Memory fragmentation and exhaustion are related to the algorithm memory allocated. Static memory allocation cannot produce fragmentation. In this paper it is attempted to find an effective allocation algorithm dynamically, which can reduce memory fragmentation. Data is the critical part that ensures an application can run regularly, which takes up a large amount of memory. The amount of data that can be stored in the same size of memory is relevant with the selected data structure. Skills for designing application data in mobile phone are explained and discussed also.

  18. An Integrated Specification Framework for Embedded Systems

    NARCIS (Netherlands)

    Bujorianu, Manuela L.; Bujorianu, Marius C.

    2007-01-01

    In this paper, we address the complex issue of representation of continuous behaviour of the environment of the embedded controllers. In our approach we propose two novel ideas. One is to consider the weak solutions to describe the evolutions of the dynamical systems. The second novelty is to make a

  19. A Laboratory Testbed for Embedded Fuzzy Control

    Science.gov (United States)

    Srivastava, S.; Sukumar, V.; Bhasin, P. S.; Arun Kumar, D.

    2011-01-01

    This paper presents a novel scheme called "Laboratory Testbed for Embedded Fuzzy Control of a Real Time Nonlinear System." The idea is based upon the fact that project-based learning motivates students to learn actively and to use their engineering skills acquired in their previous years of study. It also fosters initiative and focuses…

  20. On Verification Modelling of Embedded Systems

    NARCIS (Netherlands)

    Brinksma, Ed; Mader, Angelika

    2004-01-01

    Computer-aided verification of embedded systems hinges on the availability of good verification models of the systems at hand. Such models must be much simpler than full design models or specifications to be of practical value, because of the unavoidable combinatorial complexities in the verificatio

  1. Reusing knowledge in embedded system modelling

    NARCIS (Netherlands)

    Marincic, J.; Mader, Angelika H.; Wieringa, Roelf J.; Lucas, Yan

    2013-01-01

    Model-based design is a promising technique to improve the quality of software and the efficiency of the software development process. We are investigating how to efficiently model embedded software and its environment to verify the requirements for the system controlled by the software. The softwar

  2. Embeddings of the "New Massive Gravity"

    Science.gov (United States)

    Dalmazi, D.; Mendonça, E. L.

    2016-07-01

    Here we apply different types of embeddings of the equations of motion of the linearized "New Massive Gravity" in order to generate alternative and even higher-order (in derivatives) massive gravity theories in D=2+1. In the first part of the work we use the Weyl symmetry as a guiding principle for the embeddings. First we show that a Noether gauge embedding of the Weyl symmetry leads to a sixth-order model in derivatives with either a massive or a massless ghost, according to the chosen overall sign of the theory. On the other hand, if the Weyl symmetry is implemented by means of a Stueckelberg field we obtain a new scalar-tensor model for massive gravitons. It is ghost-free and Weyl invariant at the linearized level around Minkowski space. The model can be nonlinearly completed into a scalar field coupled to the NMG theory. The elimination of the scalar field leads to a nonlocal modification of the NMG. In the second part of the work we prove to all orders in derivatives that there is no local, ghost-free embedding of the linearized NMG equations of motion around Minkowski space when written in terms of one symmetric tensor. Regarding that point, NMG differs from the Fierz-Pauli theory, since in the latter case we can replace the Einstein-Hilbert action by specific f(R,Box R) generalizations and still keep the theory ghost-free at the linearized level.

  3. Scheduling Driven Partitioning of Heterogeneous Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Paul; Eles, Petru; Peng, Zebo

    1998-01-01

    In this paper we present an algorithm for system level hardware/software partitioning of heterogeneous embedded systems. The system is represented as an abstract graph which captures both data-flow and the flow of control. Given an architecture consisting of several processors, ASICs and shared b...

  4. Optimization of Hierarchically Scheduled Heterogeneous Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Traian; Pop, Paul; Eles, Petru;

    2005-01-01

    We present an approach to the analysis and optimization of heterogeneous distributed embedded systems. The systems are heterogeneous not only in terms of hardware components, but also in terms of communication protocols and scheduling policies. When several scheduling policies share a resource...

  5. Using a Cluster for Securing Embedded Systems

    Directory of Open Access Journals (Sweden)

    Mohamed Salim LMIMOUNI

    2016-09-01

    Full Text Available In today's increasingly interconnected world, the deployment of an Intrusion Detection System (IDS is becoming very important for securing embedded systems from viruses, worms, attacks, etc. But IDSs face many challenges like computational resources and ubiquitous threats. Many of these challenges can be resolved by running the IDS in a cluster to allow tasks to be parallelly executed. In this paper, we propose to secure embedded systems by using a cluster of embedded cards that can run multiple instances of an IDS in a parallel way. This proposition is now possible with the availability of new low-power single-board computers (Raspberry Pi, BeagleBoard, Cubieboard, Galileo, etc.. To test the feasibility of our proposed architecture, we run two instances of the Bro IDS on two Raspberry Pi. The results show that we can effectively run multiple instances of an IDS in a parallel way on a cluster of new low-power single-board computers to secure embedded systems.

  6. Embedded Critique in a Tensed World

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2006-01-01

    , it is probably best not to criticize at all. I argue that this reaction is wrong. Descriptivism does on the one hand not solve the problem from which it originates: the description is itself embedded in a contingent validity. The postmodern insight does on the other hand not necessarily lead to absolute...

  7. Second order perturbation theory for embedded eigenvalues

    DEFF Research Database (Denmark)

    Faupin, Jeremy; Møller, Jacob Schach; Skibsted, Erik

    2011-01-01

    We study second order perturbation theory for embedded eigenvalues of an abstract class of self-adjoint operators. Using an extension of the Mourre theory, under assumptions on the regularity of bound states with respect to a conjugate operator, we prove upper semicontinuity of the point spectrum...

  8. Safety-critical Java for embedded systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, René Rydhof

    2016-01-01

    This paper presents the motivation for and outcomes of an engineering research project on certifiable Javafor embedded systems. The project supports the upcoming standard for safety-critical Java, which defines asubset of Java and libraries aiming for development of high criticality systems...

  9. Is Embedded Librarianship Right for Your Institution?

    Science.gov (United States)

    Muir, Gordon; Heller-Ross, Holly

    2010-01-01

    Embedded librarians, connected with students and faculty inside the classroom, lab and studio, have new opportunities for preparing students for research and for collaborating with faculty on course-integrated information literacy, research assignment design, teaching, assignment interpretation, and timely student assistance. What makes embedded…

  10. Embedded solution for a microwave moisture meter

    Science.gov (United States)

    In this paper, the conversion of a PC or laptop-controlled microwave moisture meter to a stand-alone meter hosting its own embedded system is discussed. The moisture meter is based on the free-space transmission measurement technique and uses low-intensity microwaves to measure the attenuation and p...

  11. Integrated Design Tools for Embedded Control Systems

    NARCIS (Netherlands)

    Jovanovic, D.S.; Hilderink, G.H.; Broenink, Johannes F.; Karelse, F.

    2001-01-01

    Currently, computer-based control systems are still being implemented using the same techniques as 10 years ago. The purpose of this project is the development of a design framework, consisting of tools and libraries, which allows the designer to build high reliable heterogeneous real-time embedded

  12. Excited States in Solution through Polarizable Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus; Aidas, Kestutis; Kongsted, Jacob

    2010-01-01

    We present theory and implementation of an advanced quantum mechanics/molecular mechanics (QM/MM) approach using a fully self-consistent polarizable embedding (PE) scheme. It is a polarizable layered model designed for effective yet accurate inclusion of an anisotropic medium in a quantum...

  13. Embeddings of the "New Massive Gravity"

    CERN Document Server

    Dalmazi, D

    2016-01-01

    Using different types of embeddings of equations of motion we investigate the existence of generalizations of the "New Massive Gravity" (NMG) model with the same particle content (massive gravitons). By using the Weyl symmetry as a guiding principle for the embeddings we show that the Noether gauge embedding approach leads us to a sixth order model in derivatives with either a massive or a massless ghost. If the Weyl symmetry is implemented by means of a Stueckelberg field we obtain a new scalar-tensor model for massive gravitons. It is ghost free and Weyl invariant at linearized level. The model can be nonlinearly completed into a scalar field coupled to the NMG theory. The elimination of the scalar field leads to a nonlocal modification of the NMG. We also prove to all orders in derivatives that there is no local, ghost free embedding of the linearized NMG equations of motion around Minkowski space when written in terms of one symmetric tensor. Regarding that point, NMG differs from the Fierz-Pauli theory, ...

  14. On Equivariant Embedding of Hilbert C^* modules

    OpenAIRE

    Goswami, Debashish

    2007-01-01

    We prove that an arbitrary (not necessarily countably generated) Hilbert $G$-$\\cla$ module on a G-C^* algebra $\\cla$ admits an equivariant embedding into a trivial $G-\\cla$ module, provided G is a compact Lie group and its action on $\\cla$ is ergodic.

  15. On Equivariant Embedding of Hilbert $C^*$ modules

    CERN Document Server

    Goswami, Debashish

    2007-01-01

    We prove that an arbitrary (not necessarily countably generated) Hilbert $G$-$\\cla$ module on a $G-C^*$ algebra $\\cla$ admits an equivariant embedding into a trivial $G-\\cla$ module, provided $G$ is a compact Lie group and its action on $\\cla$ is ergodic.

  16. Polarizable Embedding Density Matrix Renormalization Group.

    Science.gov (United States)

    Hedegård, Erik D; Reiher, Markus

    2016-09-13

    The polarizable embedding (PE) approach is a flexible embedding model where a preselected region out of a larger system is described quantum mechanically, while the interaction with the surrounding environment is modeled through an effective operator. This effective operator represents the environment by atom-centered multipoles and polarizabilities derived from quantum mechanical calculations on (fragments of) the environment. Thereby, the polarization of the environment is explicitly accounted for. Here, we present the coupling of the PE approach with the density matrix renormalization group (DMRG). This PE-DMRG method is particularly suitable for embedded subsystems that feature a dense manifold of frontier orbitals which requires large active spaces. Recovering such static electron-correlation effects in multiconfigurational electronic structure problems, while accounting for both electrostatics and polarization of a surrounding environment, allows us to describe strongly correlated electronic structures in complex molecular environments. We investigate various embedding potentials for the well-studied first excited state of water with active spaces that correspond to a full configuration-interaction treatment. Moreover, we study the environment effect on the first excited state of a retinylidene Schiff base within a channelrhodopsin protein. For this system, we also investigate the effect of dynamical correlation included through short-range density functional theory.

  17. When the set of embeddings is finite?

    CERN Document Server

    Skopenkov, Mikhail

    2011-01-01

    Given a manifold N and a number m, we study the following question: is the set of isotopy classes of embeddings N->S^m finite? In case when the manifold N is a sphere the answer was given by A. Haefliger in 1966. In case when the manifold N is a disjoint union of spheres the answer was given by D. Crowley, S. Ferry and the author in 2011. We consider the next natural case when N is a product of two spheres. In the following theorem, FCS(i,j) is a concrete subset of the integer lattice depending only on the parity of i and j which is defined in the paper. Theorem. Assume that m>2p+q+2 and m S^m is infinite if and only if either q+1 or p+q+1 is divisible by 4, or there exists a point (x,y) in the set FCS(m-p-q,m-q) such that (m-p-q-2)x+(m-q-2)y=m-3. Our approach is based on a group structure on the set of embeddings and a new exact sequence, which in some sense reduces the classification of embeddings S^p x S^q -> S^m to the classification of embeddings S^{p+q} |_| S^q -> S^m and D^p x S^q -> S^m. The latter cl...

  18. Adaptive Embedded Digital System for Plasma Diagnostics

    Science.gov (United States)

    González, Angel; Rodríguez, Othoniel; Mangual, Osvaldo; Ponce, Eduardo; Vélez, Xavier

    2014-05-01

    An Adaptive Embedded Digital System to perform plasma diagnostics using electrostatic probes was developed at the Plasma Engineering Laboratory at Polytechnic University of Puerto Rico. The system will replace the existing instrumentation at the Laboratory, using reconfigurable hardware to minimize the equipment and software needed to perform diagnostics. The adaptability of the design resides on the possibility of replacing the computational algorithm on the fly, allowing to use the same hardware for different probes. The system was prototyped using Very High Speed Integrated Circuits Hardware Description Language (VHDL) into an Field Programmable Gate Array (FPGA) board. The design of the Embedded Digital System includes a Zero Phase Digital Filter, a Derivative Unit, and a Computational Unit designed using the VHDL-2008 Support Library. The prototype is able to compute the Plasma Electron Temperature and Density from a Single Langmuir probe. The system was tested using real data previously acquired from a single Langmuir probe. The plasma parameters obtained from the embedded system were compared with results computed using matlab yielding excellent matching. The new embedded system operates on 4096 samples versus 500 on the previous system, and completes its computations in 26 milliseconds compared with about 15 seconds on the previous system.

  19. On Equivariant Embedding of Hilbert * Modules

    Indian Academy of Sciences (India)

    Debashish Goswami

    2009-02-01

    We prove that an arbitrary (not necessarily countably generated) Hilbert $G-\\mathcal{A}$ module on a -* algebra $\\mathcal{A}$ admits an equivariant embedding into a trivial $G-\\mathcal{A}$ module, provided is a compact Lie group and its action on $\\mathcal{A}$ is ergodic.

  20. Perturbation of eigenvalues embedded at a threshold

    DEFF Research Database (Denmark)

    Jensen, Arne; Melgaard, Michael

    2002-01-01

    Results are obtained on perturbation of eigenvalues and half-bound states (zero-resonances) embedded at a threshold. The results are obtained in a two-channel framework for small off-diagonal perturbations. The results are based on given asymptotic expansions of the component Hamiltonians....

