WorldWideScience

Sample records for juliet revisited embedding

  1. A Tragedy of Love-Romeo and Juliet

    Institute of Scientific and Technical Information of China (English)

    朱燕

    2016-01-01

    Romeo and Juliet is one of the most famous dramas of William Shakespeare. I like the novel very much and will give some ideas and comments from the three points: first, the difference between Romeo and Juliet & Butterfly Lovers; Second, the analysis of Romeo and Juliet's characters; Third, the great significance of the novel.

  2. Godiva and Juliet Diagnostics CED-1 (IER-176)

    Energy Technology Data Exchange (ETDEWEB)

    Scorby, J C

    2011-12-21

    A suite of diagnostics are being proposed for use in the Juliet experiment (IER-128). In order to calibrate and test the diagnostics prior to use, the LLNL calibration facility and Godiva pulsed reactor will be used to provide intense sources of neutrons and gammas. Due to the similarities of the Godiva and Juliet radiation fields, the diagnostics being developed and tested for Juliet can also play an on-going role in diagnostics for Godiva as well as, perhaps, other critical assembly experiments. Similar work is also being conducted for IER-147 for the purpose of characterizing the Godiva radiation field in support of an upcoming international nuclear accident dosimetry exercise. Diagnostics developed and fielded under IER-147 can provide valuable data with respect to the neutron and gamma energy spectrums in the vicinity of Godiva which is relevant to the calibration of Juliet diagnostics.

  3. Exploring Romeo and Juliet. ArtsEdge Curricula, Lessons and Activities.

    Science.gov (United States)

    Fullard, Barbara Lois; Karsten, Jayne

    This curriculum unit examines William Shakespeare's tragic play, "Romeo and Juliet." The unit calls the play "one of the greatest and saddest love stories of all time," and notes that artists across centuries and oceans have retold the tale of "Romeo and Juliet" in various forms and incarnations. It first presents…

  4. Profiles in Research: Juliet Popper Shaffer

    Science.gov (United States)

    Robinson, Dan

    2005-01-01

    Robinson interviews Juliet Popper Shaffer, a scientist, who graduated from Swarthmore College in 1953 and Stanford in 1957 with degrees in psychology and concentrations in math, philosophy, and statistics. In 2004 she received the second Florence Nightingale David award given biannually by the Committee of Presidents of Statistical Societies to a…

  5. Prokofiev. "Romeo and Juliet" - Suites / Iran March

    Index Scriptorium Estoniae

    March, Iran

    1991-01-01

    Uuest heliplaadist "Prokofiev. "Romeo and Juliet" - Suites: N 1 Op. 64 bis a; N 2 Op. 64 ter b; N 3 Op. 101 c. Royal Scottish National Orchestra /Neeme Järvi" Chandos cassette ABTD 1536; CD CHAN 8940 (78 minutes) etc

  6. Understanding "Romeo and Juliet": A Thematic Unit.

    Science.gov (United States)

    Koveleski, Erin

    This curriculum unit for Grade 9 combines the classic Shakespeare play "Romeo and Juliet" with three young adult novels: "The Outsiders" (S.E. Hinton), "Summer of My German Soldier" (Bette Greene), and "The Witch of Blackbird Pond" (Elizabeth George Speare). To complete the unit, all students will be…

  7. Prokofiev: Romeo and Juliet - Suite N1 / Ivan March

    Index Scriptorium Estoniae

    March, Ivan

    1990-01-01

    Uuest heliplaadist "Prokofiev: Romeo and Juliet - Suite N1, Op.64b, N2, Op.64c. Philharmonia Orchestra, Barry Wordsworth" Collins Classics cassette 1116-4. CD. Võrreldud Neeme Järvi plaadistustega 1116-2

  8. Tights vs. Tattoos: Filmic Interpretations of "Romeo and Juliet."

    Science.gov (United States)

    Martin, Jennifer L.

    2002-01-01

    Suggests students will view film adaptations of Shakespeare plays more critically by carefully analyzing the same scene from several different film versions. Discusses relevant scenes from "Romeo and Juliet" for classroom interpretation. Suggests that by providing students the vocabulary to discuss the film, educators can encourage them…

  9. Godiva IV and Juliet Diagnostics CED-1, Rev. 1 (IER-176)

    Energy Technology Data Exchange (ETDEWEB)

    Scorby, J C; Myers, W L

    2012-04-11

    The Juliet experiment is currently in preliminary design (IER-128). This experiment will utilize a suite of diagnostics to measure the physical state of the device (temperature, surface motion, stress, etc.) and the total and time rate of change of neutron and gamma fluxes. A variety of potential diagnostics has been proposed in this CED-1 report. Based on schedule and funding, a subset of diagnostics will be selected for testing using the Godiva IV pulsed reactor as a source of neutrons and gammas. The diagnostics development and testing will occur over a two year period (FY12-13) culminating in a final set of diagnostics to be fielded for he Juliet experiment currently proposed for execution in FY15.

  10. Two Wooers and their Sonnets: On Poetic Forms in Romeo and Juliet

    Directory of Open Access Journals (Sweden)

    Elena V. Haltrin-Khalturina

    2017-09-01

    Full Text Available The article looks at the semiotics of the sonnet form used by Shakespeare in his tragedy Romeo and Juliet. Particular attention is paid to two sonnets, of Paris and of Romeo, in which different manners of courting are played out. The poetic “gift” from Romeo to Juliet, their shared sonnets, one complete and one interrupted (Act 1, Sc. 5, ls. 92–109, is a notorious and much discussed piece of Shakespeare’s dramatic poetry. However, the other wooing sonnet representing desires of Paris and mouthed by Lady Capulet (Act 1, Sc. 3, ls. 80–95, seems to lack that kind of attention. Our essay juxtaposes the two sonnets in question, which are built around extended metaphors (conceits. Romeo’s sonneteering is endowed with dramatic power that quickens the debate and inspires accord between the title’s heroes. The semantic charge of this shared sonnet resonates in the heroes’ scenic gestures, prompting the play’s outcome. By contrast, the rather inert sonnet of Paris is like a dead letter of bookish instruction, which neither inspires amorous response, nor moves Juliet. The article also places Romeo’s and Paris’s pieces against Shakespeare’s sonnets 128 and 126 of the 1609 edition.

  11. A South African Romeo and Juliet : gender identity in Minky ...

    African Journals Online (AJOL)

    This article examines how gender identity is represented in a filmic adaptation of Shakespeare's play text Romeo and Juliet within South Africa's postcolonial context, thereby positioning identity politics as crucial in the decolonial project. This article focuses on Minky Schlesinger's South African adaptation of Romeo and ...

  12. "What is it else?" Love's (Con-Text in Romeo and Juliet

    Directory of Open Access Journals (Sweden)

    Aliakbari H.

    2012-01-01

    Full Text Available Reading Romeo and Juliet from Jacques Derrida's perspective provides us with new insight to Shakespeare's portrayal of love. As an early tragedy, Romeo and Juliet is a study of the nature of love. Many believe that the play still follows the lead of the comedies in presenting its major theme. However, drawing upon Derrida's deconstruction of the play, we have shown that love as an idea, a word, or a nomenclature, follows the same aporetic law of the proper name in that it is split, not unified, contradictory, not lucidly meaningful. We have demonstrated the multiplicity of love's identity despite the universally unifying attributes attached to it by the individual characters inside the play. In short, this reading reveals that identity in general, and the identity of love in particular, is not fixed, that they are products of textuality.

  13. "Music with Her Silver Sound": An Introduction to "Romeo and Juliet."

    Science.gov (United States)

    Sheaffer, Lloyd E.

    1992-01-01

    Asserts that the key to incorporating music effectively into the English classroom is to provide a context for the music. Describes a teacher's introduction to Shakespeare's "Romeo and Juliet" that demonstrates one way to use music and which helps accomplish the goals of the literary unit. (PRA)

  14. An Analysis of the Way in Deciding Between Love and Self Esteem in Gnomeo and Juliet Movie

    OpenAIRE

    CHRISNARI, SISKA TYAS

    2014-01-01

    Keywords: Psychological, self esteem.This research is focus on psychological conflict that underwent by the main characters on Gnomeo and Juliet Movie Cartoon. This movie cartoon tells about the two families, The Blues and The Reds that are rival. They always be the best and reach a higher social class to show their self esteem. But, unintentionally their children met and fallen in love each other. Finally, their children named Gnomeo and Juliet have promises' to live together.Because of tha...

  15. Challenging Normative Sexual and Gender Identity Beliefs through Romeo and Juliet

    Science.gov (United States)

    Ressler, Paula

    2005-01-01

    Paula Ressler, an English teacher, suggests unconventional ways to work with William Shakespeare's "Romeo and Juliet" in the secondary school English curriculum to challenge normative sexual and gender identity beliefs. Reading queerly to explore non-normative sex and gender identities and reading for social justice have the potential to…

  16. REPRESENTASI FANATISME SUPPORTER DALAM FILM ROMEO DAN JULIET

    Directory of Open Access Journals (Sweden)

    Aditya Rizky Gunanto

    2015-11-01

    Full Text Available Romeo and Juliet movie tells the story of love between two mutually hostile angggota supporters. Rangga as a staunch supporter of Persija FC, and Dessy as a staunch supporter of Arsenal FC In unite their love, Rangga and Dessy faced with a problem, so they decided to get married and plan to escape to a neutral city where their competition is not a problem. But brother Dessy not bend over backwards to stop it. A true love story of two people has been the biggest supporter of the affairs of the two organizations .The theory used in this study is the theory of semiotics by Charles Sanders Peirce. Semiotics is the study of signs, meanings and proper functioning of the production of meaning. Charles Sanders Peirce's theory of meaning called triangle (triangle of meaning, including signs, objects (reference mark, and interpretant (users sign This type of research uses descriptive qualitative approach. Research methods with semiotic analysis that focuses on the meaning of each sign in the form of an icon, index, and symbol. The unit of analysis is a picture of a sign in the movie "Romeo Juliet". Research scope fanaticism of supporters who will be studied focusing on any scene that contains elements of fanaticism were analyzed through semotika Peirce.   Film Romeo dan Juliet menceritakan tentang percintaan antara dua angggota supporter yang saling bermusuhan. Rangga sebagai pendukung setia Persija FC, dan Dessy sebagai pendukung setia Persib FC Dalam mempersatukan cinta mereka, Rangga dan Dessy dihadapkan pada suatu masalah, sehingga mereka memutuskan untuk menikah dan merencanakan untuk melarikan diri ke sebuah kota netral di mana persaingan mereka tidak masalah. Tapi kakak Dessy tidak sekuat tenaga untuk menghentikannya. Sebuah kisah cinta sejati dua orang telah menjadi urusan dua organisasi pendukung terbesar. Teori yang digunakan dalam penelitian ini adalah teori semiotika menurut Charles Sanders Peirce. Semiotika adalah ilmu yang mempelajari

  17. Romeo and Juliet: Play about love and death

    Directory of Open Access Journals (Sweden)

    Andrejević Ana M.

    2015-01-01

    Full Text Available In the play Romeo and Juliet, which has become the synonym for the love tragedy, death is represented as the ultimate, all-consuming, and almost nihilistic power that cannot be conquered even by the most pure and passionate love. But, its devastating effect is reduced by the strong, transcendent, and the idealistic vision of love of the two young creatures who became immortal as the materialistic golden monuments, due to the power of the eternal art and the word of Shakespeare. Presenting it in the traditional frame of the Dance of Death and memento mori iconography, Shakespeare is showing us the different aspects of the Renaissance thought of death. The older generation sees it as the natural progression of life that cannot and must not stop everyday activities, but the younger hopes to find in death the salvation and escape from the insupportable and pragmatic world. Although there are religiously guided thoughts about life after death in the play, secular statements about death as a flight from the unbearable reality and the cure for the impossible love are more present. Even suicide is not conventionally represented as the sinful and devilish enterprise that must be condemned, but as the sacrifice and radical attempt to protect and preserve love. Shakespeare makes his lovers the owners of death, despite the rigid patriarchal effort to control both life and its opposite force. Love of Romeo and Juliet thus becomes victorious in death.

  18. The first quarto of Romeo and Juliet / William Shakespeare

    OpenAIRE

    Erne, Lukas Christian

    2007-01-01

    Two different versions of Romeo and Juliet were published during Shakespeare's lifetime: the second quarto of 1599, on which modern editions are usually based, and the first quarto of 1597. The latter version was long denigrated as a 'bad' quarto', but recent scholarship sees in it a crucial witness for the theatrical practices of Shakespeare and his company. The shorter of the two versions by about one quarter, the first quarto has high-paced action, fuller stage directions than the second q...

  19. La Délinquance Idéologique: Sony Labou Tansi and the Political Love Story of Romeo and Juliet

    Directory of Open Access Journals (Sweden)

    Rebekah Bale

    2016-12-01

    Full Text Available The article discusses an adaptation of William Shakespeare's Romeo and Juliet, (La Résurrection Rouge et Blanche de Romeo et Juliette- 'The Red and White Revival of Romeo and Juliet' by the Congolese writer Sony Labou Tansi. It examines the consequences of a focus on the political frame of the narrative. Sony's version is an indictment of a monstrous and hyper-violent political system in which the only choice left is the manner of one’s death. Sony uses the play as a means to interrogate a society that focuses on the political fetishization of violent dictatorships and nihilistic choices. With a radical shift in focus, Sony’s work also requires the audience / reader to consider the necessity of theatre and, by extension, the power under which it operates. Sony’s language in this adaptation gives the story of Romeo and Juliet, a post-colonial framework as well as an urgent political message. The analysis concludes that the adaptation presents the conventional love story as a political tragedy of the post-colonial condition.

  20. From Romeo and Juliet to Rosaline & Benvolio: Refashioning Shakespearean Teenage Lovers

    Directory of Open Access Journals (Sweden)

    Laura Tosi

    2017-11-01

    Full Text Available In this essay I analyse a number of narrative retellings of Romeo and Juliet for a Young Adult audience. I focus on three novels which, interestingly, replace the star-crossed lovers, with a couple of minor characters, Benvolio and Rosaline: Lisa Fiedler’s Romeo’s Ex. Rosaline’s Story (2006, Melinda Traub’s Still Star Crossed (2013 and Rachel Caine’s Prince of Shadows (2014. In thse versions Rosaline and Benvolio are given centre stage and narrative voices which open up new narrative possibilities; they end up playing a different and a bigger part than in the original play, but firmly refuse that of the victim to the old generation’s decisions and actions. By exploring motivation, establishing new links between the characters, and having narrators pass authoritative moral judgements, all these texts negotiate with well-established critical interpretations of the central characters, often challenging and channeling them into unexpected critical directions. In a way, these retellings “fix” the original “dangerous” characters Romeo and Juliet, by bringing in new characters as mediators, or expand existing secondary characters in order to make them fit into contemporary notions of teenage role models.

  1. Claire Danes's Star-Body, Teen Female Viewers and the Pluralisation of Authorship in Baz Luhrmann's "William Shakespeare's Romeo + Juliet"

    Science.gov (United States)

    Keam, Angela

    2008-01-01

    Teaching William Shakespeare's canonical tragedy "Romeo and Juliet" to teenagers in the context of the English classroom in Australia is not a particularly new pedagogical practice. In the year 2008, when many teachers (particularly those with a feminist bent such as I) are intent on guiding their students to decipher the ideological…

  2. The Analysis of Differences and Similarities of Eastern and Western Women’s Images in Liang Sanbo Yu Zhu Yingtai and Romeo and Juliet Novel

    Directory of Open Access Journals (Sweden)

    Yenny Yenny

    2010-11-01

    Full Text Available Sanpek Engtay and Romeo Juliet are the two famous classic love novels from Eastern and Western countries. They are liked by many generation of eastern and western readers. Both novels describe the image of women at each decade. Engtay represents the image of women at feudalism era while Juliet represents it Renainsance era. In this article, the writer did research at education, marriage, love, women's personality, and women's position at each decade. Library research was done in this study with the purpose of letting people know the differences and similarities of women's images between those two decades It can be concluded that in both writings, they have some similarities when describing love, mindset, and women's personality. The differences are about education, marriage, and women's position at feudalism and Renainsance decades.

  3. National Theatre of China's Romeo and Juliet and Its Rituals

    Directory of Open Access Journals (Sweden)

    Benny Lim

    2014-04-01

    Full Text Available This paper explores the “Chinese-ness” of this brand new production of Romeo and Juliet by the National Theatre of China, from a ritual perspective. Three main areas were discussed. Firstly, this play has got several religious connotations. The absence of religion in this play’s setting is relevant to China’s current high percentage of atheists. Despite that, several religions, such as Buddhism, Daoism and Christianity, are mentioned in this play. Secondly, the play has also incorporated several Chinese culture and traditions. The use of bicycles as one of the main props can be linked to the cultural significance of bicycles in China. The play also incorporated other cultural and traditional elements such as wedding customaries in China, Xinjiang dance, as well as the Chinese tongue twisters. Finally, the play has incorporated multiple Brechtian moments. Perhaps the Brechtian moments can lead audience to think about the current religious and cultural developments in modern China.

  4. Parody and the gas station in William Shakespeare's Romeo and Juliet

    Directory of Open Access Journals (Sweden)

    Avital G. Cykman

    2017-01-01

    Baz Luhrmann’s 1996 film, William Shakespeare'sRomeo and Juliet, is a pop-culture adaptation of the late sixteenth-century play. The cross-references and transgression of allusions and their postmodern subversive statement along with the extreme intensity with which these elements appear in act one, scene one, and especially in the scene placed at a gas station produce a self-directed irony, a cutting-edge, if playful combination of references that define it as parody in the postmodern sense. Hence, this article examines act one, scene one with a special attention to the gas station sequence, and analyzes it in the light of scholarly definitions of postmodern parody by Linda Hutcheon, John W. Duvall and Douglas Lanier, and of pastiche by Fredric Jameson. Once the hypothesis of parody is established, the article analyzes what the film parodies and in what ways, and what the objective and the impact of the applied humor are.

  5. Embedding Versus Immersion in General Relativity

    OpenAIRE

    Monte, Edmundo M.

    2009-01-01

    We briefly discuss the concepts of immersion and embedding of space-times in higher-dimensional spaces. We revisit the classical work by Kasner in which he constructs a model of immersion of the Schwarzschild exterior solution into a six-dimensional pseudo-Euclidean manifold. We show that, from a physical point of view, this model is not entirely satisfactory since the causal structure of the immersed space-time is not preserved by the immersion.

  6. An embedded crack in a constant strain triangle utilizing extended finite element concepts

    DEFF Research Database (Denmark)

    Olesen, J.F.; Poulsen, P.N.

    2013-01-01

    This paper revisits the formulation of the CST element with an embedded discrete crack taking advantage of the direct formulations developed within the framework of the extended finite element method, XFEM. The result is a simple element for modeling cohesive fracture processes in quasi-brittle m......This paper revisits the formulation of the CST element with an embedded discrete crack taking advantage of the direct formulations developed within the framework of the extended finite element method, XFEM. The result is a simple element for modeling cohesive fracture processes in quasi......-element discontinuity of displacements. The formulation is based on a variational principle of virtual work involving only the interpolation of displacements. The good performance of the element is demonstrated through the comparison with three benchmark tests in which a single crack is propagated: The center cracked...

  7. “Dreamers Often Lie”: On “Compromise”, the subversive documentation of an Israeli- Palestinian political adaptation of Shakespeare’s Romeo and Juliet

    Directory of Open Access Journals (Sweden)

    Yael Munk

    2010-03-01

    Full Text Available Is Romeo and Juliet relevant to a description of the Middle-East conflict? This is the question raised in Compromise, an Israeli documentary that follows the Jerusalem Khan Theater's production of the play in the mid-1990's. This paper describes how the cinematic documentation of a theatrical Shakespeare production can undermine the original intentions of its creators. This staging of the play was carefully planned in order to demonstrate to the country and the world that Israelis and Palestinians are willing to search for a peaceful solution in the Middle East: Two directors - Israeli -Eran Baniel and Palestinian Fuad Awad - co-directed both Israeli and Palestinian actors, using both languages: Arabic and Hebrew. This seemingly balanced solution was acclaimed on European television but for Israeli director Even, this was only a façade. Following backstage situation,  Compromise reveals the truth behind the mask in order to denounce the manipulative use of what Italian philosopher Giorgio Agamben defines as state of emergency, which is the hegemonic mechanism that deprives people of the elementary civil rights. Questioning the issue of co-existence against the political background of the 1990's (including bomb attacks and the signing of the Camp David Treaty in 1993, the film plays on the discrepancy between the denouement of Romeo and Juliet and the unsolvable situation in which people in the Middle-East - amongst them the actors themselves- are condemned to live.

  8. The Mother, Who Is Not One: Reflections Of Motherhood In Shakespeare's Romeo And Juliet, The Tempest, And The Taming Of The Shrew

    Directory of Open Access Journals (Sweden)

    KARAMAN HATICE

    2014-12-01

    Full Text Available The lack of proper motherhood in Shakespeare's plays has been a point of attraction for many feminist critics actively engaged in emphasizing the patriarchal aspect of Shakespeare's plays. This paper aims to analyze motherhood and the lack of mother/mother-figure in The Tempest, Romeo and Juliet and The Taming of the Shrew through Luce Irigaray's theory of gender and the work of other feminist critics. The issues of gender, father-daughter relations and the reflections of the absent mothers will be discussed. Male/Female Subjectivity will also be questioned, in view of Irigaray's conceptualization of gender by relating it to Subject.

  9. Silent cries, dancing tears: the metapsychology of art revisited/revised.

    Science.gov (United States)

    Aragno, Anna

    2011-04-01

    Against the backdrop of a broad survey of the literature on applied psychoanalysis, a number of concepts underpinning the metapsychology of art are revisited and revised: sublimation; interrelationships between primary and secondary processes; symbolization; "fantasy"; and "cathexis." Concepts embedded in dichotomous or drive/energic contexts are examined and reformulated in terms of a continuum of semiotic processes. Freudian dream structure is viewed as a biological/natural template for nonrepressive artistic forms of sublimation. The synthesis presented proposes a model of continuous rather than discontinuous processes, in a nonenergic, biosemiotic metatheoretical framework.

  10. Turismo e cinema a Verona: dal mito di Giulietta e Romeo riflessioni geografiche su vecchie e nuove location cinematografiche / Tourism and cinema in Verona: geographical considerations about old and new cinematographic locations from Romeo and Juliet myth

    Directory of Open Access Journals (Sweden)

    Maria Laura Pappalardo

    2016-05-01

    Full Text Available Il contributo analizza, in chiave geografica, le dinamiche che legano il turismo e il cinema a Verona, città meta consolidata di turismo urbano. Consapevoli che il mito di Giulietta e Romeo svolga un ruolo considerevole all’interno delle motivazioni che inducono il turista a soggiornare nella città veneta, risulta utile soffermarsi sulla funzione svolta dai film, di “antica” e recente realizzazione, nella conoscenza dei luoghi. In virtù delle sempre mutevoli richieste dei visitatori, pare interessante riflettere se sia “conveniente” per Verona, non tanto e non solo economicamente ma, soprattutto, in una logica di sostenibilità, continuare a proporre al turista il cliché della città degli innamorati o se non si debba, al contrario, pensare a nuove esperienze emozionali attraverso la promozione di itinerari le cui tappe non siano solo il balcone di Giulietta, la casa di Romeo, la tomba di Giulietta ma luoghi decisamente più veri quali le piazze storiche della città, i negozi tipici, i centri culturali. The paper analyzes, in geographical key, the dynamics that bind tourism and film in Verona, the city consolidated urban tourism destination. Aware that the myth of Romeo and Juliet plays a considerable role in the reasons for the tourist to stay in the Venetian city, it is useful to focus on the role played by "old" and recently shot films in the knowledge of the places. By virtue of the ever-changing demands of visitors, it seems interesting to consider whether it is “convenient” for Verona, not so much and not only economically but, above all, in a logic of sustainability, to continue to offer to the tourist the cliché of the city of lovers or if it is better to hink of new emotional experiences through the promotion of itineraries whose stages are not just Juliet's balcony, the house of Romeo, Juliet's tomb but places much more real as the historical squares of the city, the local shops and the cultural centers.