  1. Revisiting adoption of high transmission PSM: pros, cons and path forward

    Science.gov (United States)

    Ma, Z. Mark; McDonald, Steve; Progler, Chris

    2009-12-01

    High transmission attenuated phase shift masks (Hi-T PSM) have been successfully applied in volume manufacturing for certain memory devices. Moreover, numerous studies have shown the potential benefits of Hi-T PSM for specific lithography applications. In this paper, the potential for extending Hi-T PSM to logic devices, is revisited with an emphasis on understanding layout, transmission, and manufacturing of Hi-T PSM versus traditional 6% embedded attenuated phase shift mask (EAPSM). Simulations on various layouts show Hi-T PSM has advantage over EAPSM in low duty cycle line patterns and high duty cycle space patterns. The overall process window can be enhanced when Hi- T PSM is combined with optimized optical proximity correction (OPC), sub-resolution assist features (SRAF), and source illumination. Therefore, Hi-T PSM may be a viable and lower cost alternative to other complex resolution enhancement technology (RET) approaches. Aerial image measurement system (AIMS) results on test masks, based on an inverse lithography technology (ILT) generated layout, confirm the simulation results. New advancement in high transmission blanks also make low topography Hi-T PSM a reality, which can minimize scattering effects in high NA lithography.

  2. Quantum annealing correction with minor embedding

    Science.gov (United States)

    Vinci, Walter; Albash, Tameem; Paz-Silva, Gerardo; Hen, Itay; Lidar, Daniel A.

    2015-10-01

    Quantum annealing provides a promising route for the development of quantum optimization devices, but the usefulness of such devices will be limited in part by the range of implementable problems as dictated by hardware constraints. To overcome constraints imposed by restricted connectivity between qubits, a larger set of interactions can be approximated using minor embedding techniques whereby several physical qubits are used to represent a single logical qubit. However, minor embedding introduces new types of errors due to its approximate nature. We introduce and study quantum annealing correction schemes designed to improve the performance of quantum annealers in conjunction with minor embedding, thus leading to a hybrid scheme defined over an encoded graph. We argue that this scheme can be efficiently decoded using an energy minimization technique provided the density of errors does not exceed the per-site percolation threshold of the encoded graph. We test the hybrid scheme using a D-Wave Two processor on problems for which the encoded graph is a two-level grid and the Ising model is known to be NP-hard. The problems we consider are frustrated Ising model problem instances with "planted" (a priori known) solutions. Applied in conjunction with optimized energy penalties and decoding techniques, we find that this approach enables the quantum annealer to solve minor embedded instances with significantly higher success probability than it would without error correction. Our work demonstrates that quantum annealing correction can and should be used to improve the robustness of quantum annealing not only for natively embeddable problems but also when minor embedding is used to extend the connectivity of physical devices.

  3. Fast and effective embedded systems design applying the ARM mbed

    CERN Document Server

    Toulson, Rob

    2012-01-01

    A hands-on introduction to the field of embedded systems; A focus on fast prototyping of embedded systems; All key embedded system concepts covered through simple and effective experimentation; An understanding of ARM technology, one of the world's leaders; A practical introduction to embedded C; Applies possibly the most accessible set of tools available in the embedded world.  This book is an introduction to embedded systems design, using the ARM mbed and C programming language as development tools. The mbed provides a compact, self-contained and low-cost hardware core, and the

  4. Rapid Manufacturing of Reconfigurable Satellite Panels with Embedded Electronics, Embedded Thermal Devices, and Novel Structural Features

    OpenAIRE

    Young, Quinn; Stucker, Brent

    2006-01-01

    The Center for Advanced Satellite Manufacturing (CASM) at Utah State University has been investigating the use of new, advanced manufacturing technologies for the rapid manufacture of highly capable satellite panels. Using Ultrasonic Consolidation it is now possible to additively manufacture (a.k.a. rapid prototype) aluminum structures with embedded electronics, thermal devices, internal structural features, and fibers. CASM has built and tested embedded USB networks, electronic devices, ther...

  5. The Activation of Embedded Words in Spoken Word Recognition.

    Science.gov (United States)

    Zhang, Xujin; Samuel, Arthur G

    2015-01-01

    The current study investigated how listeners understand English words that have shorter words embedded in them. A series of auditory-auditory priming experiments assessed the activation of six types of embedded words (2 embedded positions × 3 embedded proportions) under different listening conditions. Facilitation of lexical decision responses to targets (e.g., pig) associated with words embedded in primes (e.g., hamster) indexed activation of the embedded words (e.g., ham). When the listening conditions were optimal, isolated embedded words (e.g., ham) primed their targets in all six conditions (Experiment 1a). Within carrier words (e.g., hamster), the same set of embedded words produced priming only when they were at the beginning or comprised a large proportion of the carrier word (Experiment 1b). When the listening conditions were made suboptimal by expanding or compressing the primes, significant priming was found for isolated embedded words (Experiment 2a), but no priming was produced when the carrier words were compressed/expanded (Experiment 2b). Similarly, priming was eliminated when the carrier words were presented with one segment replaced by noise (Experiment 3). When cognitive load was imposed, priming for embedded words was again found when they were presented in isolation (Experiment 4a), but not when they were embedded in the carrier words (Experiment 4b). The results suggest that both embedded position and proportion play important roles in the activation of embedded words, but that such activation only occurs under unusually good listening conditions.

  6. The Super-GUT CMSSM Revisited

    CERN Document Server

    Ellis, John

    2016-01-01

    We revisit minimal supersymmetric SU(5) grand unification (GUT) models in which the soft supersymmetry-breaking parameters of the minimal supersymmetric Standard Model (MSSM) are universal at some input scale, $M_{in}$, above the supersymmetric gauge coupling unification scale, $M_{GUT}$. As in the constrained MSSM (CMSSM), we assume that the scalar masses and gaugino masses have common values, $m_0$ and $m_{1/2}$ respectively, at $M_{in}$, as do the trilinear soft supersymmetry-breaking parameters $A_0$. Going beyond previous studies of such a super-GUT CMSSM scenario, we explore the constraints imposed by the lower limit on the proton lifetime and the LHC measurement of the Higgs mass, $m_h$. We find regions of $m_0$, $m_{1/2}$, $A_0$ and the parameters of the SU(5) superpotential that are compatible with these and other phenomenological constraints such as the density of cold dark matter, which we assume to be provided by the lightest neutralino. Typically, these allowed regions appear for $m_0$ and $m_{1/...

  7. Searle's"Dualism Revisited"

    Energy Technology Data Exchange (ETDEWEB)

    P., Henry

    2008-11-20

    A recent article in which John Searle claims to refute dualism is examined from a scientific perspective. John Searle begins his recent article 'Dualism Revisited' by stating his belief that the philosophical problem of consciousness has a scientific solution. He then claims to refute dualism. It is therefore appropriate to examine his arguments against dualism from a scientific perspective. Scientific physical theories contain two kinds of descriptions: (1) Descriptions of our empirical findings, expressed in an every-day language that allows us communicate to each other our sensory experiences pertaining to what we have done and what we have learned; and (2) Descriptions of a theoretical model, expressed in a mathematical language that allows us to communicate to each other certain ideas that exist in our mathematical imaginations, and that are believed to represent, within our streams of consciousness, certain aspects of reality that we deem to exist independently of their being perceived by any human observer. These two parts of our scientific description correspond to the two aspects of our general contemporary dualistic understanding of the total reality in which we are imbedded, namely the empirical-mental aspect and the theoretical-physical aspect. The duality question is whether this general dualistic understanding of ourselves should be regarded as false in some important philosophical or scientific sense.

  8. Revisiting the relaxation dynamics of isolated pyrrole

    Energy Technology Data Exchange (ETDEWEB)

    Montero, Raúl; Ovejas, Virginia; Fernández-Fernández, Marta; Longarte, Asier, E-mail: asier.longarte@ehu.es [Departamento de Química Física, Universidad del País Vasco (UPV/EHU), Apart. 644, 48080 Bilbao (Spain); Peralta Conde, Álvaro [Centro de Láseres Pulsados (CLPU), Edificio M3, Parque Científico, 37185 Villamayor (Spain)

    2014-07-07

    Herein, the interpretation of the femtosecond-scale temporal evolution of the pyrrole ion signal, after excitation in the 267–217 nm interval, recently published by our group [R. Montero, A. Peralta Conde, V. Ovejas, M. Fernández-Fernández, F. Castaño, J. R. Vázquez de Aldana, and A. Longarte, J. Chem. Phys.137, 064317 (2012)] is re-visited. The observation of a shift in the pyrrole{sup +} transient respect to zero delay reference, initially attributed to ultrafast dynamics on the πσ{sup *} type state (3s a{sub 1} ← π 1a{sub 2}), is demonstrated to be caused by the existence of pump + probe populated states, along the ionization process. The influence of these resonances in pump-prone ionization experiments, when multi-photon probes are used, and the significance of a proper zero-time reference, is discussed. The possibility of preparing the πσ{sup *} state by direct excitation is investigated by collecting 1 + 1 photoelectron spectra, at excitation wavelengths ranging from 255 to 219 nm. No conclusive evidences of ionization through this state are found.

  9. Spin-orbit evolution of Mercury revisited

    CERN Document Server

    Noyelles, Benoit; Makarov, Valeri; Efroimsky, Michael

    2013-01-01

    Mercury is a peculiar case, in that it is locked into the 3:2 spin-orbit resonance. Its rotation period, 58 days, is exactly two thirds of its orbital period. It is accepted that the eccentricity of Mercury (0.206) favours the trapping into this resonance. More controversial is how the capture took place. A recent study by Makarov has shown that entrapment into this resonance is certain if the eccentricity is larger than 0.2, provided that we use a realistic tidal model, based on the Darwin-Kaula expansion of the tidal torque, including both the elastic rebound and anelastic creep of solids. We here revisit the scenario of Mercury's capture into the supersynchronous spin-orbit resonances. The study is based on a realistic model of tidal friction in solids, that takes into account the rheology and the self-gravitation of the planet. Developed in Efroimsky, it was employed by Makarov et al. to determine the likely spin state of the planet GJ581d, with its eccentricity evolution taken into account. It was also u...

  10. [What mirror neurons have revealed: revisited].

    Science.gov (United States)

    Murata, Akira; Maeda, Kazutaka

    2014-06-01

    The first paper on mirror neurons was published in 1992. In the span of over two decades since then, much knowledge about the relationship between social cognitive function and the motor control system has been accumulated. Direct matching of visual actions and their corresponding motor representations is the most important functional property of mirror neuron. Many studies have emphasized intrinsic simulation as a core concept for mirror neurons. Mirror neurons are thought to play a role in social cognitive function. However, the function of mirror neurons in the macaque remains unclear, because such cognitive functions are limited or lacking in macaque monkeys. It is therefore important to discuss these neurons in the context of motor function. Rizzolatti and colleagues have stressed that the most important function of mirror neurons in macaques is recognition of actions performed by other individuals. I suggest that mirror neurons in the Macaque inferior pariental lobule might be correlated with body schema. In the parieto-premotor network, matching of corollary discharge and actual sensory feedback is an essential neuronal operation. Recently, neurons showing mirror properties were found in some cortical areas outside the mirror neuron system. The current work would revisit the outcomes of mirror neuron studies to discuss the function of mirror neurons in the monkey.

  11. Revisiting the Anatomy of the Living Heart.

    Science.gov (United States)

    Mori, Shumpei; Spicer, Diane E; Anderson, Robert H

    2016-01-01

    An understanding of the complexity of cardiac anatomy is required by all who seek, in the setting of cardiac disease, to interpret the images confronting them. Although the mysteries of cardiac structure have been extensively addressed, significant gaps continue to exist between the descriptions provided by morphologists and by those working in the clinical setting. In part, this reflects the limitations in providing 3D visualization of such a complicated organ. Current 3D imaging technology now permits visualization of the cardiac components using datasets obtained in the living individual. These advances, furthermore, demonstrate the anatomy in the setting of the heart as imaged within the thorax. It has been failure to describe the heart as it lies within the thorax that remains a major deficiency of many morphologists relying on the dissecting room to provide the gold standard. Describing the heart in attitudinally appropriate fashion, a basic rule of clinical anatomy, creates the necessary bridges between anatomists and clinicians. The rapid progression of cardiac interventional techniques, furthermore, emphasizes the need to revisit cardiac anatomy using a multidisciplinary approach. In this review, therefore, we illustrate the advantages of an attitudinally correct approach to cardiac anatomy. We then focus on the morphology of the arterial roots, revealing the accuracy that can now be achieved by clinicians using datasets obtained during life.

  12. Seed dispersal effectiveness revisited: a conceptual review.

    Science.gov (United States)

    Schupp, Eugene W; Jordano, Pedro; Gómez, José María

    2010-10-01

    Growth in seed dispersal studies has been fast-paced since the seed disperser effectiveness (SDE) framework was developed 17 yr ago. Thus, the time is ripe to revisit the framework in light of accumulated new insight. Here, we first present an overview of the framework, how it has been applied, and what we know and do not know. We then introduce the SDE landscape as the two-dimensional representation of the possible combinations of the quantity and the quality of dispersal and with elevational contours representing isoclines of SDE. We discuss the structure of disperser assemblages on such landscapes. Following this we discuss recent advances and ideas in seed dispersal in the context of their impacts on SDE. Finally, we highlight a number of emerging issues that provide insight into SDE. Overall, the SDE framework successfully captures the complexities of seed dispersal. We advocate an expanded use of the term dispersal encompassing the multiple recruitment stages from fruit to adult. While this entails difficulties in estimating SDE, it is a necessary expansion if we are to understand the central relevance of seed dispersal in plant ecology and evolution.

  13. Hyperinflation in Brazil, Israel, and Nicaragua revisited

    Science.gov (United States)

    Szybisz, Martín A.; Szybisz, Leszek

    2017-01-01

    The aim of the present work is to address the description of hyperinflation regimens in economy. The spirals of hyperinflation developed in Brazil, Israel, and Nicaragua are revisited. This new analysis of data indicates that the episodes occurred in Brazil and Nicaragua can be understood within the frame of the model available in the literature, which is based on a nonlinear feedback (NLF) characterized by an exponent β > 0. In the NLF model the accumulated consumer price index carries a finite time singularity of the type 1 /(tc - t) (1 - β) / β determining a critical time tc at which the economy would crash. It is shown that in the case of Brazil the entire episode cannot be described with a unique set of parameters because the time series was strongly affected by a change of policy. This fact gives support to the "so called" Lucas critique, who stated that model's parameters usually change once policy changes. On the other hand, such a model is not able to provide any tc in the case of the weaker hyperinflation occurred in Israel. It is shown that in this case the fit of data yields β → 0. This limit leads to the linear feedback formulation which does not predict any tc. An extension for the NLF model is suggested.

  14. Revisiting the cardiometabolic relevance of serum amylase

    Directory of Open Access Journals (Sweden)

    Munakata Hiromi

    2011-10-01

    Full Text Available Abstract Background The pancreas has dual functions as a digestive organ and as an endocrine organ, by secreting digestive enzymes and endocrine hormones. Some early studies have revealed that serum amylase levels are lower in individuals with chronic pancreatitis, severe long-term type 2 diabetes or type 1 diabetes. Regarding this issue, we recently reported that low serum amylase levels were associated with metabolic syndrome and diabetes in asymptomatic adults. In the light of this, we further investigated the fundamental relationship between serum amylase and cardiometabolic aspects by reanalyzing previous data which comprised subjects without diabetes treatment with oral hypoglycemic drugs or insulin (n = 2,344. Findings Serum amylase was inversely correlated with body mass index independently of age. Higher serum amylase levels were noted in older subjects aged 55 years old or more (n = 1,114 than in younger subjects (P P Conclusions Revisiting the cardiometabolic relevance of serum amylase may yield novel insight not only into glucose homeostasis and metabolic abnormalities related to obesity, but also possibly carbohydrate absorption in the gut.

  15. Coal consumption and economic growth revisited

    Energy Technology Data Exchange (ETDEWEB)

    Wolde-Rufael, Yemane [135 Carnwath Road, London SW6 3HR (United Kingdom)

    2010-01-15

    This paper revisits the causal relationship between coal consumption and real GDP for six major coal consuming countries for the period 1965-2005 within a vector autoregressive (VAR) framework by including capital and labour as additional variables. Applying a modified version of the Granger causality test due to Toda and Yamamoto [Toda HY, Yamamoto T. Statistical inference in vector autoregressions with possibly integrated process. J Econom 1995;66:225-50], we found a unidirectional causality running from coal consumption to economic growth in India and Japan while the opposite causality running from economic growth to coal consumption was found in China and South Korea. In contrast there was a bi-directional causality running between economic growth and coal consumption in South Africa and the United States. Variance decomposition analysis seems to confirm our Granger causality results. The policy implication is that measures adopted to mitigate the adverse effects of coal consumption may be taken without harming economic growth in China and South Korea. In contrast, for the remaining four countries conservation measures can harm economic growth. (author)

  16. Targeting Cancer Metabolism - Revisiting the Warburg Effects

    Science.gov (United States)

    Tran, Quangdon; Lee, Hyunji; Park, Jisoo; Kim, Seon-Hwan; Park, Jongsun

    2016-01-01

    After more than half of century since the Warburg effect was described, this atypical metabolism has been standing true for almost every type of cancer, exhibiting higher glycolysis and lactate metabolism and defective mitochondrial ATP production. This phenomenon had attracted many scientists to the problem of elucidating the mechanism of, and reason for, this effect. Several models based on oncogenic studies have been proposed, such as the accumulation of mitochondrial gene mutations, the switch from oxidative phosphorylation respiration to glycolysis, the enhancement of lactate metabolism, and the alteration of glycolytic genes. Whether the Warburg phenomenon is the consequence of genetic dysregulation in cancer or the cause of cancer remains unknown. Moreover, the exact reasons and physiological values of this peculiar metabolism in cancer remain unclear. Although there are some pharmacological compounds, such as 2-deoxy-D-glucose, dichloroacetic acid, and 3-bromopyruvate, therapeutic strategies, including diet, have been developed based on targeting the Warburg effect. In this review, we will revisit the Warburg effect to determine how much scientists currently understand about this phenomenon and how we can treat the cancer based on targeting metabolism. PMID:27437085

  17. The super-GUT CMSSM revisited

    Energy Technology Data Exchange (ETDEWEB)

    Ellis, John [King' s College London, Theoretical Physics and Cosmology Group, Department of Physics, London (United Kingdom); CERN, Theoretical Physics Department, Geneva (Switzerland); Evans, Jason L. [KIAS, School of Physics, Seoul (Korea, Republic of); Mustafayev, Azar; Nagata, Natsumi; Olive, Keith A. [University of Minnesota, William I. Fine Theoretical Physics Institute, School of Physics and Astronomy, Minneapolis, MN (United States)

    2016-11-15

    We revisit minimal supersymmetric SU(5) grand unification (GUT) models in which the soft supersymmetry-breaking parameters of the minimal supersymmetric Standard Model (MSSM) are universal at some input scale, M{sub in}, above the supersymmetric gauge-coupling unification scale, M{sub GUT}. As in the constrained MSSM (CMSSM), we assume that the scalar masses and gaugino masses have common values, m{sub 0} and m{sub 1/2}, respectively, at M{sub in}, as do the trilinear soft supersymmetry-breaking parameters A{sub 0}. Going beyond previous studies of such a super-GUT CMSSM scenario, we explore the constraints imposed by the lower limit on the proton lifetime and the LHC measurement of the Higgs mass, m{sub h}. We find regions of m{sub 0}, m{sub 1/2}, A{sub 0} and the parameters of the SU(5) superpotential that are compatible with these and other phenomenological constraints such as the density of cold dark matter, which we assume to be provided by the lightest neutralino. Typically, these allowed regions appear for m{sub 0} and m{sub 1/2} in the multi-TeV region, for suitable values of the unknown SU(5) GUT-scale phases and superpotential couplings, and with the ratio of supersymmetric Higgs vacuum expectation values tanβ

  18. The Fractional Langevin Equation: Brownian Motion Revisited

    CERN Document Server

    Mainardi, Francesco

    2008-01-01

    We have revisited the Brownian motion on the basis of the fractional Langevin equation which turns out to be a particular case of the generalized Langevin equation introduced by Kubo on 1966. The importance of our approach is to model the Brownian motion more realistically than the usual one based on the classical Langevin equation, in that it takes into account also the retarding effects due to hydrodynamic backflow, i.e. the added mass and the Basset memory drag. On the basis of the two fluctuation-dissipation theorems and of the techniques of the Fractional Calculus we have provided the analytical expressions of the correlation functions (both for the random force and the particle velocity) and of the mean squared particle displacement. The random force has been shown to be represented by a superposition of the usual white noise with a "fractional" noise. The velocity correlation function is no longer expressed by a simple exponential but exhibits a slower decay, proportional to $t^{-3/2}$ as $t \\to \\infty...

  19. The drive revisited: Mastery and satisfaction.

    Science.gov (United States)

    Denis, Paul

    2016-06-01

    Starting from the theory of the libido and the notions of the experience of satisfaction and the drive for mastery introduced by Freud, the author revisits the notion of the drive by proposing the following model: the drive takes shape in the combination of two currents of libidinal cathexis, one which takes the paths of the 'apparatus for obtaining mastery' (the sense-organs, motricity, etc.) and strives to appropriate the object, and the other which cathects the erotogenic zones and the experience of satisfaction that is experienced through stimulation in contact with the object. The result of this combination of cathexes constitutes a 'representation', the subsequent evocation of which makes it possible to tolerate for a certain period of time the absence of a satisfying object. On the basis of this conception, the author distinguishes the representations proper, vehicles of satisfaction, from imagos and traumatic images which give rise to excitation that does not link up with the paths taken by the drives. This model makes it possible to conciliate the points of view of the advocates of 'object-seeking' and of those who give precedence to the search for pleasure, and, further, to renew our understanding of object-relations, which can then be approached from the angle of their relations to infantile sexuality. Destructiveness is considered in terms of "mastery madness" and not in terms of the late Freudian hypothesis of the death drive.

  20. Revisiting the argument from fetal potential

    Directory of Open Access Journals (Sweden)

    Manninen Bertha

    2007-05-01

    Full Text Available Abstract One of the most famous, and most derided, arguments against the morality of abortion is the argument from potential, which maintains that the fetus' potential to become a person and enjoy the valuable life common to persons, entails that its destruction is prima facie morally impermissible. In this paper, I will revisit and offer a defense of the argument from potential. First, I will criticize the classical arguments proffered against the importance of fetal potential, specifically the arguments put forth by philosophers Peter Singer and David Boonin, by carefully unpacking the claims made in these arguments and illustrating why they are flawed. Secondly, I will maintain that fetal potential is morally relevant when it comes to the morality of abortion, but that it must be accorded a proper place in the argument. This proper place, however, cannot be found until we first answer a very important and complex question: we must first address the issue of personal identity, and when the fetus becomes the type of being who is relevantly identical to a future person. I will illustrate why the question of fetal potential can only be meaningfully addressed after we have first answered the question of personal identity and how it relates to the human fetus.

  1. Pair Production Constraints on Superluminal Neutrinos Revisited

    Energy Technology Data Exchange (ETDEWEB)

    Brodsky, Stanley J.; /SLAC; Gardner, Susan; /Kentucky U.

    2012-02-16

    We revisit the pair creation constraint on superluminal neutrinos considered by Cohen and Glashow in order to clarify which types of superluminal models are constrained. We show that a model in which the superluminal neutrino is effectively light-like can evade the Cohen-Glashow constraint. In summary, any model for which the CG pair production process operates is excluded because such timelike neutrinos would not be detected by OPERA or other experiments. However, a superluminal neutrino which is effectively lightlike with fixed p{sup 2} can evade the Cohen-Glashow constraint because of energy-momentum conservation. The coincidence involved in explaining the SN1987A constraint certainly makes such a picture improbable - but it is still intrinsically possible. The lightlike model is appealing in that it does not violate Lorentz symmetry in particle interactions, although one would expect Hughes-Drever tests to turn up a violation eventually. Other evasions of the CG constraints are also possible; perhaps, e.g., the neutrino takes a 'short cut' through extra dimensions or suffers anomalous acceleration in matter. Irrespective of the OPERA result, Lorentz-violating interactions remain possible, and ongoing experimental investigation of such possibilities should continue.

  2. Scaling Relationships for Spherical Polymer Brushes Revisited.

    Science.gov (United States)

    Chen, Guang; Li, Hao; Das, Siddhartha

    2016-06-16

    In this short paper, we revisit the scaling relationships for spherical polymer brushes (SPBs), i.e., polymer brushes grafted to rigid, spherical particles. Considering that the brushes can be described to be encased in a series of hypothetical spherical blobs, we identify significant physical discrepancies in the model of Daoud and Cotton (Journal of Physics, 1982), which is considered to be the state of the art in scaling modeling of SPBs. We establish that the "brush" configuration of the polymer molecules forming the SPBs is possible only if the swelling ratio (which is the ratio of the end-to-end length of the blob-encased polymer segment to the corresponding coil-like polymer segment) is always less than unity-a notion that has been erroneously overlooked in the model of Daoud and Cotton. We also provide new scaling arguments that (a) establish this swelling (or more appropriately shrinking) ratio as a constant (less than unity) for the case of "good" solvent, (b) recover the scaling predictions for blob dimension and monomer number and monomer concentration distributions within the blob, and

  3. Revisiting the Survival Mnemonic Effect in Children

    Directory of Open Access Journals (Sweden)

    Josefa N. S. Pand Eirada

    2014-04-01

    Full Text Available The survival processing paradigm is designed to explore the adaptive nature of memory functioning. The mnemonic advantage of processing information in fitness-relevant contexts, as has been demonstrated using this paradigm, is now well established, particularly in young adults; this phenomenon is often referred to as the “survival processing effect.” In the current experiment, we revisited the investigation of this effect in children and tested it in a new cultural group, using a procedure that differs from the existing studies with children. A group of 40 Portuguese children rated the relevance of unrelated words to a survival and a new moving scenario. This encoding task was followed by a surprise free-recall task. Akin to what is typically found, survival processing produced better memory performance than the control condition (moving. These data put on firmer ground the idea that a mnemonic tuning to fitness-relevant encodings is present early in development. The theoretical importance of this result to the adaptive memory literature is discussed, as well as potential practical implications of this kind of approach to the study of memory in children.

  4. The problem Of muscle hypertrophy: Revisited.

    Science.gov (United States)

    Buckner, Samuel L; Dankel, Scott J; Mattocks, Kevin T; Jessee, Matthew B; Mouser, J Grant; Counts, Brittany R; Loenneke, Jeremy P

    2016-12-01

    In this paper we revisit a topic originally discussed in 1955, namely the lack of direct evidence that muscle hypertrophy from exercise plays an important role in increasing strength. To this day, long-term adaptations in strength are thought to be primarily contingent on changes in muscle size. Given this assumption, there has been considerable attention placed on programs designed to allow for maximization of both muscle size and strength. However, the conclusion that a change in muscle size affects a change in strength is surprisingly based on little evidence. We suggest that these changes may be completely separate phenomena based on: (1) the weak correlation between the change in muscle size and the change in muscle strength after training; (2) the loss of muscle mass with detraining, yet a maintenance of muscle strength; and (3) the similar muscle growth between low-load and high-load resistance training, yet divergent results in strength. Muscle Nerve 54: 1012-1014, 2016. © 2016 Wiley Periodicals, Inc.

  5. Early-Transition Output Decline Revisited

    Directory of Open Access Journals (Sweden)

    Crt Kostevc

    2016-05-01

    Full Text Available In this paper we revisit the issue of aggregate output decline that took place in the early transition period. We propose an alternative explanation of output decline that is applicable to Central- and Eastern-European countries. In the first part of the paper we develop a simple dynamic general equilibrium model that builds on work by Gomulka and Lane (2001. In particular, we consider price liberalization, interpreted as elimination of distortionary taxation, as a trigger of the output decline. We show that price liberalization in interaction with heterogeneous adjustment costs and non-employment benefits lead to aggregate output decline and surge in wage inequality. While these patterns are consistent with actual dynamics in CEE countries, this model cannot generate output decline in all sectors. Instead sectors that were initially taxed even exhibit output growth. Thus, in the second part we consider an alternative general equilibrium model with only one production sector and two types of labor and distortion in a form of wage compression during the socialist era. The trigger for labor mobility and consequently output decline is wage liberalization. Assuming heterogeneity of workers in terms of adjustment costs and non-employment benefits can explain output decline in all industries.