  11. Molecular interactions with ice: Molecular embedding, adsorption, detection, and release

    Energy Technology Data Exchange (ETDEWEB)

    Gibson, K. D.; Langlois, Grant G.; Li, Wenxin; Sibener, S. J., E-mail: s-sibener@uchicago.edu [The James Franck Institute and Department of Chemistry, The University of Chicago, 929 E. 57th Street, Chicago, Illinois 60637 (United States); Killelea, Daniel R. [Department of Chemistry and Biochemistry, Loyola University Chicago, 1068 W. Sheridan Ave., Chicago, Illinois 60660 (United States)

    2014-11-14

    The interaction of atomic and molecular species with water and ice is of fundamental importance for chemistry. In a previous series of publications, we demonstrated that translational energy activates the embedding of Xe and Kr atoms in the near surface region of ice surfaces. In this paper, we show that inert molecular species may be absorbed in a similar fashion. We also revisit Xe embedding, and further probe the nature of the absorption into the selvedge. CF{sub 4} molecules with high translational energies (≥3 eV) were observed to embed in amorphous solid water. Just as with Xe, the initial adsorption rate is strongly activated by translational energy, but the CF{sub 4} embedding probability is much less than for Xe. In addition, a larger molecule, SF{sub 6}, did not embed at the same translational energies that both CF{sub 4} and Xe embedded. The embedding rate for a given energy thus goes in the order Xe > CF{sub 4} > SF{sub 6}. We do not have as much data for Kr, but it appears to have a rate that is between that of Xe and CF{sub 4}. Tentatively, this order suggests that for Xe and CF{sub 4}, which have similar van der Waals radii, the momentum is the key factor in determining whether the incident atom or molecule can penetrate deeply enough below the surface to embed. The more massive SF{sub 6} molecule also has a larger van der Waals radius, which appears to prevent it from stably embedding in the selvedge. We also determined that the maximum depth of embedding is less than the equivalent of four layers of hexagonal ice, while some of the atoms just below the ice surface can escape before ice desorption begins. These results show that energetic ballistic embedding in ice is a general phenomenon, and represents a significant new channel by which incident species can be trapped under conditions where they would otherwise not be bound stably as surface adsorbates. These findings have implications for many fields including environmental science, trace gas

  12. eWOM, Revisit Intention, Destination Trust and Gender

    OpenAIRE

    Abubakar, Abubakar Mohammed; Ilkan, Mustafa; Al-Tal, Raad Meshall; Eluwole, Kayode

    2017-01-01

    This article investigates the impact of eWOM on intention to revisit and destination trust, and the moderating role of gender in medical tourism industry. Result from structural equation modeling (n=240) suggests the following: (1) that eWOM influences intention to revisit and destination trust; (2) that destination trust influences intention to revisit; (3) that the impact of eWOM on intention to revisit is about 1.3 times higher in men; (4) that the impact of eWOM on destination trust is ab...

  13. Embedded Leverage

    DEFF Research Database (Denmark)

    Frazzini, Andrea; Heje Pedersen, Lasse

    find that asset classes with embedded leverage offer low risk-adjusted returns and, in the cross-section, higher embedded leverage is associated with lower returns. A portfolio which is long low-embedded-leverage securities and short high-embedded-leverage securities earns large abnormal returns...

  14. Embedding potentials for excited states of embedded species

    International Nuclear Information System (INIS)

    Wesolowski, Tomasz A.

    2014-01-01

    Frozen-Density-Embedding Theory (FDET) is a formalism to obtain the upper bound of the ground-state energy of the total system and the corresponding embedded wavefunction by means of Euler-Lagrange equations [T. A. Wesolowski, Phys. Rev. A 77(1), 012504 (2008)]. FDET provides the expression for the embedding potential as a functional of the electron density of the embedded species, electron density of the environment, and the field generated by other charges in the environment. Under certain conditions, FDET leads to the exact ground-state energy and density of the whole system. Following Perdew-Levy theorem on stationary states of the ground-state energy functional, the other-than-ground-state stationary states of the FDET energy functional correspond to excited states. In the present work, we analyze such use of other-than-ground-state embedded wavefunctions obtained in practical calculations, i.e., when the FDET embedding potential is approximated. Three computational approaches based on FDET, that assure self-consistent excitation energy and embedded wavefunction dealing with the issue of orthogonality of embedded wavefunctions for different states in a different manner, are proposed and discussed

  15. Lakatos Revisited.

    Science.gov (United States)

    Court, Deborah

    1999-01-01

    Revisits and reviews Imre Lakatos' ideas on "Falsification and the Methodology of Scientific Research Programmes." Suggests that Lakatos' framework offers an insightful way of looking at the relationship between theory and research that is relevant not only for evaluating research programs in theoretical physics, but in the social…

  16. Oxidative phosphorylation revisited

    DEFF Research Database (Denmark)

    Nath, Sunil; Villadsen, John

    2015-01-01

    The fundamentals of oxidative phosphorylation and photophosphorylation are revisited. New experimental data on the involvement of succinate and malate anions respectively in oxidative phosphorylation and photophosphorylation are presented. These new data offer a novel molecular mechanistic...

  17. Embedded Systems

    Indian Academy of Sciences (India)

    Embedded system, micro-con- troller ... Embedded systems differ from general purpose computers in many ... Low cost: As embedded systems are extensively used in con- .... operating systems for the desktop computers where scheduling.

  18. Circular revisit orbits design for responsive mission over a single target

    Science.gov (United States)

    Li, Taibo; Xiang, Junhua; Wang, Zhaokui; Zhang, Yulin

    2016-10-01

    The responsive orbits play a key role in addressing the mission of Operationally Responsive Space (ORS) because of their capabilities. These capabilities are usually focused on supporting specific targets as opposed to providing global coverage. One subtype of responsive orbits is repeat coverage orbit which is nearly circular in most remote sensing applications. This paper deals with a special kind of repeating ground track orbit, referred to as circular revisit orbit. Different from traditional repeat coverage orbits, a satellite on circular revisit orbit can visit a target site at both the ascending and descending stages in one revisit cycle. This typology of trajectory allows a halving of the traditional revisit time and does a favor to get useful information for responsive applications. However the previous reported numerical methods in some references often cost lots of computation or fail to obtain such orbits. To overcome this difficulty, an analytical method to determine the existence conditions of the solutions to revisit orbits is presented in this paper. To this end, the mathematical model of circular revisit orbit is established under the central gravity model and the J2 perturbation. A constraint function of the circular revisit orbit is introduced, and the monotonicity of that function has been studied. The existent conditions and the number of such orbits are naturally worked out. Taking the launch cost into consideration, optimal design model of circular revisit orbit is established to achieve a best orbit which visits a target twice a day in the morning and in the afternoon respectively for several days. The result shows that it is effective to apply circular revisit orbits in responsive application such as reconnoiter of natural disaster.

  19. Conceptualizing Embedded Configuration

    DEFF Research Database (Denmark)

    Oddsson, Gudmundur Valur; Hvam, Lars; Lysgaard, Ole

    2006-01-01

    and services. The general idea can be named embedded configuration. In this article we intend to conceptualize embedded configuration, what it is and is not. The difference between embedded configuration, sales configuration and embedded software is explained. We will look at what is needed to make embedded...... configuration systems. That will include requirements to product modelling techniques. An example with consumer electronics will illuminate the elements of embedded configuration in settings that most can relate to. The question of where embedded configuration would be relevant is discussed, and the current...

  20. Effect of thread embedding acupuncture for facial wrinkles and laxity: a single-arm, prospective, open-label study

    Directory of Open Access Journals (Sweden)

    Younghee Yun

    2017-12-01

    Full Text Available Background: There is a growing trend for patients to seek the least invasive treatments with less risk of complications and downtime for facial rejuvenation. Thread embedding acupuncture has become popular as a minimally invasive treatment. However, there is little clinical evidence in the literature regarding its effects. Methods: This single-arm, prospective, open-label study recruited participants who were women aged 40–59 years, with Glogau photoaging scale III–IV. Fourteen participants received thread embedding acupuncture one time and were measured before and after 1 week from the procedure. The primary outcome was a jowl to subnasale vertical distance. The secondary outcomes were facial wrinkle distances, global esthetic improvement scale, Alexiades–Armenakas laxity scale, and patient-oriented self-assessment scale. Results: Fourteen participants underwent thread embedding acupuncture alone, and 12 participants revisited for follow-up outcome measures. For the primary outcome measure, both jowls were elevated in vertical height by 1.87 mm (left and 1.43 mm (right. Distances of both melolabial and nasolabial folds showed significant improvement. In the Alexiades–Armenakas laxity scale, each evaluator evaluated for four and nine participants by 0.5 grades improved. In the global aesthetic improvement scale, improvement was graded as 1 and 2 in nine and five cases, respectively. The most common adverse events were mild bruising, swelling, and pain. However, adverse events occurred, although mostly minor and of short duration. Conclusion: In this study, thread embedding acupuncture showed clinical potential for facial wrinkles and laxity. However, further large-scale trials with a controlled design and objective measurements are needed. Keywords: polydioxanone, rejuvenation, rhytidoplasty, skin aging, thread embedding acupuncture

  1. An Adaptive and Hybrid Approach for Revisiting the Visibility Pipeline

    Directory of Open Access Journals (Sweden)

    Ícaro Lins Leitão da Cunha

    2016-04-01

    Full Text Available We revisit the visibility problem, which is traditionally known in Computer Graphics and Vision fields as the process of computing a (potentially visible set of primitives in the computational model of a scene. We propose a hybrid solution that uses a dry structure (in the sense of data reduction, a triangulation of the type J1a, to accelerate the task of searching for visible primitives. We came up with a solution that is useful for real-time, on-line, interactive applications as 3D visualization. In such applications the main goal is to load the minimum amount of primitives from the scene during the rendering stage, as possible. For this purpose, our algorithm executes the culling by using a hybrid paradigm based on viewing-frustum, back-face culling and occlusion models. Results have shown substantial improvement over these traditional approaches if applied separately. This novel approach can be used in devices with no dedicated processors or with low processing power, as cell phones or embedded displays, or to visualize data through the Internet, as in virtual museums applications.

  2. Revisiting Okun's Relationship

    NARCIS (Netherlands)

    Dixon, R.; Lim, G.C.; van Ours, Jan

    2016-01-01

    Our paper revisits Okun's relationship between observed unemployment rates and output gaps. We include in the relationship the effect of labour market institutions as well as age and gender effects. Our empirical analysis is based on 20 OECD countries over the period 1985-2013. We find that the

  3. Tourists' perceptions and intention to revisit Norway

    OpenAIRE

    Lazar, Ana Florina; Komolikova-Blindheim, Galyna

    2016-01-01

    Purpose - The overall purpose of this study is to explore tourists' perceptions and their intention to revisit Norway. The aim is to find out what are the factors that drive the overall satisfaction, the willingness to recommend and the revisit intention of international tourists that spend their holiday in Norway. Design-Method-Approach - the Theory of Planned Behavior (Ajzen 1991), is used as a framework to investigate tourists' intention and behavior towards Norway as destination. The o...