  6. Rotating embedded black holes: Entropy and Hawking's radiation

    OpenAIRE

    2004-01-01

    In this paper we derive a class of rotating embedded black holes. Then we study Hawking's radiation effects on these embedded black holes. The surface gravity, entropy and angular velocity are given for each of these black holes.

  7. Hardware mechanisms and their implementations for secure embedded systems

    OpenAIRE

    QIN, JIAN

    2005-01-01

    Security issues appearing in one or another form become a requirement for an increasing number of embedded systems. Those systems, which will be used to capture, store, manipulate, and access data with a sensitive nature, have posed several unique and urgent challenges. The challenges to those embedded system require new approaches to security covering all aspects of embedded system design from architecture, implementation to the methodology. However, security is always treated by embedded sy...

  8. Embeddings of the black holes in a flat space

    CERN Document Server

    Sheykin, A A; Paston, S A

    2014-01-01

    We study the explicit embeddings of static black holes. We obtain two new minimal embeddings of the Schwarzchild-de Sitter metric which smoothly cover both horizons of this metric. The lines of time for these embeddings are more complicated than hyperbolas. Also we shortly discuss the possibility of using non-hyperbolic embeddings for calculation of the black hole Hawking temperature in the Deser and Levin approach.

  9. Synchronous correlation matrices and Connes’ embedding conjecture

    Energy Technology Data Exchange (ETDEWEB)

    Dykema, Kenneth J., E-mail: kdykema@math.tamu.edu [Department of Mathematics, Texas A& M University, College Station, Texas 77843-3368 (United States); Paulsen, Vern, E-mail: vern@math.uh.edu [Department of Mathematics, University of Houston, Houston, Texas 77204 (United States)

    2016-01-15

    In the work of Paulsen et al. [J. Funct. Anal. (in press); preprint arXiv:1407.6918], the concept of synchronous quantum correlation matrices was introduced and these were shown to correspond to traces on certain C*-algebras. In particular, synchronous correlation matrices arose in their study of various versions of quantum chromatic numbers of graphs and other quantum versions of graph theoretic parameters. In this paper, we develop these ideas further, focusing on the relations between synchronous correlation matrices and microstates. We prove that Connes’ embedding conjecture is equivalent to the equality of two families of synchronous quantum correlation matrices. We prove that if Connes’ embedding conjecture has a positive answer, then the tracial rank and projective rank are equal for every graph. We then apply these results to more general non-local games.

  10. Structure properties of evolutionary spatially embedded networks

    Science.gov (United States)

    Hui, Z.; Li, W.; Cai, X.; Greneche, J. M.; Wang, Q. A.

    2013-04-01

    This work is a modeling of evolutionary networks embedded in one or two dimensional configuration space. The evolution is based on two attachments depending on degree and spatial distance. The probability for a new node n to connect with a previous node i at distance r follows aki∑jkj+(1-a)rni-α∑jrnj-α, where ki is the degree of node i, α and a are tunable parameters. In spatial driven model (a=0), the spatial distance distribution follows the power-law feature. The mean topological distance l and the clustering coefficient C exhibit phase transitions at same critical values of α which change with the dimensionality d of the embedding space. When a≠0, the degree distribution follows the "shifted power law" (SPL) which interpolates between exponential and scale-free distributions depending on the value of a.

  11. On closed embeddings of free topological algebras

    CERN Document Server

    Banakh, T

    2012-01-01

    Let $\\mathcal K$ be a complete quasivariety of completely regular universal topological algebras of continuous signature $\\mathcal E$ (which means that $\\mathcal K$ is closed under taking subalgebras, Cartesian products, and includes all completely regular topological $\\mathcal E$-algebras algebraically isomorphic to members of $\\mathcal K$). For a topological space $X$ by $F(X)$ we denote the free universal $\\mathcal E$-algebra over $X$ in the class $\\mathcal K$. Using some extension properties of the Hartman-Mycielski construction we prove that for a closed subspace $X$ of a metrizable (more generally, stratifiable) space $Y$ the induced homomorphism $F(X)\\to F(Y)$ between the respective free universal algebras is a closed topological embedding. This generalizes one result of V.Uspenskii concerning embeddings of free topological groups.

  12. Metamaterial Embedded Wearable Rectangular Microstrip Patch Antenna

    Directory of Open Access Journals (Sweden)

    J. G. Joshi

    2012-01-01

    Full Text Available This paper presents an indigenous low-cost metamaterial embedded wearable rectangular microstrip patch antenna using polyester substrate for IEEE 802.11a WLAN applications. The proposed antenna resonates at 5.10 GHz with a bandwidth and gain of 97 MHz and 4.92 dBi, respectively. The electrical size of this antenna is 0.254λ×0.5λ. The slots are cut in rectangular patch to reduce the bending effect. This leads to mismatch the impedance at WLAN frequency band; hence, a metamaterial square SRR is embedded inside the slot. A prototype antenna has been fabricated and tested, and the measured results are presented in this paper. The simulated and measured results of the proposed antenna are found to be in good agreement. The bending effect on the performance of this antenna is experimentally verified.

  13. Engineering embedded systems physics, programs, circuits

    CERN Document Server

    Hintenaus, Peter

    2015-01-01

    This is a textbook for graduate and final-year-undergraduate computer-science and electrical-engineering students interested in the hardware and software aspects of embedded and cyberphysical systems design. It is comprehensive and self-contained, covering everything from the basics to case-study implementation. Emphasis is placed on the physical nature of the problem domain and of the devices used. The reader is assumed to be familiar on a theoretical level with mathematical tools like ordinary differential equation and Fourier transforms. In this book these tools will be put to practical use. Engineering Embedded Systems begins by addressing basic material on signals and systems, before introducing to electronics. Treatment of digital electronics accentuating synchronous circuits and including high-speed effects proceeds to micro-controllers, digital signal processors and programmable logic. Peripheral units and decentralized networks are given due weight. The properties of analog circuits and devices like ...

  14. Excited States in Solution through Polarizable Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus; Aidas, Kestutis; Kongsted, Jacob

    2010-01-01

    functional theory which we denote the PE-DFT method. It has been implemented in combination with time-dependent quantum mechanical linear and nonlinear response techniques, thus allowing for assessment of electronic excitation processes and dynamic ground- and excited-state molecular properties using......We present theory and implementation of an advanced quantum mechanics/molecular mechanics (QM/MM) approach using a fully self-consistent polarizable embedding (PE) scheme. It is a polarizable layered model designed for effective yet accurate inclusion of an anisotropic medium in a quantum...... mechanical calculation. The polarizable embedding potential is described by an atomistic representation including terms up to localized octupoles and anisotropic polarizabilities. It is generally applicable to any quantum chemical description but is here implemented for the case of Kohn−Sham density...

  15. Ensuring message embedding in wet paper steganography

    CERN Document Server

    Augot, Daniel; Fontaine, Caroline

    2011-01-01

    Syndrome coding has been proposed by Crandall in 1998 as a method to stealthily embed a message in a cover-medium through the use of bounded decoding. In 2005, Fridrich et al. introduced wet paper codes to improve the undetectability of the embedding by nabling the sender to lock some components of the cover-data, according to the nature of the cover-medium and the message. Unfortunately, almost all existing methods solving the bounded decoding syndrome problem with or without locked components have a non-zero probability to fail. In this paper, we introduce a randomized syndrome coding, which guarantees the embedding success with probability one. We analyze the parameters of this new scheme in the case of perfect codes.

  16. Joint Grid System Used in Embedding Technique

    Institute of Scientific and Technical Information of China (English)

    李孝伟; 范绪箕

    2003-01-01

    The joint grid system, which consists of the developed collar grid, the virtual grid and other grids, wasused in the embedding technique to solve the problem of finding interpolating cells of the internal and externalboundary points near the joint regions. With different boundary plane generated along different fixed surface, thecollar grid obtained using hyperbolic partial equations can ensure to generate high-quality grids and to provide realinterpolating cells for the boundary points in the blanking regions. The virtual grid was used to convert solid wallboundary conditions into an interface condition, however, no fluid flow computations were conducted within thevirtual grid. The computational result of body-strake-wing shows that the current developed embedding techniquewith joint grid system can effectively treat the geometry and can more accurately predict the flow over complexcon-figuration with intersecting surfaces.

  17. Global Models for Embedded, Accreting Protostellar Disks

    CERN Document Server

    Kratter, Kaitlin M; Krumholz, Mark R

    2007-01-01

    Most analytic work to date on protostellar disks has focused on disks in isolation from their environments. However, observations are now beginning to probe the earliest, most embedded phases of star formation, during which disks are rapidly accreting from their parent cores and cannot be modeled in isolation. We present a simple, one-zone model of protostellar accretion disks with high mass infall rates. Our model combines a self-consistent calculation of disk temperatures with an approximate treatment of angular momentum transport via several mechanisms. We use this model to survey the properties of protostellar disks across a wide range of stellar masses and evolutionary times, and make predictions for disks' masses, sizes, spiral structure, and fragmentation that will be directly testable by future large-scale surveys of deeply embedded disks. We define a dimensionless accretion-rotation parameter which, in conjunction with the disk's temperature, controls the disk evolution. We track the dominant mode of...

  18. Global embeddings for branes at toric singularities

    CERN Document Server

    Balasubramanian, Vijay; Braun, Volker; García-Etxebarria, Iñaki

    2012-01-01

    We describe how local toric singularities, including the Toric Lego construction, can be embedded in compact Calabi-Yau manifolds. We study in detail the addition of D-branes, including non-compact flavor branes as typically used in semi-realistic model building. The global geometry provides constraints on allowable local models. As an illustration of our discussion we focus on D3 and D7-branes on (the partially resolved) (dP0)^3 singularity, its embedding in a specific Calabi-Yau manifold as a hypersurface in a toric variety, the related type IIB orientifold compactification, as well as the corresponding F-theory uplift. Our techniques generalize naturally to complete intersections, and to a large class of F-theory backgrounds with singularities.

  19. Retropath: automated pipeline for embedded metabolic circuits.

    Science.gov (United States)

    Carbonell, Pablo; Parutto, Pierre; Baudier, Claire; Junot, Christophe; Faulon, Jean-Loup

    2014-08-15

    Metabolic circuits are a promising alternative to other conventional genetic circuits as modular parts implementing functionalities required for synthetic biology applications. To date, metabolic design has been mainly focused on production circuits. Emergent applications such as smart therapeutics, however, require circuits that enable sensing and regulation. Here, we present RetroPath, an automated pipeline for embedded metabolic circuits that explores the circuit design space from a given set of specifications and selects the best circuits to implement based on desired constraints. Synthetic biology circuits embedded in a chassis organism that are capable of controlling the production, processing, sensing, and the release of specific molecules were enumerated in the metabolic space through a standard procedure. In that way, design and implementation of applications such as therapeutic circuits that autonomously diagnose and treat disease, are enabled, and their optimization is streamlined.

  20. Measuring the dimension of partially embedded networks

    CERN Document Server

    Kondor, Dániel; Csabai, István; Vattay, Gábor

    2013-01-01

    Scaling phenomena have been intensively studied during the past decade in the context of complex networks. As part of these works, recently novel methods have appeared to measure the dimension of abstract and spatially embedded networks. In this paper we propose a new dimension measurement method for networks, which does not require global knowledge on the embedding of the nodes, instead it exploits link-wise information (link lengths, link delays or other physical quantities). Our method can be regarded as a generalization of the spectral dimension, that grasps the network's large-scale structure through local observations made by a random walker while traversing the links. We apply the presented method to synthetic and real-world networks, including road maps, the Internet infrastructure and the Gowalla geosocial network. We analyze the theoretically and empirically designated case when the length distribution of the links has the form P(r) ~ 1/r. We show that while previous dimension concepts are not appli...

  1. Dynamic temperature measurements with embedded optical sensors.

    Energy Technology Data Exchange (ETDEWEB)

    Dolan, Daniel H.,; Seagle, Christopher T; Ao, Tommy

    2013-10-01

    This report summarizes LDRD project number 151365, \\Dynamic Temperature Measurements with Embedded Optical Sensors". The purpose of this project was to develop an optical sensor capable of detecting modest temperature states (<1000 K) with nanosecond time resolution, a recurring diagnostic need in dynamic compression experiments at the Sandia Z machine. Gold sensors were selected because the visible re ectance spectrum of gold varies strongly with temperature. A variety of static and dynamic measurements were performed to assess re ectance changes at di erent temperatures and pressures. Using a minimal optical model for gold, a plausible connection between static calibrations and dynamic measurements was found. With re nements to the model and diagnostic upgrades, embedded gold sensors seem capable of detecting minor (<50 K) temperature changes under dynamic compression.

  2. Embedded Zero -Tree Wavelet Based Image Steganography

    OpenAIRE

    Vijendra Rai; Jaishree Jain; Ajay Kr. Yadav; Sheshmani Yadav

    2012-01-01

    Image steganography using Discrete Wavelet Transform can attain very good results as compared to traditional methods, in this paper we discuss a method to embed digital watermark based on modifying frequency coefficient in discrete wavelet transform (DWT) domain. This method uses the embedded zero-tree (EZW) algorithm to insert a watermark in discrete wavelet transform domain. EZW is an effective image compression algorithm, having property that image in the bit stream are generated in order...

  3. The MNC as an Externally Embedded Organization

    DEFF Research Database (Denmark)

    Nell, Phillip Christopher; Ambos, Björn; Schlegelmilch, Bodo B.

    2011-01-01

    MNCs have been conceptualized as differentiated networks that, in turn, are embedded in external networks. Previous research has predominantly focused on the embeddedness of established subsidiaries into their local environment, omitting to shed light on the phenomenon of headquarters linkages to...... more overlapping network ties when subsidiaries are high performers, hold important resources, operate in turbulent environments, and are closely connected to multinational actors as opposed to purely domestic firms....

  4. Automatic Labelling of Topics with Neural Embeddings

    OpenAIRE

    Bhatia, Shraey; Lau, Jey Han; Baldwin, Timothy

    2016-01-01

    Topics generated by topic models are typically represented as list of terms. To reduce the cognitive overhead of interpreting these topics for end-users, we propose labelling a topic with a succinct phrase that summarises its theme or idea. Using Wikipedia document titles as label candidates, we compute neural embeddings for documents and words to select the most relevant labels for topics. Compared to a state-of-the-art topic labelling system, our methodology is simpler, more efficient, and ...