  4. Embedded Web Technology: Applying World Wide Web Standards to Embedded Systems

    Science.gov (United States)

    Ponyik, Joseph G.; York, David W.

    2002-01-01

    Embedded Systems have traditionally been developed in a highly customized manner. The user interface hardware and software along with the interface to the embedded system are typically unique to the system for which they are built, resulting in extra cost to the system in terms of development time and maintenance effort. World Wide Web standards have been developed in the passed ten years with the goal of allowing servers and clients to intemperate seamlessly. The client and server systems can consist of differing hardware and software platforms but the World Wide Web standards allow them to interface without knowing about the details of system at the other end of the interface. Embedded Web Technology is the merging of Embedded Systems with the World Wide Web. Embedded Web Technology decreases the cost of developing and maintaining the user interface by allowing the user to interface to the embedded system through a web browser running on a standard personal computer. Embedded Web Technology can also be used to simplify an Embedded System's internal network.

  5. Embedded, everywhere: a research agenda for networked systems of embedded computers

    National Research Council Canada - National Science Library

    Committee on Networked Systems of Embedded Computers; National Research Council Staff; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; National Academy of Sciences

    2001-01-01

    .... Embedded, Everywhere explores the potential of networked systems of embedded computers and the research challenges arising from embedding computation and communications technology into a wide variety of applicationsâ...

  6. Predictors and Outcomes of Revisits in Older Adults Discharged from the Emergency Department.

    Science.gov (United States)

    de Gelder, Jelle; Lucke, Jacinta A; de Groot, Bas; Fogteloo, Anne J; Anten, Sander; Heringhaus, Christian; Dekkers, Olaf M; Blauw, Gerard J; Mooijaart, Simon P

    2018-04-01

    To study predictors of emergency department (ED) revisits and the association between ED revisits and 90-day functional decline or mortality. Multicenter cohort study. One academic and two regional Dutch hospitals. Older adults discharged from the ED (N=1,093). At baseline, data on demographic characteristics, illness severity, and geriatric parameters (cognition, functional capacity) were collected. All participants were prospectively followed for an unplanned revisit within 30 days and for functional decline and mortality 90 days after the initial visit. The median age was 79 (interquartile range 74-84), and 114 participants (10.4%) had an ED revisit within 30 days of discharge. Age (hazard ratio (HR)=0.96, 95% confidence interval (CI)=0.92-0.99), male sex (HR=1.61, 95% CI=1.05-2.45), polypharmacy (HR=2.06, 95% CI=1.34-3.16), and cognitive impairment (HR=1.71, 95% CI=1.02-2.88) were independent predictors of a 30-day ED revisit. The area under the receiver operating characteristic curve to predict an ED revisit was 0.65 (95% CI=0.60-0.70). In a propensity score-matched analysis, individuals with an ED revisit were at higher risk (odds ratio=1.99 95% CI=1.06-3.71) of functional decline or mortality. Age, male sex, polypharmacy, and cognitive impairment were independent predictors of a 30-day ED revisit, but no useful clinical prediction model could be developed. However, an early ED revisit is a strong new predictor of adverse outcomes in older adults. © 2018 The Authors. The Journal of the American Geriatrics Society published by Wiley Periodicals, Inc. on behalf of The American Geriatrics Society.

  7. Sensemaking Revisited

    DEFF Research Database (Denmark)

    Holt, Robin; Cornelissen, Joep

    2014-01-01

    We critique and extend theory on organizational sensemaking around three themes. First, we investigate sense arising non-productively and so beyond any instrumental relationship with things; second, we consider how sense is experienced through mood as well as our cognitive skills of manipulation ...... research by revisiting Weick’s seminal reading of Norman Maclean’s book surrounding the tragic events of a 1949 forest fire at Mann Gulch, USA....

  8. “Dreamers Often Lie”: On “Compromise”, the subversive documentation of an Israeli- Palestinian political adaptation of Shakespeare’s Romeo and Juliet

    Directory of Open Access Journals (Sweden)

    Yael Munk

    2010-03-01

    Full Text Available

    Is Romeo and Juliet relevant to a description of the Middle-East conflict? This is the question raised in Compromise, an Israeli documentary that follows the

  9. Web Server Embedded System

    Directory of Open Access Journals (Sweden)

    Adharul Muttaqin

    2014-07-01

    Full Text Available Abstrak Embedded sistem saat ini menjadi perhatian khusus pada teknologi komputer, beberapa sistem operasi linux dan web server yang beraneka ragam juga sudah dipersiapkan untuk mendukung sistem embedded, salah satu aplikasi yang dapat digunakan dalam operasi pada sistem embedded adalah web server. Pemilihan web server pada lingkungan embedded saat ini masih jarang dilakukan, oleh karena itu penelitian ini dilakukan dengan menitik beratkan pada dua buah aplikasi web server yang tergolong memiliki fitur utama yang menawarkan “keringanan” pada konsumsi CPU maupun memori seperti Light HTTPD dan Tiny HTTPD. Dengan menggunakan parameter thread (users, ramp-up periods, dan loop count pada stress test embedded system, penelitian ini menawarkan solusi web server manakah diantara Light HTTPD dan Tiny HTTPD yang memiliki kecocokan fitur dalam penggunaan embedded sistem menggunakan beagleboard ditinjau dari konsumsi CPU dan memori. Hasil penelitian menunjukkan bahwa dalam hal konsumsi CPU pada beagleboard embedded system lebih disarankan penggunaan Light HTTPD dibandingkan dengan tiny HTTPD dikarenakan terdapat perbedaan CPU load yang sangat signifikan antar kedua layanan web tersebut Kata kunci: embedded system, web server Abstract Embedded systems are currently of particular concern in computer technology, some of the linux operating system and web server variegated also prepared to support the embedded system, one of the applications that can be used in embedded systems are operating on the web server. Selection of embedded web server on the environment is still rarely done, therefore this study was conducted with a focus on two web application servers belonging to the main features that offer a "lightness" to the CPU and memory consumption as Light HTTPD and Tiny HTTPD. By using the parameters of the thread (users, ramp-up periods, and loop count on a stress test embedded systems, this study offers a solution of web server which between the Light

  10. A Structural Equation Model of Risk Perception of Rockfall for Revisit Intention

    OpenAIRE

    Ya-Fen Lee; Yun-Yao Chi

    2014-01-01

    The study aims to explore the relationship between risk perception of rockfall and revisit intention using a Structural Equation Modeling (SEM) analysis. A total of 573 valid questionnaires are collected from travelers to Taroko National Park, Taiwan. The findings show the majority of travelers have the medium perception of rockfall risk, and are willing to revisit the Taroko National Park. The revisit intention to Taroko National Park is influenced by hazardous preferences, willingness-to-pa...

  11. The Faraday effect revisited

    DEFF Research Database (Denmark)

    Cornean, Horia; Nenciu, Gheorghe

    2009-01-01

    This paper is the second in a series revisiting the (effect of) Faraday rotation. We formulate and prove the thermodynamic limit for the transverse electric conductivity of Bloch electrons, as well as for the Verdet constant. The main mathematical tool is a regularized magnetic and geometric...

  12. Remembered Experiences and Revisit Intentions

    DEFF Research Database (Denmark)

    Barnes, Stuart; Mattsson, Jan; Sørensen, Flemming

    2016-01-01

    Tourism is an experience-intensive sector in which customers seek and pay for experiences above everything else. Remembering past tourism experiences is also crucial for an understanding of the present, including the predicted behaviours of visitors to tourist destinations. We adopt a longitudinal...... approach to memory data collection from psychological science, which has the potential to contribute to our understanding of tourist behaviour. In this study, we examine the impact of remembered tourist experiences in a safari park. In particular, using matched survey data collected longitudinally and PLS...... path modelling, we examine the impact of positive affect tourist experiences on the development of revisit intentions. We find that longer-term remembered experiences have the strongest impact on revisit intentions, more so than predicted or immediate memory after an event. We also find that remembered...

  13. Embedded systems handbook

    CERN Document Server

    Zurawski, Richard

    2005-01-01

    Embedded systems are nearly ubiquitous, and books on individual topics or components of embedded systems are equally abundant. Unfortunately, for those designers who thirst for knowledge of the big picture of embedded systems there is not a drop to drink. Until now. The Embedded Systems Handbook is an oasis of information, offering a mix of basic and advanced topics, new solutions and technologies arising from the most recent research efforts, and emerging trends to help you stay current in this ever-changing field.With preeminent contributors from leading industrial and academic institutions

  14. Revisiting the Okun relationship

    NARCIS (Netherlands)

    Dixon, R. (Robert); Lim, G.C.; J.C. van Ours (Jan)

    2017-01-01

    textabstractOur article revisits the Okun relationship between observed unemployment rates and output gaps. We include in the relationship the effect of labour market institutions as well as age and gender effects. Our empirical analysis is based on 20 OECD countries over the period 1985–2013. We

  15. Bounded Intention Planning Revisited

    OpenAIRE

    Sievers Silvan; Wehrle Martin; Helmert Malte

    2014-01-01

    Bounded intention planning provides a pruning technique for optimal planning that has been proposed several years ago. In addition partial order reduction techniques based on stubborn sets have recently been investigated for this purpose. In this paper we revisit bounded intention planning in the view of stubborn sets.

  16. Embedded systems handbook networked embedded systems

    CERN Document Server

    Zurawski, Richard

    2009-01-01

    Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area

  17. Embedded Linux in het onderwijs

    NARCIS (Netherlands)

    Dr Ruud Ermers

    2008-01-01

    Embedded Linux wordt bij steeds meer grote bedrijven ingevoerd als embedded operating system. Binnen de opleiding Technische Informatica van Fontys Hogeschool ICT is Embedded Linux geïntroduceerd in samenwerking met het lectoraat Architectuur van Embedded Systemen. Embedded Linux is als vakgebied

  18. Revisiting Nursing Research in Nigeria

    African Journals Online (AJOL)

    2016-08-18

    Aug 18, 2016 ... health care research, it is therefore pertinent to revisit the state of nursing research in the country. .... platforms, updated libraries with electronic resource ... benchmarks for developing countries of 26%, [17] the amount is still ...

  19. Time functions revisited

    Science.gov (United States)

    Fathi, Albert

    2015-07-01

    In this paper we revisit our joint work with Antonio Siconolfi on time functions. We will give a brief introduction to the subject. We will then show how to construct a Lipschitz time function in a simplified setting. We will end with a new result showing that the Aubry set is not an artifact of our proof of existence of time functions for stably causal manifolds.

  20. Embedding beyond electrostatics

    DEFF Research Database (Denmark)

    Nåbo, Lina J.; Olsen, Jógvan Magnus Haugaard; Holmgaard List, Nanna

    2016-01-01

    We study excited states of cholesterol in solution and show that, in this specific case, solute wave-function confinement is the main effect of the solvent. This is rationalized on the basis of the polarizable density embedding scheme, which in addition to polarizable embedding includes non-electrostatic...... repulsion that effectively confines the solute wave function to its cavity. We illustrate how the inclusion of non-electrostatic repulsion results in a successful identification of the intense π → π∗ transition, which was not possible using an embedding method that only includes electrostatics....... This underlines the importance of non-electrostatic repulsion in quantum-mechanical embedding-based methods....

  1. The data embedding method

    Energy Technology Data Exchange (ETDEWEB)

    Sandford, M.T. II; Bradley, J.N.; Handel, T.G.

    1996-06-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.

  2. Embedded engineering education

    CERN Document Server

    Kaštelan, Ivan; Temerinac, Miodrag; Barak, Moshe; Sruk, Vlado

    2016-01-01

    This book focuses on the outcome of the European research project “FP7-ICT-2011-8 / 317882: Embedded Engineering Learning Platform” E2LP. Additionally, some experiences and researches outside this project have been included. This book provides information about the achieved results of the E2LP project as well as some broader views about the embedded engineering education. It captures project results and applications, methodologies, and evaluations. It leads to the history of computer architectures, brings a touch of the future in education tools and provides a valuable resource for anyone interested in embedded engineering education concepts, experiences and material. The book contents 12 original contributions and will open a broader discussion about the necessary knowledge and appropriate learning methods for the new profile of embedded engineers. As a result, the proposed Embedded Computer Engineering Learning Platform will help to educate a sufficient number of future engineers in Europe, capable of d...

  3. Embedded Processor Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Embedded Processor Laboratory provides the means to design, develop, fabricate, and test embedded computers for missile guidance electronics systems in support...

  4. Revisiting tourist behavior via destination brand worldness

    Directory of Open Access Journals (Sweden)

    Murat Kayak

    2016-11-01

    Full Text Available Taking tourists’ perspective rather than destination offerings as its core concept, this study introduces “perceived destination brand worldness” as a variable. Perceived destination brand worldness is defined as the positive perception that a tourist has of a country that is visited by tourists from all over the world. Then, the relationship between perceived destination brand worldness and intention to revisit is analyzed using partial least squares regression. This empirical study selects Taiwanese tourists as its sample, and the results show that perceived destination brand worldness is a direct predictor of intention to revisit. In light of these empirical findings and observations, practical and theoretical implications are discussed.

  5. Embedded defects

    International Nuclear Information System (INIS)

    Barriola, M.; Vachaspati, T.; Bucher, M.

    1994-01-01

    We give a prescription for embedding classical solutions and, in particular, topological defects in field theories which are invariant under symmetry groups that are not necessarily simple. After providing examples of embedded defects in field theories based on simple groups, we consider the electroweak model and show that it contains the Z string and a one-parameter family of strings called the W(α) string. It is argued that although the members of this family are gauge equivalent when considered in isolation, each member becomes physically distinct when multistring configurations are considered. We then turn to the issue of stability of embedded defects and demonstrate the instability of a large class of such solutions in the absence of bound states or condensates. The Z string is shown to be unstable for all values of the Higgs boson mass when θ W =π/4. W strings are also shown to be unstable for a large range of parameters. Embedded monopoles suffer from the Brandt-Neri-Coleman instability. Finally, we connect the electroweak string solutions to the sphaleron

  6. Revisiting adoption of high transmission PSM: pros, cons and path forward

    Science.gov (United States)

    Ma, Z. Mark; McDonald, Steve; Progler, Chris

    2009-12-01

    High transmission attenuated phase shift masks (Hi-T PSM) have been successfully applied in volume manufacturing for certain memory devices. Moreover, numerous studies have shown the potential benefits of Hi-T PSM for specific lithography applications. In this paper, the potential for extending Hi-T PSM to logic devices, is revisited with an emphasis on understanding layout, transmission, and manufacturing of Hi-T PSM versus traditional 6% embedded attenuated phase shift mask (EAPSM). Simulations on various layouts show Hi-T PSM has advantage over EAPSM in low duty cycle line patterns and high duty cycle space patterns. The overall process window can be enhanced when Hi- T PSM is combined with optimized optical proximity correction (OPC), sub-resolution assist features (SRAF), and source illumination. Therefore, Hi-T PSM may be a viable and lower cost alternative to other complex resolution enhancement technology (RET) approaches. Aerial image measurement system (AIMS) results on test masks, based on an inverse lithography technology (ILT) generated layout, confirm the simulation results. New advancement in high transmission blanks also make low topography Hi-T PSM a reality, which can minimize scattering effects in high NA lithography.

  7. Polymorphic Embedding of DSLs

    DEFF Research Database (Denmark)

    Hofer, Christian; Ostermann, Klaus; Rendel, Tillmann

    2008-01-01

    propose polymorphic embedding of DSLs, where many different interpretations of a DSL can be provided as reusable components, and show how polymorphic embedding can be realized in the programming language Scala. With polymorphic embedding, the static type-safety, modularity, composability and rapid...

  8. Revisiting Inter-Genre Similarity

    DEFF Research Database (Denmark)

    Sturm, Bob L.; Gouyon, Fabien

    2013-01-01

    We revisit the idea of ``inter-genre similarity'' (IGS) for machine learning in general, and music genre recognition in particular. We show analytically that the probability of error for IGS is higher than naive Bayes classification with zero-one loss (NB). We show empirically that IGS does...... not perform well, even for data that satisfies all its assumptions....

  9. A Hydrostatic Paradox Revisited

    Science.gov (United States)

    Ganci, Salvatore

    2012-01-01

    This paper revisits a well-known hydrostatic paradox, observed when turning upside down a glass partially filled with water and covered with a sheet of light material. The phenomenon is studied in its most general form by including the mass of the cover. A historical survey of this experiment shows that a common misunderstanding of the phenomenon…

  10. THE INFLUENCE OF DESTINATION IMAGE AND TOURIST SATISFACTION TOWARD REVISIT INTENTION OF SETU BABAKAN BETAWI CULTURAL VILLAGE

    OpenAIRE

    Wibowo, Setyo Ferry; Sazali, Adnan; Kresnamurti R. P., Agung

    2016-01-01

    The purpose of this research are: 1) To find out the description of destination image, tourist satisfaction, and revisit intention of Betawi cultural village Setu Babakan, 2) test empirically the influence of destination image toward revisit intention of Betawi cultural village Setu Babakan, 3) test empirically the influence of tourist satisfaction toward revisit intention of Betawi cultural village Setu Babakan, 4) test empirically the influence of destination image toward revisit intention ...

  11. Seven Issues, Revisited

    OpenAIRE

    Whitehead, Jim; De Bra, Paul; Grønbæk, Kaj; Larsen, Deena; Legget, John; schraefel, monica m.c.

    2002-01-01

    It has been 15 years since the original presentation by Frank Halasz at Hypertext'87 on seven issues for the next generation of hypertext systems. These issues are: Search and Query Composites Virtual Structures Computation in/over hypertext network Versioning Collaborative Work Extensibility and Tailorability Since that time, these issues have formed the nucleus of multiple research agendas within the Hypertext community. Befitting this direction-setting role, the issues have been revisited ...

  12. 'Felson Signs' revisited

    International Nuclear Information System (INIS)

    George, Phiji P.; Irodi, Aparna; Keshava, Shyamkumar N.; Lamont, Anthony C.

    2014-01-01

    In this article we revisit, with the help of images, those classic signs in chest radiography described by Dr Benjamin Felson himself, or other illustrious radiologists of his time, cited and discussed in 'Chest Roentgenology'. We briefly describe the causes of the signs, their utility and the differential diagnosis to be considered when each sign is seen. Wherever possible, we use CT images to illustrate the basis of some of these classic radiographic signs.

  13. THE INFLUENCE OF DESTINATION IMAGE AND TOURIST SATISFACTION TOWARD REVISIT INTENTION OF SETU BABAKAN BETAWI CULTURAL VILLAGE

    Directory of Open Access Journals (Sweden)

    Setyo Ferry Wibowo

    2016-04-01

    Full Text Available The purpose of this research are: 1 To find out the description of destination image, tourist satisfaction, and revisit intention of Betawi cultural village Setu Babakan, 2 test empirically the influence of destination image toward revisit intention of Betawi cultural village Setu Babakan, 3 test empirically the influence of tourist satisfaction toward revisit intention of Betawi cultural village Setu Babakan, 4 test empirically the influence of destination image toward revisit intention of Betawi cultural village Setu Babakan. The object of this research was 200 respondents who have ever visit to Betawi cultural village Setu Babakan at one time. The results of descriptive test explained that the destination image provided is good according to the tourist, so that the tourist is satisfied and want to revisit intention of Betawi cultural village Setu Babakan. The hypothesis test shows: 1 the influence of destination image toward revisit intention by -30%, 2 the influence of tourist satisfaction toward revisit intention by 118%, 3 the influence of destination image toward tourist satisfaction by 92%.

  14. Time-dependent embedding

    OpenAIRE

    Inglesfield, J. E.

    2007-01-01

    A method of solving the time-dependent Schr\\"odinger equation is presented, in which a finite region of space is treated explicitly, with the boundary conditions for matching the wave-functions on to the rest of the system replaced by an embedding term added on to the Hamiltonian. This time-dependent embedding term is derived from the Fourier transform of the energy-dependent embedding potential, which embeds the time-independent Schr\\"odinger equation. Results are presented for a one-dimensi...

  15. Field tests on partial embedment effects (embedment effect tests on soil-structure interaction)

    International Nuclear Information System (INIS)

    Kurimoto, O.; Tsunoda, T.; Inoue, T.; Izumi, M.; Kusakabe, K.; Akino, K.

    1993-01-01

    A series of Model Tests of Embedment Effect on Reactor Buildings has been carried out by the Nuclear Power Engineering Corporation (NUPEC), under the sponsorship of the Ministry of International Trade and lndustry (MITI) of Japan. The nuclear reactor buildings are partially embedded due to conditions for the construction or building arrangement in Japan. It is necessary to verify the partial embedment effects by experiments and analytical studies in order to incorporate the effects in the seismic design. Forced vibration tests, therefore, were performed using a model with several types of embedment. Correlated simulation analyses were also performed and the characteristics of partial embedment effects on soil-structure interaction were evaluated. (author)

  16. Leadership and Management Theories Revisited

    DEFF Research Database (Denmark)

    Madsen, Mona Toft

    2001-01-01

    The goal of the paper is to revisit and analyze key contributions to the understanding of leadership and management. As a part of the discussion a role perspective that allows for additional and/or integrated leader dimensions, including a change-centered, will be outlined. Seemingly, a major...

  17. Embedded Systems Design: Optimization Challenges

    DEFF Research Database (Denmark)

    Pop, Paul

    2005-01-01

    Summary form only given. Embedded systems are everywhere: from alarm clocks to PDAs, from mobile phones to cars, almost all the devices we use are controlled by embedded systems. Over 99% of the microprocessors produced today are used in embedded systems, and recently the number of embedded systems...

  18. Schroedinger's variational method of quantization revisited

    International Nuclear Information System (INIS)

    Yasue, K.

    1980-01-01

    Schroedinger's original quantization procedure is revisited in the light of Nelson's stochastic framework of quantum mechanics. It is clarified why Schroedinger's proposal of a variational problem led us to a true description of quantum mechanics. (orig.)

  19. O True Apothecary: How Forensic Science Helps Solve a Classic Crime

    Science.gov (United States)

    Harper-Leatherman, Amanda S.; Miecznikowski, John R.

    2012-01-01

    As part of a university-wide project to explore Shakespeare's classic play, "Romeo and Juliet," from a variety of perspectives, an interdisciplinary talk was presented to the university community on the chemistry of the potions and poisons referenced in "Romeo and Juliet." To draw the multidisciplinary audience in and to teach…

  20. A practical method of predicting client revisit intention in a hospital setting.

    Science.gov (United States)

    Lee, Kyun Jick

    2005-01-01

    Data mining (DM) models are an alternative to traditional statistical methods for examining whether higher customer satisfaction leads to higher revisit intention. This study used a total of 906 outpatients' satisfaction data collected from a nationwide survey interviews conducted by professional interviewers on a face-to-face basis in South Korea, 1998. Analyses showed that the relationship between overall satisfaction with hospital services and outpatients' revisit intention, along with word-of-mouth recommendation as intermediate variables, developed into a nonlinear relationship. The five strongest predictors of revisit intention were overall satisfaction, intention to recommend to others, awareness of hospital promotion, satisfaction with physician's kindness, and satisfaction with treatment level.