  5. Integrated Design Tools for Embedded Control Systems

    OpenAIRE

    Jovanovic, D.S.; Hilderink, G.H.; Broenink, Johannes F.; Karelse, F.

    2001-01-01

    Currently, computer-based control systems are still being implemented using the same techniques as 10 years ago. The purpose of this project is the development of a design framework, consisting of tools and libraries, which allows the designer to build high reliable heterogeneous real-time embedded systems in a very short time at a fraction of the present day costs. The ultimate focus of current research is on transformation control laws to efficient concurrent algorithms, with concerns about...

  6. Compressive Spectral Embedding: Sidestepping the SVD

    Science.gov (United States)

    2015-09-28

    rows of A into a k-dimensional space using the rows of E = [f(σ1)u1 f(σ2) u2 · · · f(σk)uk], for some function f(·). The embedding of the variable...random projections to compute an approximate histogram of the number of eigenvectors across different bands of the spectrum: [a, b] ⊆ [λmin, λmax]. 3

  7. Drill Embedded Nanosensors For Planetary Subsurface Exploration

    Science.gov (United States)

    Li, Jing

    2014-01-01

    We have developed a carbon nanotube (CNT) sensor for water vapor detection under Martian Conditions and the miniaturized electronics can be embedded in the drill bit for collecting sensor data and transmit it to a computer wirelessly.This capability will enable the real time measurement of ice during drilling. With this real time and in-situ measurement, subsurface ice detection can be easy, fast, precise and low cost.

  8. Design, implementation, and evaluation of the Resilient Smalltalk embedded platform

    DEFF Research Database (Denmark)

    Andersen, Jacob Robert; Bak, Lars; Grarup, Steffen

    2005-01-01

    Most microprocessors today are used in embedded systems and the percentage of microprocessors used for embedded systems is increasing. At the same time development of embedded systems is very resource-consuming among others due to the lack of support for incremental development and for support...

  9. Is embedding entailed in consumer valuation of food safety characteristics?

    DEFF Research Database (Denmark)

    Mørkbak, Morten Raun; Christensen, Tove; Gyrd-Hansen, Dorte;

    2011-01-01

    Consumers' preferences for food safety characteristics are investigated with a particular focus on the existence of an embedding effect. Embedding exists if consumer valuation of food safety is insensitive to scope. We conduct between-attribute external tests for embedding in two choice experiments...

  10. The Total Embedding Distributions of Cacti and Necklaces

    Institute of Scientific and Technical Information of China (English)

    Yi Chao CHEN; Yan Pei LIU; Tao WANG

    2006-01-01

    Total embedding distributions have been known for only a few classes of graphs. In this paper the total embedding distributions of the cacti and the necklaces are obtained. Furthermore we obtain the total embedding distributions of all graphs with maximum genus 1 by using the method of this paper.

  11. 47 CFR 10.440 - Embedded reference prohibition.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Embedded reference prohibition. 10.440 Section... Alert Message Requirements § 10.440 Embedded reference prohibition. A CMAS Alert Message processed by a Participating CMS Provider must not include an embedded Uniform Resource Locator (URL), which is a reference...

  12. Programming Embedded Systems With C and GNU Development Tools

    CERN Document Server

    Barr, Michael

    2009-01-01

    Whether you're writing your first embedded program, designing the latest generation of hand-held whatchamacalits, or managing the people who do, this book is for you. Programming Embedded Systems will help you develop the knowledge and skills you need to achieve proficiency with embedded software.

  13. On the injective tensor product of M-embedded spaces

    Directory of Open Access Journals (Sweden)

    T. S. S. R. K. Rao

    1993-05-01

    Full Text Available We exhibit classes of Banach spaces X which are M-embedded i.e., when X is canonically embedded in X**. X is an M-ideal in X**, for which the injective tensor product is again an M-embedded space.

  14. Revisiting the Role of Communication in Adolescent Intimate Partner Violence

    Science.gov (United States)

    Messinger, Adam M.; Rickert, Vaughn I.; Fry, Deborah A.; Lessel, Harriet; Davidson, Leslie L.

    2012-01-01

    A growing literature suggests that communication strategies can promote or inhibit intimate partner violence (IPV). Research on communication is still needed on a group ripe for early IPV intervention: high school-aged adolescents. This article revisits our previous analyses of young female reproductive clinic patients (Messinger, Davidson, &…

  15. The role of brand destination experience in determining revisit intention

    DEFF Research Database (Denmark)

    Mattsson, Jan; Barnes, Stuart; Sørensen, Flemming

    experience, which provides a more holistic and unified view of the brand destination. The research uses a logistic regression model to determine the role of satisfaction and brand experience in determining revisit intentions. The study also examines differences among subgroups and four brand experience sub...

  16. Keep Moving! Revisiting Thumbnails for Mobile Video Retrieval

    NARCIS (Netherlands)

    W. Hürst; C.G.M. Snoek; W.J. Spoel; M. Tomin

    2010-01-01

    Motivated by the increasing popularity of video on handheld devices and the resulting importance for effective video retrieval, this paper revisits the relevance of thumbnails in a mobile video retrieval setting. Our study indicates that users are quite able to handle and assess small thumbnails on

  17. Antidote for Zero Tolerance: Revisiting a "Reclaiming" School.

    Science.gov (United States)

    Farner, Conrad D.

    2002-01-01

    Reports on a revisit to the Frank Lloyd Wright Middle School, which implemented strategies to deal with disciplinary problems. The school continues to progress towards creating the type of reclaiming environment necessary to ensure the needs of all students. Strategies used include alternatives to zero tolerance policy; smaller teams of students;…

  18. The Polarized Structure Function $g_{2} A Lattice Study Revisited

    CERN Document Server

    Göckeler, M; Kürzinger, W; Oelrich, H; Rakow, P; Schierholz, G

    1999-01-01

    A recent lattice calculation of the spin-dependent structure function g_2 is revisited. It has been recognized that the twist-three operator, which gives rise to d_2, mixes non-perturbatively with operators of lower dimensions under renormalization. This changes the results substantially.

  19. Pockets of Participation: Revisiting Child-Centred Participation Research

    Science.gov (United States)

    Franks, Myfanwy

    2011-01-01

    This article revisits the theme of the clash of interests and power relations at work in participatory research which is prescribed from above. It offers a possible route toward solving conflict between adult-led research carried out by young researchers, funding requirements and organisational constraints. The article explores issues of…

  20. Assesment of mucoadhesion using small deformation rheology revisited

    DEFF Research Database (Denmark)

    Harloff-Helleberg, Stine; Vissing, Karina Juul; Nielsen, Hanne Mørck

    2017-01-01

    This work revisits the commonly used approach to assess mucoadhesion in drug delivery by small deformation rheology. The results show that biosimilar mucus serves as a more predictive mucus model system when compared to mucin suspensions. Data is fitted including error propagation, different from...

  1. Bohr’s ‘Light and Life’ revisited

    Science.gov (United States)

    Nussenzveig, H. M.

    2015-11-01

    I revisit Niels Bohr’s famous 1932 ‘Light and Life’ lecture, confronting it with current knowledge. Topics covered include: life origin and evolution, quantum mechanics and life, brain and mind, consciousness and free will, and light as a tool for biology, with special emphasis on optical tweezers and their contributions to biophysics. Specialized knowledge of biology is not assumed.

  2. Revisiting the Role of Communication in Adolescent Intimate Partner Violence

    Science.gov (United States)

    Messinger, Adam M.; Rickert, Vaughn I.; Fry, Deborah A.; Lessel, Harriet; Davidson, Leslie L.

    2012-01-01

    A growing literature suggests that communication strategies can promote or inhibit intimate partner violence (IPV). Research on communication is still needed on a group ripe for early IPV intervention: high school-aged adolescents. This article revisits our previous analyses of young female reproductive clinic patients (Messinger, Davidson, &…

  3. Intramolecular Amide Hydrolysis in N-Methylmaleamic Acid Revisited

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    The intramolecular amide hydrolysis of N-methylmaleamic acid have been revisited by use of density functional theory and inclusion of solvent effects. The results indicate that concerted reaction mechanism is favored over stepwise reaction mechanism. This is in agreement with the previous theoretical study. Sovlent effects have significant influence on the reaction barrier.

  4. Coccolithophores in Polar Waters: Papposphaera arctica HET and HOL revisited

    DEFF Research Database (Denmark)

    Thomsen, Helge Abildhauge; Heldal, Mikal; Østergaard, Jette B.

    2016-01-01

    It has been generally accepted based on the finding of combination coccospheres in field samples that Turrisphaera arctica and Papposphaera sarion are alternate life-cycle phases of a single species. However, while recently revisiting P. sarion it became evident that the Turrisphaera phase of thi...

  5. Dynamics of Shape Fluctuations of Quasi-spherical Vesicles Revisited

    DEFF Research Database (Denmark)

    Miao, L.; Lomholt, Michael Andersen; Kleis, J.

    2002-01-01

    In this paper, the dynamics of spontaneous shape fluctuations of a single, giant quasi-spherical vesicle formed from a single lipid species is revisited theoretically. A coherent physical theory for the dynamics is developed based on a number of fundamental principles and considerations, and a sy...

  6. Pockets of Participation: Revisiting Child-Centred Participation Research

    Science.gov (United States)

    Franks, Myfanwy

    2011-01-01

    This article revisits the theme of the clash of interests and power relations at work in participatory research which is prescribed from above. It offers a possible route toward solving conflict between adult-led research carried out by young researchers, funding requirements and organisational constraints. The article explores issues of…

  7. Revisiting Mental Simulation in Language Comprehension: Six Replication Attempts

    NARCIS (Netherlands)

    R.A. Zwaan (Rolf); D. Pecher (Diane)

    2012-01-01

    textabstractThe notion of language comprehension as mental simulation has become popular in cognitive science. We revisit some of the original empirical evidence for this. Specifically, we attempted to replicate the findings from earlier studies that examined the mental simulation of object orientat

  8. Revisiting the Trust Effect in Urban Elementary Schools

    Science.gov (United States)

    Adams, Curt M.; Forsyth, Patrick B.

    2013-01-01

    More than a decade after Goddard, Tschannen-Moran, and Hoy (2001) found that collective faculty trust in clients predicts student achievement in urban elementary schools, we sought to identify a plausible link for this relationship. Our purpose in revisiting the trust effect was twofold: (1) to test the main effect of collective faculty trust on…

  9. Educational Administration and the Management of Knowledge: 1980 Revisited

    Science.gov (United States)

    Bates, Richard

    2013-01-01

    This paper revisits the thesis of a 1980 paper that suggested a new approach to educational administration based upon the New Sociology of Education. In particular it updates answers to the six key questions asked by that paper: what counts as knowledge; how is what counts as knowledge organised; how is what counts as knowledge transmitted; how is…

  10. The Importance of Being a Complement: CED Effects Revisited

    Science.gov (United States)

    Jurka, Johannes

    2010-01-01

    This dissertation revisits subject island effects (Ross 1967, Chomsky 1973) cross-linguistically. Controlled acceptability judgment studies in German, English, Japanese and Serbian show that extraction out of specifiers is consistently degraded compared to extraction out of complements, indicating that the Condition on Extraction domains (CED,…

  11. Revisiting Constructivist Teaching Methods in Ontario Colleges Preparing for Accreditation

    Science.gov (United States)

    Schultz, Rachel A.

    2015-01-01

    At the time of writing, the first community colleges in Ontario were preparing for transition to an accreditation model from an audit system. This paper revisits constructivist literature, arguing that a more pragmatic definition of constructivism effectively blends positivist and interactionist philosophies to achieve both student centred…

  12. Educational Administration and the Management of Knowledge: 1980 Revisited

    Science.gov (United States)

    Bates, Richard

    2013-01-01

    This paper revisits the thesis of a 1980 paper that suggested a new approach to educational administration based upon the New Sociology of Education. In particular it updates answers to the six key questions asked by that paper: what counts as knowledge; how is what counts as knowledge organised; how is what counts as knowledge transmitted; how is…

  13. Moral Judgment Development across Cultures: Revisiting Kohlberg's Universality Claims

    Science.gov (United States)

    Gibbs, John C.; Basinger, Karen S.; Grime, Rebecca L.; Snarey, John R.

    2007-01-01

    This article revisits Kohlberg's cognitive developmental claims that stages of moral judgment, facilitative processes of social perspective-taking, and moral values are commonly identifiable across cultures. Snarey [Snarey, J. (1985). "The cross-cultural universality of social-moral development: A critical review of Kohlbergian research."…

  14. Faraday effect revisited: sum rules and convergence issues

    DEFF Research Database (Denmark)

    Cornean, Horia; Nenciu, Gheorghe

    2010-01-01

    This is the third paper of a series revisiting the Faraday effect. The question of the absolute convergence of the sums over the band indices entering the Verdet constant is considered. In general, sum rules and traces per unit volume play an important role in solid-state physics, and they give...

  15. Intelligence for embedded systems a methodological approach

    CERN Document Server

    Alippi, Cesare

    2014-01-01

    Addressing current issues of which any engineer or computer scientist should be aware, this monograph is a response to the need to adopt a new computational paradigm as the methodological basis for designing pervasive embedded systems with sensor capabilities. The requirements of this paradigm are to control complexity, to limit cost and energy consumption, and to provide adaptation and cognition abilities allowing the embedded system to interact proactively with the real world. The quest for such intelligence requires the formalization of a new generation of intelligent systems able to exploit advances in digital architectures and in sensing technologies. The book sheds light on the theory behind intelligence for embedded systems with specific focus on: ·        robustness (the robustness of a computational flow and its evaluation); ·        intelligence (how to mimic the adaptation and cognition abilities of the human brain), ·        the capacity to learn in non-stationary and evolv...

  16. Embedded I&C for Extreme Environments

    Energy Technology Data Exchange (ETDEWEB)

    Kisner, Roger A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-04-01

    This project uses embedded instrumentation and control (I&C) technologies to demonstrate potential performance gains of nuclear power plant components in extreme environments. Extreme environments include high temperature, radiation, high pressure, high vibration, and high EMI conditions. For extreme environments, performance gains arise from moment-to-moment sensing of local variables and immediate application of local feedback control. Planning for embedding I&C during early system design phases contrasts with the traditional, serial design approach that incorporates minimal I&C after mechanical and electrical design is complete. The demonstration application involves the development and control of a novel, proof-of-concept motor/pump design. The motor and pump combination operate within the fluid environment, eliminating the need for rotating seals. Actively controlled magnetic bearings also replace failure-prone mechanical contact bearings that typically suspend rotating components. Such as design has the potential to significantly enhance the reliability and life of the pumping system and would not be possible without embedded I&C.

  17. Embedding loop quantum cosmology without piecewise linearity

    CERN Document Server

    Engle, Jonathan

    2013-01-01

    An important goal is to understand better the relation between full loop quantum gravity (LQG) and the simplified, reduced theory known as loop quantum cosmology (LQC), {\\em directly at the quantum level}. Such a firmer understanding would increase confidence in the reduced theory as a tool for formulating predictions of the full theory, as well as permitting lessons from the reduced theory to guide further development in the full theory. The present paper constructs an embedding of the usual state space of LQC into that of standard LQG, that is, LQG based on \\textit{piecewise analytic paths}. The embedding is well-defined even prior to solving the diffeomorphism constraint, at no point is a graph fixed, and at no point is the piecewise linear category used. This motivates for the first time a definition of operators in LQC corresponding to holonomies along non-piecewise-linear paths, without changing the usual kinematics of LQC in any way. The new embedding intertwines all operators corresponding to such hol...

  18. Embedding Description Logic Programs into Default Logic

    CERN Document Server

    Wang, Yisong; Yuan, Li Yan; Shen, Yi-Dong; Eiter, Thomas

    2011-01-01

    Description logic programs (dl-programs) under the answer set semantics formulated by Eiter {\\em et al.} have been considered as a prominent formalism for integrating rules and ontology knowledge bases. A question of interest has been whether dl-programs can be captured in a general formalism of nonmonotonic logic. In this paper, we study the possibility of embedding dl-programs into default logic. We show that dl-programs under the strong and weak answer set semantics can be embedded in default logic by combining two translations, one of which eliminates the constraint operator from nonmonotonic dl-atoms and the other translates a dl-program into a default theory. For dl-programs without nonmonotonic dl-atoms but with the negation-as-failure operator, our embedding is polynomial, faithful, and modular. In addition, our default logic encoding can be extended in a simple way to capture recently proposed weakly well-supported answer set semantics, for arbitrary dl-programs. These results reinforce the argument ...

  19. Embedded active surfaces for volume visualization

    Science.gov (United States)

    Whitaker, Ross T.; Chen, David

    1994-05-01

    We propose a new technique for use in the visualization of sparse, fuzzy, or noisy 3D data. This technique incorporates the methods of deformable or active models that have been developed in 2D computer vision. In this paper we generalize such models to 3D in a manner that is both practical and mathematically elegant, and we thereby avoid many of the problems associated with previous attempts to generalize deformable models. When generalizing to 3D, deformable models have several drawbacks-- including their acute sensitivity to topology, parameterization, and initial conditions--which limit their effectiveness. Many of these problems stem from the underlying parameterization of the model. This paper presents an implicit representation of deformable models. The implicit representation is an embedding of objects as level sets of grayscale functions which serve as templates. The evolution equation associated with the energy minimization process for a model has an analogous partial differential equation which governs the behavior of the corresponding grayscale template. We show that the 'active blobs' associated with the embedding of active models have several useful properties. First, they are topologically flexible. Second, grayscale images represent families of models. Third, when surfaces are embedded as grayscale images, they are described by a natural scale space. This scale space provides the ability to solve these equations in a multi-scale manner. Several 2D examples of technique are presented, as well as some visualization results from 3D ultrasound.

  20. Embedded Systems Education for Multiple Disciplines

    Directory of Open Access Journals (Sweden)

    Ali H.E. Mousa

    2010-01-01

    Full Text Available Problem statement: This study described the process and experience of designing and developing an embedded systems first course that serves different disciplines at the University of Jordan together with its associated laboratory. The course serves three different departments with varying requirements and varying student initial background. The stages of the design process of the course and associated labs are explored. Emphasis is given throughout to the notion of systems design without losing track of the details involved in the design process. The design methodology used for the laboratory facilities and the learning outcomes are explored. Approach: The methodology followed in the design process was based on defining clear objectives taking into consideration the different backgrounds of students and departmental requirements. This was followed by defining the course content, designing the lab facilities and choosing the right hardware and software tools. We followed the Demonstrate, Work-to-Know and Design methodology for lab design Results: The course had been running successfully for several years now. Successful innovative projects undertaken by students and their results are reported. Due to its success, numerous senior capstone projects in many departments are now based on embedded systems ideas and notions. Conclusion: Embedded system teaching for multiple disciplines requires diligence and clear understanding of the varying requirements and backgrounds of students. Careful consideration should be given to the objectives, choice of tools and the timeline of the course and associated labs. Projects that tie the concepts together are very important for the success of the course.

  1. Embedding loop quantum cosmology without piecewise linearity

    Science.gov (United States)

    Engle, Jonathan

    2013-04-01

    An important goal is to understand better the relation between full loop quantum gravity (LQG) and the simplified, reduced theory known as loop quantum cosmology (LQC), directly at the quantum level. Such a firmer understanding would increase confidence in the reduced theory as a tool for formulating predictions of the full theory, as well as permitting lessons from the reduced theory to guide further development in the full theory. This paper constructs an embedding of the usual state space of LQC into that of standard LQG, that is, LQG based on piecewise analytic paths. The embedding is well defined even prior to solving the diffeomorphism constraint, at no point is a graph fixed and at no point is the piecewise linear category used. This motivates for the first time a definition of operators in LQC corresponding to holonomies along non-piecewise linear paths, without changing the usual kinematics of LQC in any way. The new embedding intertwines all operators corresponding to such holonomies, and all elements in its image satisfy an operator equation which classically implies homogeneity and isotropy. The construction is made possible by a recent result proven by Fleischhack. Communicated by P Singh

  2. Embedded Linux platform for data acquisition systems

    Energy Technology Data Exchange (ETDEWEB)

    Patel, Jigneshkumar J., E-mail: jjp@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Reddy, Nagaraj, E-mail: nagaraj.reddy@coreel.com [Sandeepani School of Embedded System Design, Bangalore, Karnataka (India); Kumari, Praveena, E-mail: praveena@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Rajpal, Rachana, E-mail: rachana@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Pujara, Harshad, E-mail: pujara@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Jha, R., E-mail: rjha@ipr.res.in [Institute for Plasma Research, Gandhinagar, Gujarat (India); Kalappurakkal, Praveen, E-mail: praveen.k@coreel.com [Sandeepani School of Embedded System Design, Bangalore, Karnataka (India)

    2014-05-15

    Highlights: • The design and the development of data acquisition system on FPGA based reconfigurable hardware platform. • Embedded Linux configuration and compilation for FPGA based systems. • Hardware logic IP core and its Linux device driver development for the external peripheral to interface it with the FPGA based system. - Abstract: This scalable hardware–software system is designed and developed to explore the emerging open standards for data acquisition requirement of Tokamak experiments. To address the future need for a scalable data acquisition and control system for fusion experiments, we have explored the capability of software platform using Open Source Embedded Linux Operating System on a programmable hardware platform such as FPGA. The idea was to identify the platform which can be customizable, flexible and scalable to support the data acquisition system requirements. To do this, we have selected FPGA based reconfigurable and scalable hardware platform to design the system with Embedded Linux based operating system for flexibility in software development and Gigabit Ethernet interface for high speed data transactions. The proposed hardware–software platform using FPGA and Embedded Linux OS offers a single chip solution with processor, peripherals such ADC interface controller, Gigabit Ethernet controller, memory controller amongst other peripherals. The Embedded Linux platform for data acquisition is implemented and tested on a Virtex-5 FXT FPGA ML507 which has PowerPC 440 (PPC440) [2] hard block on FPGA. For this work, we have used the Linux Kernel version 2.6.34 with BSP support for the ML507 platform. It is downloaded from the Xilinx [1] GIT server. Cross-compiler tool chain is created using the Buildroot scripts. The Linux Kernel and Root File System are configured and compiled using the cross-tools to support the hardware platform. The Analog to Digital Converter (ADC) IO module is designed and interfaced with the ML507 through Xilinx

  3. A new embedded solution of hyperspectral data processing platform: the embedded GPU computer

    Science.gov (United States)

    Zhang, Lei; Gao, Jiao Bo; Hu, Yu; Sun, Ke Feng; Wang, Ying Hui; Cheng, Juan; Sun, Dan Dan; Li, Yu

    2016-10-01

    During the research of hyper-spectral imaging spectrometer, how to process the huge amount of image data is a difficult problem for all researchers. The amount of image data is about the order of magnitude of several hundred megabytes per second. Traditional solution of the embedded hyper-spectral data processing platform such as DSP and FPGA has its own drawback. With the development of GPU, parallel computing on GPU is increasingly applied in large-scale data processing. In this paper, we propose a new embedded solution of hyper-spectral data processing platform which is based on the embedded GPU computer. We also give a detailed discussion of how to acquire and process hyper-spectral data in embedded GPU computer. We use C++ AMP technology to control GPU and schedule the parallel computing. Experimental results show that the speed of hyper-spectral data processing on embedded GPU computer is apparently faster than ordinary computer. Our research has significant meaning for the engineering application of hyper-spectral imaging spectrometer.

  4. 从《罗密欧与朱丽叶》和《哈姆雷特》看朱生豪译者风格%On Zhu Shenghao’s Translator’s Style in Romeo and Juliet and Hamlet

    Institute of Scientific and Technical Information of China (English)

    孙瑞

    2012-01-01

      莎士比亚的戏剧流传至今与它的思想、语言艺术有着紧密的联系。作为莎剧翻译中的一员,朱生豪显示了他天才的才情与手段。他的译本至今仍然深受广大的读者的欢迎。该文旨在通过对《罗密欧与朱丽叶》《哈姆雷特》两本译作的分析来研究朱生豪的译者风格。文章采用了宏观和微观的视角,运用翻译问题学理论从语言学各个层面探讨了译文的风格特征,并且宏观上分析了译本中对原文主题和语气的风格的把握。最后总结归纳了朱生豪的译者风格特征。%  Zhu Shenghao rendered Shakespeare’s plays in the form of prose in vernacular Chinese. This thesis intends to take a descriptive view and find the overall style he shows in his translations. This thesis chooses two of his works Romeo and Juliet and Hamlet and the theory of Translation Stylistics and the method of quantitative, comparative qualitative analysis are utilized. After comparison and analysis, the author has located several features of his translation style.

  5. Cognitive Interpretation of Love Metaphors inRomeo and Juliet Based on the Conceptual Integration Theory%概念整合理论框架下《罗密欧与朱丽叶》中“爱情”隐喻的认知阐释

    Institute of Scientific and Technical Information of China (English)

    陈瑞敏; 车明明

    2015-01-01

    Conceptual integration, which reveals the dynamic process of on-line meaning construction and that of understanding the cognitive subject, is the most fundamental and universal cognitive means of human beings. Based on the four conceptual integration networks of CIT, this paper analyzes the love metaphors in Shakespeare’s play ofRomeo and Juliet, explorestheir construction processes and cognitive mechanisms, expounds the constructions of the emergent structures of metaphorical meanings, and illustrates the strong explanatory power of CIT to love metaphors. The analysis based on CIT not only enriches the cognitive research of metaphors, but provides a new perspective to the research of love metaphors as well.%概念整合是人类最基本和最普遍的认知方式,它揭示了意义的实时动态构建过程以及认知主体对意义的理解过程。以概念整合的四种网络模型为基础,对莎剧《罗密欧与朱丽叶》中爱情隐喻的意义构建过程和认知机制进行探析,阐释产生隐喻意义之层创结构的运演过程,展示概念整合理论对爱情隐喻的强大阐释力。概念整合的认知分析丰富了隐喻的认知研究,同时也为爱情隐喻的研究提供了新的视角。

  6. Modern Embedded Computing Designing Connected, Pervasive, Media-Rich Systems

    CERN Document Server

    Barry, Peter

    2012-01-01

    Modern embedded systems are used for connected, media-rich, and highly integrated handheld devices such as mobile phones, digital cameras, and MP3 players. All of these embedded systems require networking, graphic user interfaces, and integration with PCs, as opposed to traditional embedded processors that can perform only limited functions for industrial applications. While most books focus on these controllers, Modern Embedded Computing provides a thorough understanding of the platform architecture of modern embedded computing systems that drive mobile devices. The book offers a comprehen

  7. Methodology and Supporting Toolset Advancing Embedded Systems Quality

    DEFF Research Database (Denmark)

    Berger, Michael Stübert; Soler, José; Brewka, Lukasz Jerzy

    2013-01-01

    Software quality is of primary importance in the development of embedded systems that are often used in safety-critical applications. Moreover, as the life cycle of embedded products becomes increasingly tighter, productivity and quality are simultaneously required and closely interrelated towards...... delivering competitive products. In this context, the MODUS (Methodology and supporting toolset advancing embedded systems quality) project aims to provide a pragmatic and viable solution that will allow SMEs to substantially improve their positioning in the embedded-systems development market. This paper...... will describe the MODUS project with focus on the technical methodologies that will be developed advancing embedded system quality....

  8. Bernoulli Embedding Model and Its Application in Texture Mapping

    Institute of Scientific and Technical Information of China (English)

    Hong-Xin Zhang; Ying Tang; Hui Zhao; Hu-Jun Bao

    2006-01-01

    A novel texture mapping technique is proposed based on nonlinear dimension reduction, called Bernoulli logistic embedding (BLE). Our probabilistic embedding model builds texture mapping with minimal shearing effects. A log-likelihood function, related to the Bregman distance, is used to measure the similarity between two related matrices defined over the spaces before and after embedding. Low-dimensional embeddings can then be obtained through minimizing this function by a fast block relaxation algorithm. To achieve better quality of texture mapping, the embedded results are adopted as initial values for mapping enhancement by stretch-minimizing. Our method can be applied to both complex mesh surfaces and dense point clouds.