  1. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  2. Isometric embeddings of 2-spheres by embedding flow for applications in numerical relativity

    International Nuclear Information System (INIS)

    Jasiulek, Michael; Korzyński, Mikołaj

    2012-01-01

    We present a numerical method for solving Weyl's embedding problem which consists in finding a global isometric embedding of a positively curved and positive-definite spherical 2-metric into the Euclidean 3-space. The method is based on a construction introduced by Weingarten and was used in Nirenberg's proof of Weyl's conjecture. The target embedding results as the endpoint of an embedding flow in R 3 beginning at the unit sphere's embedding. We employ spectral methods to handle functions on the surface and to solve various (non)linear elliptic PDEs. The code requires no additional input or steering from the operator and its convergence is guaranteed by the Nirenberg arguments. Possible applications in 3 + 1 numerical relativity range from quasi-local mass and momentum measures to coarse-graining in inhomogeneous cosmological models. (paper)

  3. The Faraday effect revisited: General theory

    DEFF Research Database (Denmark)

    Cornean, Horia Decebal; Nenciu, Gheorghe; Pedersen, Thomas Garm

    This paper is the first in a series revisiting the Faraday effect, or more generally, the theory of electronic quantum transport/optical response in bulk media in the presence of a constant magnetic field. The independent electron approximation is assumed. For free electrons, the transverse...

  4. Revisited

    DEFF Research Database (Denmark)

    Tegtmeier, Silke; Meyer, Verena; Pakura, Stefanie

    2017-01-01

    were captured when they described entrepreneurs. Therefore, this paper aims to revisit gender role stereotypes among young adults. Design/methodology/approach: To measure stereotyping, participants were asked to describe entrepreneurs in general and either women or men in general. The Schein......Purpose: Entrepreneurship is shaped by a male norm, which has been widely demonstrated in qualitative studies. The authors strive to complement these methods by a quantitative approach. First, gender role stereotypes were measured in entrepreneurship. Second, the explicit notions of participants......: The images of men and entrepreneurs show a high and significant congruence (r = 0.803), mostly in those adjectives that are untypical for men and entrepreneurs. The congruence of women and entrepreneurs was low (r = 0.152) and insignificant. Contrary to the participants’ beliefs, their explicit notions did...

  5. Who should do the dishes now? Revisiting gender and housework in contemporary urban South Wales

    OpenAIRE

    Mannay, Dawn

    2016-01-01

    This chapter revisits Jane Pilcher’s (1994) seminal work ‘Who should do the dishes? Three generations of Welsh women talking about men and housework’, which was originally published in Our Sister’s Land: the changing identities of women in Wales. As discussed in the introductory chapter, I began revisiting classic Welsh studies as part of my doctoral study Mothers and daughters on the margins: gender, generation and education (Mannay, 2012); this lead to the later publication of a revisiting ...

  6. Embedding Complementarity in HCI Methods

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    2007-01-01

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded in the tec......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...

  7. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very...... specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention...... and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generation. Describes tools and programming models for multicore embedded systems Emphasizes throughout performance per watt scalability Discusses realistic limits of software parallelization Enables...

  8. The Faraday effect revisited: General theory

    DEFF Research Database (Denmark)

    Cornean, Horia Decebal; Nenciu, Gheorghe; Pedersen, Thomas Garm

    2006-01-01

    This paper is the first in a series revisiting the Faraday effect, or more generally, the theory of electronic quantum transport/optical response in bulk media in the presence of a constant magnetic field. The independent electron approximation is assumed. At zero temperature and zero frequency...

  9. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  10. Advances in embedded computer vision

    CERN Document Server

    Kisacanin, Branislav

    2014-01-01

    This illuminating collection offers a fresh look at the very latest advances in the field of embedded computer vision. Emerging areas covered by this comprehensive text/reference include the embedded realization of 3D vision technologies for a variety of applications, such as stereo cameras on mobile devices. Recent trends towards the development of small unmanned aerial vehicles (UAVs) with embedded image and video processing algorithms are also examined. The authoritative insights range from historical perspectives to future developments, reviewing embedded implementation, tools, technolog

  11. Design Methodologies for Secure Embedded Systems

    CERN Document Server

    Biedermann, Alexander

    2011-01-01

    Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? And how can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration o

  12. Examining Relationships of Destination Image, Service Quality, e-WOM, and Revisit Intention to Sabang Island, Indonesia

    Directory of Open Access Journals (Sweden)

    Rangga Restu Prayogo

    2016-12-01

    Full Text Available The purpose of this research is to study the relationship among destination image, service quality, e-WOM, and revisit intentions in the tourism industry. A questionnaire given to tourists who visit one of the farrest island in western part of Indonesia, Sabang Island and using sampling through the convenience sampling. A structural equation model (SEM test with WarpPLS 3.0 was used to test the relationship between research variables. This research gathered from 150 respondents. The empirical results from PLS-SEM showed that; the destination image positive affect e-WOM and revisit intention; service quality affect e-WOM and revisit intention; e-WOM positive affect to revisit intention tourists. The implications and future research issues were discussed.

  13. Deterministic Graphical Games Revisited

    DEFF Research Database (Denmark)

    Andersson, Daniel; Hansen, Kristoffer Arnsfelt; Miltersen, Peter Bro

    2008-01-01

    We revisit the deterministic graphical games of Washburn. A deterministic graphical game can be described as a simple stochastic game (a notion due to Anne Condon), except that we allow arbitrary real payoffs but disallow moves of chance. We study the complexity of solving deterministic graphical...... games and obtain an almost-linear time comparison-based algorithm for computing an equilibrium of such a game. The existence of a linear time comparison-based algorithm remains an open problem....

  14. Electronics for embedded systems

    CERN Document Server

    Bindal, Ahmet

    2017-01-01

    This book provides semester-length coverage of electronics for embedded systems, covering most common analog and digital circuit-related issues encountered while designing embedded system hardware. It is written for students and young professionals who have basic circuit theory background and want to learn more about passive circuits, diode and bipolar transistor circuits, the state-of-the-art CMOS logic family and its interface with older logic families such as TTL, sensors and sensor physics, operational amplifier circuits to condition sensor signals, data converters and various circuits used in electro-mechanical device control in embedded systems. The book also provides numerous hardware design examples by integrating the topics learned in earlier chapters. The last chapter extensively reviews the combinational and sequential logic design principles to be able to design the digital part of embedded system hardware.

  15. Brauer type embedding problems

    CERN Document Server

    Ledet, Arne

    2005-01-01

    This monograph is concerned with Galois theoretical embedding problems of so-called Brauer type with a focus on 2-groups and on finding explicit criteria for solvability and explicit constructions of the solutions. The advantage of considering Brauer type embedding problems is their comparatively simple condition for solvability in the form of an obstruction in the Brauer group of the ground field. This book presupposes knowledge of classical Galois theory and the attendant algebra. Before considering questions of reducing the embedding problems and reformulating the solvability criteria, the

  16. Embedded Systems Design with FPGAs

    CERN Document Server

    Pnevmatikatos, Dionisios; Sklavos, Nicolas

    2013-01-01

    This book presents methodologies for modern applications of embedded systems design, using field programmable gate array (FPGA) devices.  Coverage includes state-of-the-art research from academia and industry on a wide range of topics, including advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, dynamic reconfiguration and applications. Describes a variety of methodologies for modern embedded systems design;  Implements methodologies presented on FPGAs; Covers a wide variety of applications for reconfigurable embedded systems, including Bioinformatics, Communications and networking, Application acceleration, Medical solutions, Experiments for high energy physics, Astronomy, Aerospace, Biologically inspired systems and Computational fluid dynamics (CFD).

  17. Permutation entropy with vector embedding delays

    Science.gov (United States)

    Little, Douglas J.; Kane, Deb M.

    2017-12-01

    Permutation entropy (PE) is a statistic used widely for the detection of structure within a time series. Embedding delay times at which the PE is reduced are characteristic timescales for which such structure exists. Here, a generalized scheme is investigated where embedding delays are represented by vectors rather than scalars, permitting PE to be calculated over a (D -1 ) -dimensional space, where D is the embedding dimension. This scheme is applied to numerically generated noise, sine wave and logistic map series, and experimental data sets taken from a vertical-cavity surface emitting laser exhibiting temporally localized pulse structures within the round-trip time of the laser cavity. Results are visualized as PE maps as a function of embedding delay, with low PE values indicating combinations of embedding delays where correlation structure is present. It is demonstrated that vector embedding delays enable identification of structure that is ambiguous or masked, when the embedding delay is constrained to scalar form.

  18. Revisiting Hansen Solubility Parameters by Including Thermodynamics

    NARCIS (Netherlands)

    Louwerse, Manuel J; Fernández-Maldonado, Ana María; Rousseau, Simon; Moreau-Masselon, Chloe; Roux, Bernard; Rothenberg, Gadi

    2017-01-01

    The Hansen solubility parameter approach is revisited by implementing the thermodynamics of dissolution and mixing. Hansen's pragmatic approach has earned its spurs in predicting solvents for polymer solutions, but for molecular solutes improvements are needed. By going into the details of entropy

  19. Bottomonium spectrum revisited

    CERN Document Server

    Segovia, Jorge; Entem, David R.; Fernández, Francisco

    2016-01-01

    We revisit the bottomonium spectrum motivated by the recently exciting experimental progress in the observation of new bottomonium states, both conventional and unconventional. Our framework is a nonrelativistic constituent quark model which has been applied to a wide range of hadronic observables from the light to the heavy quark sector and thus the model parameters are completely constrained. Beyond the spectrum, we provide a large number of electromagnetic, strong and hadronic decays in order to discuss the quark content of the bottomonium states and give more insights about the better way to determine their properties experimentally.

  20. YBCO hot-electron bolometers dedicated to THz detection and imaging: Embedding issues

    International Nuclear Information System (INIS)

    Aurino, M; Tuerer, I; Martinez, A; Gensbittel, A; Degardin, A F; Kreisler, A J

    2010-01-01

    High-T c hot-electron bolometers (HEB) are an interesting alternative to other superconducting heterodyne mixers in the terahertz frequency range because of low-cost cooling investment, ultra-wide instantaneous bandwidth and low intrinsic noise level, even at 80 K. A technological process to fabricate stacked yttrium-based (YBCO) / praseodymium-based (PBCO) ultra-thin films (in the 15 to 40 nm thickness range) etched to form 0.5 μm x 0.5 μm constrictions, elaborated on (100) MgO substrates, has been previously described. Ageing effects were also considered, with the consequence of increased electrical resistance, significant degradation of the regular THz response and no HEB mixing action. Electron and UV lithography steps are revisited here to realize HEB mixers based on nano-bridges covered by a log-periodic planar gold antenna, dedicated to the 1 to 7 THz range. Several measures have been attempted to reduce the conversion losses, mainly by considering the embedding issues related to the YBCO nano-bridge impedance matching to the antenna and the design of optimized intermediate frequency circuitry. Antenna simulations were performed and validated through experiments on scaled models at GHz frequencies. Electromagnetic coupling to the incoming radiation was also studied, including crosstalk between neighbour antennas forming a linear imaging array.

  1. Clifford Algebra Implying Three Fermion Generations Revisited

    International Nuclear Information System (INIS)

    Krolikowski, W.