  9. Methodology and Supporting Toolset Advancing Embedded Systems Quality

    DEFF Research Database (Denmark)

    Berger, Michael Stübert; Soler, José; Brewka, Lukasz Jerzy;

    2013-01-01

    Software quality is of primary importance in the development of embedded systems that are often used in safety-critical applications. Moreover, as the life cycle of embedded products becomes increasingly tighter, productivity and quality are simultaneously required and closely interrelated towards...... delivering competitive products. In this context, the MODUS (Methodology and supporting toolset advancing embedded systems quality) project aims to provide a pragmatic and viable solution that will allow SMEs to substantially improve their positioning in the embedded-systems development market. This paper...... will describe the MODUS project with focus on the technical methodologies that will be developed advancing embedded system quality....

  10. Revisiting Narcolepsy: The Practical Diagnosis and Mythology

    Directory of Open Access Journals (Sweden)

    Vernon M Neppe

    2016-02-01

    : This might deprive many in the narcolepsy population of their essential life-sustaining treatment, even though they might have definite clinical features plus the gene expression, and often, already, response to wakefulness drugs. c Third, clinical evaluations must be standardized. At this stage, we, at the PNI b2 apply modifications of the Epworth Sleepiness Scale in conjunction with the Fatigue Severity Scale, and the Neppe Narcolepsy Questionnaire, as fundamental ways to evaluate narcolepsy clinically. These historical rankings and screens combined with proper HLA screening may be adequate for more than 90% of diagnoses. d Fourth, the comorbidities of narcolepsy might include psychosis, anxiety, depression, impaired functioning, and seizure phenomena. These may reflect multifactorial etiologies: some of these may be linked with narcolepsy, and others unassociated. I suggest a new model of hypocretin deficiency being slightly down-stream from the actual cause of narcolepsycataplexy. This accentuates the need for proposing two new terms, namely “primary narcolepsy” for the most common narcolepsy condition that appears to be hypothalamically linked to an auto-immune process involving hypocretin, and “symptomatic narcolepsy” due to infectious or tumor or trauma events involving the hypocretin / reticular activating system/ hypothalamus. On the others hand, some b “PNI” refers to the Pacific Neuropsychiatric Institute in Seattle, WA. “We” is used here to include application at the PNI; “we” is also used generically, for example, in broader recognitions of symptoms by researchers. Revisiting Narcolepsy: The Practical Diagnosis and Mythology 2/30 Copyright: ©2016 Neppe Citation: Neppe VM (2016 Revisiting Narcolepsy: The Practical Diagnosis and Mythology. J Psychol Clin Psychiatry 5(3: 00287. DOI: 10.15406/ jpcpy.2016.05.00287 old classifications have used the previous terms “Type 1 Narcolepsy” for narcolepsy with cataplexy, and “Type 2

  11. Integrated Design and Implementation of Embedded Control Systems with Scilab

    CERN Document Server

    Ma, Longhua; Peng, Zhe

    2008-01-01

    Embedded systems are playing an increasingly important role in control engineering. Despite their popularity, embedded systems are generally subject to resource constraints and it is therefore difficult to build complex control systems on embedded platforms. Traditionally, the design and implementation of control systems are often separated, which causes the development of embedded control systems to be highly time-consuming and costly. To address these problems, this paper presents a low-cost, reusable, reconfigurable platform that enables integrated design and implementation of embedded control systems. To minimize the cost, free and open source software packages such as Linux and Scilab are used. Scilab is ported to the embedded ARM-Linux system. The drivers for interfacing Scilab with several communication protocols including serial, Ethernet, and Modbus are developed. Experiments are conducted to test the developed embedded platform. The use of Scilab enables implementation of complex control algorithms ...

  12. Embedded generation and network management issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-07-01

    This report focuses on the characteristics of power generators that are important to accommodation in a distribution system. Part 1 examines the differences between transmission and distribution systems, and issues such as randomness, diversity, predictability, and controllability associated with accommodation in a distribution system. Part 2 concentrates on technical and operational issues relating to embedded generation, and the possible impact of the New Electricity Trading Arrangements. Commercial issues, contractual relationships for network charging and provision of services, and possible ways forward are examined in the last three parts of the report.

  13. Flash memory in embedded Java programs

    DEFF Research Database (Denmark)

    Korsholm, Stephan Erbs

    2011-01-01

    This paper introduces a Java execution environment with the capability for storing constant heap data in Flash, thus saving valuable RAM. The extension is motivated by the structure of three industrial applications which demonstrate the need for storing constant data in Flash on small embedded...... devices. The paper introduces the concept of host initialization of constant data to prepare a Flash image of constant data that can be kept outside the heap during runtime. The concept is implemented in an interpreter based Java execution environment....

  14. Embedded controller FORTH for the 8051 family

    CERN Document Server

    Payne, William H

    1990-01-01

    The purpose of this book is to present the technology requied to develop hardware and software for embedded controller systems at a fraction of the cost of traditional methods. Included in the book are hardware schematics of 8051 family development systems (single board and bussed 8051 microcontroller). Source code for both the 8086 and 805 family FORTH operating systems is published in the book. Binary images of the opeating systems can be generated from teh source code using the metacompiler also contained in the book. The book can be seen as a ""toolbox"" includingg all the necessary hardwa

  15. Safety-critical Java for embedded systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, René Rydhof

    2016-01-01

    This paper presents the motivation for and outcomes of an engineering research project on certifiable Javafor embedded systems. The project supports the upcoming standard for safety-critical Java, which defines asubset of Java and libraries aiming for development of high criticality systems....... The outcome of this projectinclude prototype safety-critical Java implementations, a time-predictable Java processor, analysis tools formemory safety, and example applications to explore the usability of safety-critical Java for this applicationarea. The text summarizes developments and key contributions...

  16. Linear embedding of free energy minimization

    CERN Document Server

    Moussa, Jonathan E

    2016-01-01

    Exact free energy minimization is a convex optimization problem that is usually approximated with stochastic sampling methods. Deterministic approximations have been less successful because many desirable properties have been difficult to attain. Such properties include the preservation of convexity, lower bounds on free energy, and applicability to systems without subsystem structure. We satisfy all of these properties by embedding free energy minimization into a linear program over energy-resolved expectation values. Numerical results on small systems are encouraging, but a lack of size consistency necessitates further development for large systems.

  17. The polarizable embedding coupled cluster method

    DEFF Research Database (Denmark)

    Sneskov, Kristian; Schwabe, Tobias; Kongsted, Jacob

    2011-01-01

    We formulate a new combined quantum mechanics/molecular mechanics (QM/MM) method based on a self-consistent polarizable embedding (PE) scheme. For the description of the QM region, we apply the popular coupled cluster (CC) method detailing the inclusion of electrostatic and polarization effects...... all coupled to a polarizable MM environment. In the process, we identify CC densitylike intermediates that allow for a very efficient implementation retaining a computational low cost of the QM/MM terms even when the number of MM sites increases. The strengths of the new implementation are illustrated...

  18. Design of embedded endoscopic ultrasonic imaging system

    Science.gov (United States)

    Li, Ming; Zhou, Hao; Wen, Shijie; Chen, Xiodong; Yu, Daoyin

    2008-12-01

    Endoscopic ultrasonic imaging system is an important component in the endoscopic ultrasonography system (EUS). Through the ultrasonic probe, the characteristics of the fault histology features of digestive organs is detected by EUS, and then received by the reception circuit which making up of amplifying, gain compensation, filtering and A/D converter circuit, in the form of ultrasonic echo. Endoscopic ultrasonic imaging system is the back-end processing system of the EUS, with the function of receiving digital ultrasonic echo modulated by the digestive tract wall from the reception circuit, acquiring and showing the fault histology features in the form of image and characteristic data after digital signal processing, such as demodulation, etc. Traditional endoscopic ultrasonic imaging systems are mainly based on image acquisition and processing chips, which connecting to personal computer with USB2.0 circuit, with the faults of expensive, complicated structure, poor portability, and difficult to popularize. To against the shortcomings above, this paper presents the methods of digital signal acquisition and processing specially based on embedded technology with the core hardware structure of ARM and FPGA for substituting the traditional design with USB2.0 and personal computer. With built-in FIFO and dual-buffer, FPGA implement the ping-pong operation of data storage, simultaneously transferring the image data into ARM through the EBI bus by DMA function, which is controlled by ARM to carry out the purpose of high-speed transmission. The ARM system is being chosen to implement the responsibility of image display every time DMA transmission over and actualizing system control with the drivers and applications running on the embedded operating system Windows CE, which could provide a stable, safe and reliable running platform for the embedded device software. Profiting from the excellent graphical user interface (GUI) and good performance of Windows CE, we can not

  19. Braneworld setup and embedding in teleparallel gravity

    Directory of Open Access Journals (Sweden)

    A. Behboodi

    2015-01-01

    Full Text Available We construct the setup of a five-dimensional braneworld scenario in teleparallel gravity. Both cases of Minkowski and Friedmann–Robertson–Walker branes embedded in anti-de Sitter bulk are studied and the effective 4D action were studied. 4-dimensional local Lorentz invariance is found to be recovered in both cases. However, due to different junction conditions, the equations governing the 4D cosmological evolution differ from general relativistic case. Using the results of Ref. [13], we consider a simple inflationary scenario in this setup. The inflation parameters are found to be modified compared to general relativistic case.

  20. Embedded systems for controlling LED matrix displays

    Science.gov (United States)

    Marghescu, Cristina; Drumea, Andrei

    2016-12-01

    LED matrix displays are a common presence in everyday life - they can be found in trains, buses, tramways, office information tables or outdoor media. The structure of the display unit is similar for all these devices, a matrix of light emitting diodes coupled between row and column lines, but there are many options for the display controller that switches these lines. Present paper analyzes different types of embedded systems that can control the LED matrix, based on single board computers, on microcontrollers with different peripheral devices or with programmable logic devices like field programmable gate arrays with implemented soft processor cores. Scalability, easiness of implementation and costs are analyzed for all proposed solutions.

  1. ESSAA: Embedded system safety analysis assistant

    Science.gov (United States)

    Wallace, Peter; Holzer, Joseph; Guarro, Sergio; Hyatt, Larry

    1987-01-01

    The Embedded System Safety Analysis Assistant (ESSAA) is a knowledge-based tool that can assist in identifying disaster scenarios. Imbedded software issues hazardous control commands to the surrounding hardware. ESSAA is intended to work from outputs to inputs, as a complement to simulation and verification methods. Rather than treating the software in isolation, it examines the context in which the software is to be deployed. Given a specified disasterous outcome, ESSAA works from a qualitative, abstract model of the complete system to infer sets of environmental conditions and/or failures that could cause a disasterous outcome. The scenarios can then be examined in depth for plausibility using existing techniques.

  2. Experiences with Ada in an embedded system

    Science.gov (United States)

    Labaugh, Robert J.

    1988-01-01

    Recent experiences with using Ada in a real time environment are described. The application was the control system for an experimental robotic arm. The objectives of the effort were to experiment with developing embedded applications in Ada, evaluating the suitability of the language for the application, and determining the performance of the system. Additional objectives were to develop a control system based on the NASA/NBS Standard Reference Model for Telerobot Control System Architecture (NASREM) in Ada, and to experiment with the control laws and how to incorporate them into the NASREM architecture.

  3. An Embedded Librarian Program: Eight Years On.

    Science.gov (United States)

    Freiburger, Gary; Martin, Jennifer R; Nuñez, Annabelle V

    2016-01-01

    This article examines an embedded librarian program eight years after implementation in a large academic health center. Librarians were physically moved into the colleges of pharmacy, public health, and nursing. Statistics are reported as well as comments from the participating librarians and faculty members. Strong relationships have been built between librarians, faculty members, and students. Locating the librarians among faculty and students led to a better understanding of client needs and an increased awareness of librarian competencies and services resulting in partnerships and greater utilization of library services.

  4. Groundwater depletion embedded in international food trade

    Science.gov (United States)

    Dalin, Carole; Wada, Yoshihide; Kastner, Thomas; Puma, Michael J.

    2017-03-01

    Recent hydrological modelling and Earth observations have located and quantified alarming rates of groundwater depletion worldwide. This depletion is primarily due to water withdrawals for irrigation, but its connection with the main driver of irrigation, global food consumption, has not yet been explored. Here we show that approximately eleven per cent of non-renewable groundwater use for irrigation is embedded in international food trade, of which two-thirds are exported by Pakistan, the USA and India alone. Our quantification of groundwater depletion embedded in the world’s food trade is based on a combination of global, crop-specific estimates of non-renewable groundwater abstraction and international food trade data. A vast majority of the world’s population lives in countries sourcing nearly all their staple crop imports from partners who deplete groundwater to produce these crops, highlighting risks for global food and water security. Some countries, such as the USA, Mexico, Iran and China, are particularly exposed to these risks because they both produce and import food irrigated from rapidly depleting aquifers. Our results could help to improve the sustainability of global food production and groundwater resource management by identifying priority regions and agricultural products at risk as well as the end consumers of these products.

  5. Approximately Counting Embeddings into Random Graphs

    CERN Document Server

    Furer, Martin

    2008-01-01

    Let H be a graph, and let C(H,G) be the number of (subgraph isomorphic) copies of H contained in a graph G. We investigate the fundamental problem of estimating C(H,G). Previous results cover only a few specific instances of this general problem, for example, the case when H has degree at most one (monomer-dimer problem). In this paper, we present the first general subcase of the subgraph isomorphism counting problem which is almost always efficiently approximable. The results rely on a new graph decomposition technique. Informally, the decomposition is a labeling of the vertices generating a sequence of bipartite graphs. The decomposition permits us to break the problem of counting embeddings of large subgraphs into that of counting embeddings of small subgraphs. Using this method, we present a simple randomized algorithm for the counting problem. For all decomposable graphs H and all graphs G, the algorithm is an unbiased estimator. Furthermore, for all graphs H having a decomposition where each of the bipa...