    2002-01-01

    The author's idea of algebraic compositeness of fundamental particles, allowing to understand the existence in Nature of three fermion generations, is revisited. It is based on two postulates. Primo, for all fundamental particles of matter the Dirac square-root procedure √p 2 → Γ (N) ·p works, leading to a sequence N=1, 2, 3, ... of Dirac-type equations, where four Dirac-type matrices Γ (N) μ are embedded into a Clifford algebra via a Jacobi definition introducing four ''centre-of-mass'' and (N - 1) x four ''relative'' Dirac-type matrices. These define one ''centre-of-mass'' and N - 1 ''relative'' Dirac bispinor indices. Secundo, the ''centre-of-mass'' Dirac bispinor index is coupled to the Standard Model gauge fields, while N - 1 ''relative'' Dirac bispinor indices are all free indistinguishable physical objects obeying Fermi statistics along with the Pauli principle which requires the full antisymmetry with respect to ''relative'' Dirac indices. This allows only for three Dirac-type equations with N = 1, 3, 5 in the case of N odd, and two with N = 2, 4 in the case of N even. The first of these results implies unavoidably the existence of three and only three generations of fundamental fermions, namely leptons and quarks, as labelled by the Standard Model signature. At the end, a comment is added on the possible shape of Dirac 3 x 3 mass matrices for four sorts of spin-1/2 fundamental fermions appearing in three generations. For charged leptons a prediction is m τ = 1776.80 MeV, when the input of experimental m e and m μ is used. (author)

  2. Clifford Algebra Implying Three Fermion Generations Revisited

    Science.gov (United States)

    Krolikowski, Wojciech

    2002-09-01

    The author's idea of algebraic compositeness of fundamental particles, allowing to understand the existence in Nature of three fermion generations, is revisited. It is based on two postulates. Primo, for all fundamental particles of matter the Dirac square-root procedure √ {p2} → {Γ }(N)p works, leading to a sequence N = 1,2,3, ... of Dirac-type equations, where four Dirac-type matrices {Γ }(N)μ are embedded into a Clifford algebra via a Jacobi definition introducing four ``centre-of-mass'' and (N-1)× four ``relative'' Dirac-type matrices. These define one ``centre-of-mass'' and (N-1) ``relative'' Dirac bispinor indices. Secundo, the ``centre-of-mass'' Dirac bispinor index is coupled to the Standard Model gauge fields, while (N-1) ``relative'' Dirac bispinor indices are all free indistinguishable physical objects obeying Fermi statistics along with the Pauli principle which requires the full antisymmetry with respect to ``relative'' Dirac indices. This allows only for three Dirac-type equations with N = 1,3,5 in the case of N odd, and two with N = 2,4 in the case of N even. The first of these results implies unavoidably the existence of three and only three generations of fundamental fermions, namely leptons and quarks, as labelled by the Standard Model signature. At the end, a comment is added on the possible shape of Dirac 3x3 mass matrices for four sorts of spin-1/2 fundamental fermions appearing in three generations. For charged leptons a prediction is mτ = 1776.80 MeV, when the input of experimental me and mμ is used.

  3. Hospital revisit rate after a diagnosis of conversion disorder.

    Science.gov (United States)

    Merkler, Alexander E; Parikh, Neal S; Chaudhry, Simriti; Chait, Alanna; Allen, Nicole C; Navi, Babak B; Kamel, Hooman

    2016-04-01

    To estimate the hospital revisit rate of patients diagnosed with conversion disorder (CD). Using administrative data, we identified all patients discharged from California, Florida and New York emergency departments (EDs) and acute care hospitals between 2005 and 2011 with a primary discharge diagnosis of CD. Patients discharged with a primary diagnosis of seizure or transient global amnesia (TGA) served as control groups. Our primary outcome was the rate of repeat ED visits and hospital admissions after initial presentation. Poisson regression was used to compare rates between diagnosis groups while adjusting for demographic characteristics. We identified 7946 patients discharged with a primary diagnosis of CD. During a mean follow-up of 3.0 (±1.6) years, patients with CD had a median of three (IQR, 1-9) ED or inpatient revisits, compared with 0 (IQR, 0-2) in patients with TGA and 3 (IQR, 1-7) in those with seizures. Revisit rates were 18.25 (95% CI, 18.10 to 18.40) visits per 100 patients per month in those with CD, 3.90 (95% CI, 3.84 to 3.95) in those with TGA and 17.78 (95% CI, 17.75 to 17.81) in those with seizures. As compared to CD, the incidence rate ratio for repeat ED visits or hospitalisations was 0.89 (95% CI, 0.86 to 0.93) for seizure disorder and 0.32 (95% CI 0.31 to 0.34) for TGA. CD is associated with a substantial hospital revisit rate. Our findings suggest that CD is not an acute, time-limited response to stress, but rather that CD is a manifestation of a broader pattern of chronic neuropsychiatric disease. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  4. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where ve...

  5. Experimental study of reinforced concrete pile caps with external, embedded and partially embedded socket with smooth interface

    Directory of Open Access Journals (Sweden)

    R. Barros

    Full Text Available On Precast concrete structures the column foundation connections can occur through the socket foundation, which can be embedded, partially embedded or external, with socket walls over the pile caps. This paper presents an experimental study about two pile caps reinforced concrete with external, partially embedded and embedded socket submitted to central load, using 1:2 scaled models. In the analyzed models, the smooth interface between the socket walls and column was considered. The results are compared to a reference model that presents monolithic connections between the column and pile cap. It is observed that the ultimate load of pile cap with external sockets has the same magnitude as the reference pile cap, but the ultimate load of models with partially embedded and embedded socket present less magnitude than the reference model.

  6. The Future of Engineering Education--Revisited

    Science.gov (United States)

    Wankat, Phillip C.; Bullard, Lisa G.

    2016-01-01

    This paper revisits the landmark CEE series, "The Future of Engineering Education," published in 2000 (available free in the CEE archives on the internet) to examine the predictions made in the original paper as well as the tools and approaches documented. Most of the advice offered in the original series remains current. Despite new…

  7. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  8. Poincare ball embeddings of the optical geometry

    International Nuclear Information System (INIS)

    Abramowicz, M A; Bengtsson, I; Karas, V; Rosquist, K

    2002-01-01

    It is shown that the optical geometry of the Reissner-Nordstroem exterior metric can be embedded in a hyperbolic space all the way down to its outer horizon. The adopted embedding procedure removes a breakdown of flat-space embeddings which occurs outside the horizon, at and below the Buchdahl-Bondi limit (R/M=9/4 in the Schwarzschild case). In particular, the horizon can be captured in the optical geometry embedding diagram. Moreover, by using the compact Poincare ball representation of the hyperbolic space, the embedding diagram can cover the whole extent of radius from spatial infinity down to the horizon. Attention is drawn to the advantages of such embeddings in an appropriately curved space: this approach gives compact embeddings and it clearly distinguishes the case of an extremal black hole from a non-extremal one in terms of the topology of the embedded horizon

  9. Homomorphic embeddings in n-groups

    Directory of Open Access Journals (Sweden)

    Mona Cristescu

    2013-06-01

    Full Text Available We prove that an cancellative n-groupoid A can be homotopic embedded in an n-group if and only if in A are satisfied all n-ary Malcev conditions. Now we shall prove that in the presence of associative law we obtain homomorphic embeddings. Furthermore, if A has a lateral identity a such embeddings is assured by a subset of n-ary Malcev conditions - unary Malcev conditions.

  10. Revisiting Weak Simulation for Substochastic Markov Chains

    DEFF Research Database (Denmark)

    Jansen, David N.; Song, Lei; Zhang, Lijun

    2013-01-01

    of the logic PCTL\\x, and its completeness was conjectured. We revisit this result and show that soundness does not hold in general, but only for Markov chains without divergence. It is refuted for some systems with substochastic distributions. Moreover, we provide a counterexample to completeness...

  11. Revisiting the formal foundation of Probabilistic Databases

    NARCIS (Netherlands)

    Wanders, B.; van Keulen, Maurice

    2015-01-01

    One of the core problems in soft computing is dealing with uncertainty in data. In this paper, we revisit the formal foundation of a class of probabilistic databases with the purpose to (1) obtain data model independence, (2) separate metadata on uncertainty and probabilities from the raw data, (3)

  12. Revisiting Mutual Fund Performance Evaluation

    OpenAIRE

    Angelidis, Timotheos; Giamouridis, Daniel; Tessaromatis, Nikolaos

    2012-01-01

    Mutual fund manager excess performance should be measured relative to their self-reported benchmark rather than the return of a passive portfolio with the same risk characteristics. Ignoring the self-reported benchmark introduces biases in the measurement of stock selection and timing components of excess performance. We revisit baseline empirical evidence in mutual fund performance evaluation utilizing stock selection and timing measures that address these biases. We introduce a new factor e...

  13. Embedded Linux projects using Yocto project cookbook

    CERN Document Server

    González, Alex

    2015-01-01

    If you are an embedded developer learning about embedded Linux with some experience with the Yocto project, this book is the ideal way to become proficient and broaden your knowledge with examples that are immediately applicable to your embedded developments. Experienced embedded Yocto developers will find new insight into working methodologies and ARM specific development competence.

  14. Deterministic Graphical Games Revisited

    DEFF Research Database (Denmark)

    Andersson, Klas Olof Daniel; Hansen, Kristoffer Arnsfelt; Miltersen, Peter Bro

    2012-01-01

    Starting from Zermelo’s classical formal treatment of chess, we trace through history the analysis of two-player win/lose/draw games with perfect information and potentially infinite play. Such chess-like games have appeared in many different research communities, and methods for solving them......, such as retrograde analysis, have been rediscovered independently. We then revisit Washburn’s deterministic graphical games (DGGs), a natural generalization of chess-like games to arbitrary zero-sum payoffs. We study the complexity of solving DGGs and obtain an almost-linear time comparison-based algorithm...

  15. Metamorphosis in Craniiformea revisited

    DEFF Research Database (Denmark)

    Altenburger, Andreas; Wanninger, Andreas; Holmer, Lars E.

    2013-01-01

    We revisited the brachiopod fold hypothesis and investigated metamorphosis in the craniiform brachiopod Novocrania anomala. Larval development is lecithotrophic and the dorsal (brachial) valve is secreted by dorsal epithelia. We found that the juvenile ventral valve, which consists only of a thin...... brachiopods during metamorphosis to cement their pedicle to the substrate. N. anomala is therefore not initially attached by a valve but by material corresponding to pedicle cuticle. This is different to previous descriptions, which had led to speculations about a folding event in the evolution of Brachiopoda...

  16. Tensor Train Neighborhood Preserving Embedding

    Science.gov (United States)

    Wang, Wenqi; Aggarwal, Vaneet; Aeron, Shuchin

    2018-05-01

    In this paper, we propose a Tensor Train Neighborhood Preserving Embedding (TTNPE) to embed multi-dimensional tensor data into low dimensional tensor subspace. Novel approaches to solve the optimization problem in TTNPE are proposed. For this embedding, we evaluate novel trade-off gain among classification, computation, and dimensionality reduction (storage) for supervised learning. It is shown that compared to the state-of-the-arts tensor embedding methods, TTNPE achieves superior trade-off in classification, computation, and dimensionality reduction in MNIST handwritten digits and Weizmann face datasets.

  17. Feature-based component model for design of embedded systems

    Science.gov (United States)

    Zha, Xuan Fang; Sriram, Ram D.

    2004-11-01

    An embedded system is a hybrid of hardware and software, which combines software's flexibility and hardware real-time performance. Embedded systems can be considered as assemblies of hardware and software components. An Open Embedded System Model (OESM) is currently being developed at NIST to provide a standard representation and exchange protocol for embedded systems and system-level design, simulation, and testing information. This paper proposes an approach to representing an embedded system feature-based model in OESM, i.e., Open Embedded System Feature Model (OESFM), addressing models of embedded system artifacts, embedded system components, embedded system features, and embedded system configuration/assembly. The approach provides an object-oriented UML (Unified Modeling Language) representation for the embedded system feature model and defines an extension to the NIST Core Product Model. The model provides a feature-based component framework allowing the designer to develop a virtual embedded system prototype through assembling virtual components. The framework not only provides a formal precise model of the embedded system prototype but also offers the possibility of designing variation of prototypes whose members are derived by changing certain virtual components with different features. A case study example is discussed to illustrate the embedded system model.