  6. Embedded wavelet video coding with error concealment

    Science.gov (United States)

    Chang, Pao-Chi; Chen, Hsiao-Ching; Lu, Ta-Te

    2000-04-01

    We present an error-concealed embedded wavelet (ECEW) video coding system for transmission over Internet or wireless networks. This system consists of two types of frames: intra (I) frames and inter, or predicted (P), frames. Inter frames are constructed by the residual frames formed by variable block-size multiresolution motion estimation (MRME). Motion vectors are compressed by arithmetic coding. The image data of intra frames and residual frames are coded by error-resilient embedded zerotree wavelet (ER-EZW) coding. The ER-EZW coding partitions the wavelet coefficients into several groups and each group is coded independently. Therefore, the error propagation effect resulting from an error is only confined in a group. In EZW coding any single error may result in a totally undecodable bitstream. To further reduce the error damage, we use the error concealment at the decoding end. In intra frames, the erroneous wavelet coefficients are replaced by neighbors. In inter frames, erroneous blocks of wavelet coefficients are replaced by data from the previous frame. Simulations show that the performance of ECEW is superior to ECEW without error concealment by 7 to approximately 8 dB at the error-rate of 10-3 in intra frames. The improvement still has 2 to approximately 3 dB at a higher error-rate of 10-2 in inter frames.

  7. PESOI: Process Embedded Service-Oriented Architecture

    Institute of Scientific and Technical Information of China (English)

    Wei-Tek Tsai; Yinong Chen; Chun Fan

    2006-01-01

    Service-Oriented Architecture (SOA) has drawn significant attention recently, and numerous architecture approaches have been proposed to represent SOA-based applications. The architecture of SOA-based applications is different from traditional software architecture, which is mainly static. The architecture of an SOA-based application is dynamic, I.e., the application can be composed at runtime using existing services, and thus the architecture is really determined at runtime, instead of design time. SOA applications have provided a new direction for software architecture study, where the architecture can be dynamically changed at runtime to meet the new application requirements. This paper proposes a Process-Embedded Service-Oriented Infrastructure to build SOA-based applications. This infrastructure embeds the entire software lifecycle management and service-oriented system engineering into the application developed on this infrastructure. Thus, the users can easily re-develop the applications during operation to meet the changing environments and requirements, through the supports provided by the embedded infrastructure.

  8. Compact Acoustic Models for Embedded Speech Recognition

    Directory of Open Access Journals (Sweden)

    Lévy Christophe

    2009-01-01

    Full Text Available Speech recognition applications are known to require a significant amount of resources. However, embedded speech recognition only authorizes few KB of memory, few MIPS, and small amount of training data. In order to fit the resource constraints of embedded applications, an approach based on a semicontinuous HMM system using state-independent acoustic modelling is proposed. A transformation is computed and applied to the global model in order to obtain each HMM state-dependent probability density functions, authorizing to store only the transformation parameters. This approach is evaluated on two tasks: digit and voice-command recognition. A fast adaptation technique of acoustic models is also proposed. In order to significantly reduce computational costs, the adaptation is performed only on the global model (using related speaker recognition adaptation techniques with no need for state-dependent data. The whole approach results in a relative gain of more than 20% compared to a basic HMM-based system fitting the constraints.

  9. CARBON CHAINS AND METHANOL TOWARD EMBEDDED PROTOSTARS

    Energy Technology Data Exchange (ETDEWEB)

    Graninger, Dawn M.; Wilkins, Olivia H.; Öberg, Karin I., E-mail: dgraninger@cfa.harvard.edu [Harvard-Smithsonian Center for Astrophysics, Cambridge, MA 02138 (United States)

    2016-03-10

    Large interstellar organic molecules are potential precursors of prebiotic molecules. Their formation pathways and chemical relationships with one another and simpler molecules are therefore of great interest. In this paper we address the relationships between two classes of large organic molecules, carbon chains and saturated complex organic molecules at the early stages of star formation through observations of C{sub 4}H and CH{sub 3}OH. We surveyed these molecules with the IRAM 30 m telescope toward 16 deeply embedded low-mass protostars selected from the Spitzer c2d ice survey. We find that CH{sub 3}OH and C{sub 4}H are positively correlated, indicating that these two classes of molecules can coexist during the embedded protostellar stage. The C{sub 4}H/CH{sub 3}OH gas abundance ratio tentatively correlates with the CH{sub 4}/CH{sub 3}OH ice abundance ratio in the same lines of sight. This relationship supports a scenario where carbon chain formation in protostellar envelopes begins with CH{sub 4} ice desorption.

  10. Carbon Chains and Methanol toward Embedded Protostars

    CERN Document Server

    Graninger, Dawn M; Oberg, Karin I

    2016-01-01

    Large interstellar organic molecules are potential precursors of prebiotic molecules. Their formation pathways and chemical relationships with one another and simpler molecules are therefore of great interest. In this paper, we address the relationship between two classes of large organic molecules, carbon chains and saturated complex organic molecules (COMs), at the early stages of star formation through observations of C4H and CH3OH. We surveyed these molecules with the IRAM 30m telescope toward 16 deeply embedded low-mass protostars selected from the Spitzer c2d ice survey. We find that CH3OH and C4H are positively correlated indicating that these two classes of molecules can coexist during the embedded protostellar stage. The C4H/CH3OH gas abundance ratio tentatively correlates with the CH4/CH3OH ice abundance ratio in the same lines of sight. This relationship supports a scenario where carbon chain formation in protostellar envelopes begins with CH4 ice desorption.

  11. Embedded Wireless Fingerprint Exam Affair Management

    Directory of Open Access Journals (Sweden)

    Yuan Yuan

    2013-01-01

    Full Text Available This thesis studies the design method of fingerprint identification module based on embedded system, which can realize the design of wireless fingerprint examination management system.This method reduces the hardware cost by building hardware environment whose platform is ARM9 microprocessor and MBF200 fingerprint sensor-integrated module. And, under the enviroment of Linux, adopting framework for embedded fingerprint identification system and introducing relevant technology about fingerprint identification, the design of distributed fingerprint identification system could be realized, which is low-cost and reliable. Meanwhile, by combining wireless network communication with Ethernet communication, it can maintain real time data exchanege with central data bank. This system adopts SQL Server database to manage usres baisc information and information data of their fingerprints characteristics and runs reliably. Comprehensive tests and practical application proved that fingerprint images collected by this system are more clear and less fuzzy. After being processed, the outlines of images are clear and have outstanding features, so that it is easy to classify and identify fingerprints. This system could be applied in the management of large-scale examinations and remote network examination. It also improves traditional checking way which identifies person by his holdings, and is the future direction of examination management.

  12. Oriented nanofibers embedded in a polymer matrix

    Science.gov (United States)

    Barrera, Enrique V. (Inventor); Rodriguez-Macias, Fernando J. (Inventor); Lozano, Karen (Inventor); Chibante, Luis Paulo Felipe (Inventor); Stewart, David Harris (Inventor)

    2011-01-01

    A method of forming a composite of embedded nanofibers in a polymer matrix is disclosed. The method includes incorporating nanofibers in a plastic matrix forming agglomerates, and uniformly distributing the nanofibers by exposing the agglomerates to hydrodynamic stresses. The hydrodynamic said stresses force the agglomerates to break apart. In combination or additionally elongational flow is used to achieve small diameters and alignment. A nanofiber reinforced polymer composite system is disclosed. The system includes a plurality of nanofibers that are embedded in polymer matrices in micron size fibers. A method for producing nanotube continuous fibers is disclosed. Nanofibers are fibrils with diameters of 100 nm, multiwall nanotubes, single wall nanotubes and their various functionalized and derivatized forms. The method includes mixing a nanofiber in a polymer; and inducing an orientation of the nanofibers that enables the nanofibers to be used to enhance mechanical, thermal and electrical properties. Orientation is induced by high shear mixing and elongational flow, singly or in combination. The polymer may be removed from said nanofibers, leaving micron size fibers of aligned nanofibers.

  13. Embedded controller for GEM detector readout system

    Science.gov (United States)

    Zabołotny, Wojciech M.; Byszuk, Adrian; Chernyshova, Maryna; Cieszewski, Radosław; Czarski, Tomasz; Dominik, Wojciech; Jakubowska, Katarzyna L.; Kasprowicz, Grzegorz; Poźniak, Krzysztof; Rzadkiewicz, Jacek; Scholz, Marek

    2013-10-01

    This paper describes the embedded controller used for the multichannel readout system for the GEM detector. The controller is based on the embedded Mini ITX mainboard, running the GNU/Linux operating system. The controller offers two interfaces to communicate with the FPGA based readout system. FPGA configuration and diagnostics is controlled via low speed USB based interface, while high-speed setup of the readout parameters and reception of the measured data is handled by the PCI Express (PCIe) interface. Hardware access is synchronized by the dedicated server written in C. Multiple clients may connect to this server via TCP/IP network, and different priority is assigned to individual clients. Specialized protocols have been implemented both for low level access on register level and for high level access with transfer of structured data with "msgpack" protocol. High level functionalities have been split between multiple TCP/IP servers for parallel operation. Status of the system may be checked, and basic maintenance may be performed via web interface, while the expert access is possible via SSH server. System was designed with reliability and flexibility in mind.

  14. Embedded Empiricisms in Soft Soil Technology

    Science.gov (United States)

    Wijeyesekera, D. C.; John, L. M. S. Alvin; Adnan, Z.

    2016-07-01

    Civil engineers of today are continuously challenged by innovative projects that push further the knowledge boundaries with conceptual and/or ingenious solutions leading to the realization of that once was considered impossible in the realms of geotechnology. Some of the forward developments rely on empirical methods embedded within soft soil technology and the spectral realms of engineering in its entirety. Empiricisms unlike folklore are not always shrouded in mysticism but can find scientific reasoning to justify them being adopted in design and tangible construction projects. This lecture therefore is an outline exposition of how empiricism has been integrally embedded in total empirical beginnings in the evolution of soft soil technology from the Renaissance time, through the developments of soil mechanics in the 19th century which in turn has paved the way to the rise of computational soil mechanics. Developments in computational soil mechanics has always embraced and are founded on a wide backdrop of empirical geoenvironment simulations. However, it is imperative that a competent geotechnical engineer needs postgraduate training combined with empiricism that is based on years of well- winnowed practical experience to fathom the diverseness and complexity of nature. However, experience being regarded more highly than expertise can, perhaps inadvertently, inhibit development and innovation.

  15. The Stern-Gerlach experiment revisited

    Science.gov (United States)

    Schmidt-Böcking, Horst; Schmidt, Lothar; Lüdde, Hans Jürgen; Trageser, Wolfgang; Templeton, Alan; Sauer, Tilman

    2016-12-01

    experimental example for such directional quantization in scattering processes is shown. Last not least, the early history of the "almost" discovery of the electron spin in the SGE is revisited.

  16. The significance test controversy revisited the fiducial Bayesian alternative

    CERN Document Server

    Lecoutre, Bruno

    2014-01-01

    The purpose of this book is not only to revisit the “significance test controversy,”but also to provide a conceptually sounder alternative. As such, it presents a Bayesian framework for a new approach to analyzing and interpreting experimental data. It also prepares students and researchers for reporting on experimental results. Normative aspects: The main views of statistical tests are revisited and the philosophies of Fisher, Neyman-Pearson and Jeffrey are discussed in detail. Descriptive aspects: The misuses of Null Hypothesis Significance Tests are reconsidered in light of Jeffreys’ Bayesian conceptions concerning the role of statistical inference in experimental investigations. Prescriptive aspects: The current effect size and confidence interval reporting practices are presented and seriously questioned. Methodological aspects are carefully discussed and fiducial Bayesian methods are proposed as a more suitable alternative for reporting on experimental results. In closing, basic routine procedures...

  17. The contact of elastic regular wavy surfaces revisited

    CERN Document Server

    Yastrebov, Vladislav A

    2014-01-01

    We revisit the classic problem of an elastic solid with a two-dimensional wavy surface squeezed against an elastic flat half-space from infinitesimal to full contact. Through extensive numerical calculations and analytic derivations, we discover previously overlooked transition regimes. These are seen in particular in the evolution with applied load of the contact area and perimeter, the mean pressure and the probability density of contact pressure. These transitions are correlated with the contact area shape, which is affected by long range elastic interactions between contacting zones. Our analysis has implications for general random rough surfaces, as similar local transitions occur continuously at detached areas or coalescing contact zones. A key result is the deduction of the probability density of contact pressure at full contact. We discover that there is a non-zero probability of null contact pressures, which might suggest revisiting the conditions necessary for applying Persson's model at partial con...

  18. Embedded librarianship what every academic librarian should know

    CERN Document Server

    Russo, Michael F

    2013-01-01

    Is the embedded librarian an equal partner in the course, or is the librarian perceived as a "value-added" extra? What is the place of technology in this effort? Is there a line librarians should not cross? Taking into account both theory and practice to discuss multiple facets of the subject, Embedded Librarianship: What Every Academic Librarian Should Know thoroughly examines these questions and more from the perspectives of experienced embedded librarian contributors who have worked in higher education settings. The chapters illuminate the benefits and challenges of embedding, explain the planning required to set up an embedded course, identify the different forms of embedding, and consider information literacy instruction in various contexts. Readers who will benefit from this work include not only academic librarians but any professor who wants their students to be able to do better research in their fields.

  19. Zero-frequency magnetic fluctuations in homogeneous cosmic plasma revisited

    CERN Document Server

    Caruso, Francisco

    2011-01-01

    Magnetic fluctuations in a non-magnetized gaseous plasma is revisited and calculated without approximations, based on the fluctuation-dissipation theorem. It is argued that the present results are qualitative and quantitative different form previous one based on the same theorem. In particular, it is shown that it is not correct that the spectral intensity does not vary sensitively with $k_{cut}$. Also the simultaneous dependence of this intensity on the plasma and on the collisional frequencies are discussed.

  20. Zero-frequency magnetic fluctuations in homogeneous cosmic plasma revisited

    OpenAIRE

    Caruso, Francisco; Oguri, Vitor

    2011-01-01

    Magnetic fluctuations in a non-magnetized gaseous plasma is revisited and calculated without approximations, based on the fluctuation-dissipation theorem. It is argued that the present results are qualitative and quantitative different form previous one based on the same theorem. In particular, it is shown that it is not correct that the spectral intensity does not vary sensitively with $k_{cut}$. Also the simultaneous dependence of this intensity on the plasma and on the collisional frequenc...