  18. The hard-core model on random graphs revisited

    International Nuclear Information System (INIS)

    Barbier, Jean; Krzakala, Florent; Zhang, Pan; Zdeborová, Lenka

    2013-01-01

    We revisit the classical hard-core model, also known as independent set and dual to vertex cover problem, where one puts particles with a first-neighbor hard-core repulsion on the vertices of a random graph. Although the case of random graphs with small and very large average degrees respectively are quite well understood, they yield qualitatively different results and our aim here is to reconciliate these two cases. We revisit results that can be obtained using the (heuristic) cavity method and show that it provides a closed-form conjecture for the exact density of the densest packing on random regular graphs with degree K ≥ 20, and that for K > 16 the nature of the phase transition is the same as for large K. This also shows that the hard-code model is the simplest mean-field lattice model for structural glasses and jamming

  19. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Steinmann, Casper; Ruud, Kenneth

    2015-01-01

    We present a new QM/QM/MM-based model for calculating molecular properties and excited states of solute-solvent systems. We denote this new approach the polarizable density embedding (PDE) model and it represents an extension of our previously developed polarizable embedding (PE) strategy. The PDE...... model is a focused computational approach in which a core region of the system studied is represented by a quantum-chemical method, whereas the environment is divided into two other regions: an inner and an outer region. Molecules belonging to the inner region are described by their exact densities...

  20. Fermat Potentials of Embedded Lensing, the Integrated Sachs-Wolfe Effect, and Weak-Lensing of CMB by Cosmic Voids

    Science.gov (United States)

    Chen, Bin; Kantowski, R.; Dai, X.

    2014-01-01

    We have developed an accurate gravitational lens theory for an inhomogeneity embedded in an otherwise homogeneous universe, which to the lowest order is applicable to any mass distribution. We derive the Fermat potential for a spherically symmetric lens embedded in a FLRW cosmology and use it to investigate the late-time integrated Sachs-Wolfe effect (ISW) caused by individual large scale inhomogeneities, in particular, cosmic voids. We present a simple analytical expression for the CMB temperature fluctuation across such a lens as the derivative of the lens Fermat potential. Our formalism is applicable to both linear and nonlinear density evolution scenarios, to arbitrarily large density contrasts, and to all open and closed background cosmologies. Our results are particularly useful for modeling ISW effects extracted through stacking large numbers of cosmic voids and clusters (that is, the aperture photometry method). For structures co-expanding with the background cosmology, i.e., for time-independent density contrasts, we find that the gravitational lensing time delay alone can produce fluctuations of the order of seen in recent observations by WMAP and Planck. We revisit the possibility of explaining the non-Gaussian cold spot on the south hemisphere via the Rees-Sciama effect of a large cosmic void using constraints obtained from the most recent void catalogs and our new void-lensing formalism, and compare it with other explanations such as a collapsing cosmic texture. We also study the remapping of primordial CMB anisotropies, the weak-lensing shear, and magnification caused by void lensing.

  1. The Effects of Korean Medical Service Quality and Satisfaction on Revisit Intention of the United Arab Emirates Government Sponsored Patients.

    Science.gov (United States)

    Lee, Seoyoung; Kim, Eun-Kyung

    2017-06-01

    The purpose of this study was to investigate medical service quality, satisfaction and to examine factors influencing hospital revisit intention of the United Arab Emirates government sponsored patients in Korea. A total of 152 UAE government sponsored patients who visited Korean hospitals participated in the questionnaire survey from August to November 2016. Stepwise multiple regression was used to identify the factors that affected the revisit intention of the participants. The mean scores of medical service quality, satisfaction, and revisit intention were 5.72 out of 7, 88.88 out of 100, 4.59 out of 5, respectively. Medical service quality and satisfaction, Medical service quality and revisit intention, satisfaction and revisit intention were positively correlated. Medical service of physician, visiting routes and responsiveness of medical service quality explained about 23.8% of revisit intention. There are needs for physicians to communicate with patients while ensuring sufficient consultation time based on excellent medical skills and nurses to respond immediately for the patients' needs through an empathic encounter in order to improve medical service quality and patient satisfaction so that to increase the revisit intention of the United Arab Emirates government sponsored patients. Further, it is necessary for the hospitals to have support plans for providing country specialized services in consideration of the UAE culture to ensure that physicians' and nurses' competencies are not undervalued by non-medical service elements such as interpreters and meals. Copyright © 2017. Published by Elsevier B.V.

  2. Phylogenetic trees and Euclidean embeddings.

    Science.gov (United States)

    Layer, Mark; Rhodes, John A

    2017-01-01

    It was recently observed by de Vienne et al. (Syst Biol 60(6):826-832, 2011) that a simple square root transformation of distances between taxa on a phylogenetic tree allowed for an embedding of the taxa into Euclidean space. While the justification for this was based on a diffusion model of continuous character evolution along the tree, here we give a direct and elementary explanation for it that provides substantial additional insight. We use this embedding to reinterpret the differences between the NJ and BIONJ tree building algorithms, providing one illustration of how this embedding reflects tree structures in data.

  3. IDE Support of String-Embedded Languages

    Directory of Open Access Journals (Sweden)

    S. Grigorev

    2014-01-01

    Full Text Available Complex information systems are often implemented by using more than one programming language. Sometimes this variety takes a form of one host and one or few string-embedded languages. Textual representation of clauses in a string-embedded language is built at run time by a host program and then analyzed, compiled or interpreted by a dedicated runtime component (database, web browser etc. Most general-purpose programming languages may play the role of the host; one of the most evident examples of the string-embedded language is the dynamic SQL which was specified in ISO SQL standard and is supported by the majority of DBMS. Standard IDE functionality such as code completion or syntax highlighting can really helps the developers who use this technique. There are several tools providing this functionality, but they all process only one concrete string-embedded language and cannot be easily extended for supporting another language. We present a platform which allows to easily create tools for string-embedded language processing.

  4. Coccolithophorids in polar waters: Wigwamma spp. revisited

    DEFF Research Database (Denmark)

    Thomsen, Helge Abildhauge; Østergaard, Jette B.; Heldal, Mikal

    2013-01-01

    A contingent of weakly calcified coccolithophorid genera and species were described from polar regions almost 40 years ago. In the interim period a few additional findings have been reported enlarging the realm of some of the species. The genus Wigwamma is revisited here with the purpose of provi...... appearance of the coccolith armour of the cell...

  5. Parametric embedding for class visualization.

    Science.gov (United States)

    Iwata, Tomoharu; Saito, Kazumi; Ueda, Naonori; Stromsten, Sean; Griffiths, Thomas L; Tenenbaum, Joshua B

    2007-09-01

    We propose a new method, parametric embedding (PE), that embeds objects with the class structure into a low-dimensional visualization space. PE takes as input a set of class conditional probabilities for given data points and tries to preserve the structure in an embedding space by minimizing a sum of Kullback-Leibler divergences, under the assumption that samples are generated by a gaussian mixture with equal covariances in the embedding space. PE has many potential uses depending on the source of the input data, providing insight into the classifier's behavior in supervised, semisupervised, and unsupervised settings. The PE algorithm has a computational advantage over conventional embedding methods based on pairwise object relations since its complexity scales with the product of the number of objects and the number of classes. We demonstrate PE by visualizing supervised categorization of Web pages, semisupervised categorization of digits, and the relations of words and latent topics found by an unsupervised algorithm, latent Dirichlet allocation.

  6. The significance test controversy revisited the fiducial Bayesian alternative

    CERN Document Server

    Lecoutre, Bruno

    2014-01-01

    The purpose of this book is not only to revisit the “significance test controversy,”but also to provide a conceptually sounder alternative. As such, it presents a Bayesian framework for a new approach to analyzing and interpreting experimental data. It also prepares students and researchers for reporting on experimental results. Normative aspects: The main views of statistical tests are revisited and the philosophies of Fisher, Neyman-Pearson and Jeffrey are discussed in detail. Descriptive aspects: The misuses of Null Hypothesis Significance Tests are reconsidered in light of Jeffreys’ Bayesian conceptions concerning the role of statistical inference in experimental investigations. Prescriptive aspects: The current effect size and confidence interval reporting practices are presented and seriously questioned. Methodological aspects are carefully discussed and fiducial Bayesian methods are proposed as a more suitable alternative for reporting on experimental results. In closing, basic routine procedures...

  7. Cross functional organisational embedded system development

    OpenAIRE

    Lennon, Sophie

    2015-01-01

    peer-reviewed Embedded system development is continuing to grow. Medical, automotive and Internet of Things are just some of the market segments. There is a tight coupling between hardware and software when developing an embedded system, often needing to meet strict performance targets, standards requirements and aggressive schedules. Embedded software developers need to consider hardware requirements in far greater detail as they can have a significant impact on the quality and value of t...

  8. Laser assisted embedding of nanoparticles into metallic materials

    International Nuclear Information System (INIS)

    Lin Dong; Suslov, Sergey; Ye Chang; Liao Yiliang; Liu, C. Richard; Cheng, Gary J.

    2012-01-01

    This paper reports a methodology of half-embedding nanoparticles into metallic materials. Transparent and opaque nanoparticles are chosen to demonstrate the process of laser assisted nanoparticle embedding. Dip coating method is used to coat transparent or opaque nanoparticle on the surface of metallic material. Nanoparticles are embedded into substrate by laser irradiation. In this study, the mechanism and process of nanoparticle embedding are investigated. It is found both transparent and opaque nanoparticles embedding are with high densities and good uniformities.

  9. Projective embeddings of homogeneous spaces with small boundary

    International Nuclear Information System (INIS)

    Arzhantsev, Ivan V

    2009-01-01

    We study open equivariant projective embeddings of homogeneous spaces such that the complement of the open orbit has codimension at least 2. We establish a criterion for the existence of such an embedding, prove that the set of isomorphism classes of such embeddings is finite, and give a construction of the embeddings in terms of Geometric Invariant Theory. A generalization of Cox's construction and the theory of bunched rings enable us to describe in combinatorial terms the basic geometric properties of embeddings with small boundary

  10. Time-Scale Invariant Audio Data Embedding

    Directory of Open Access Journals (Sweden)

    Mansour Mohamed F

    2003-01-01

    Full Text Available We propose a novel algorithm for high-quality data embedding in audio. The algorithm is based on changing the relative length of the middle segment between two successive maximum and minimum peaks to embed data. Spline interpolation is used to change the lengths. To ensure smooth monotonic behavior between peaks, a hybrid orthogonal and nonorthogonal wavelet decomposition is used prior to data embedding. The possible data embedding rates are between 20 and 30 bps. However, for practical purposes, we use repetition codes, and the effective embedding data rate is around 5 bps. The algorithm is invariant after time-scale modification, time shift, and time cropping. It gives high-quality output and is robust to mp3 compression.

  11. Satellite failures revisited

    Science.gov (United States)

    Balcerak, Ernie

    2012-12-01

    In January 1994, the two geostationary satellites known as Anik-E1 and Anik-E2, operated by Telesat Canada, failed one after the other within 9 hours, leaving many northern Canadian communities without television and data services. The outage, which shut down much of the country's broadcast television for hours and cost Telesat Canada more than $15 million, generated significant media attention. Lam et al. used publicly available records to revisit the event; they looked at failure details, media coverage, recovery effort, and cost. They also used satellite and ground data to determine the precise causes of those satellite failures. The researchers traced the entire space weather event from conditions on the Sun through the interplanetary medium to the particle environment in geostationary orbit.

  12. The Activation of Embedded Words in Spoken Word Recognition.

    Science.gov (United States)

    Zhang, Xujin; Samuel, Arthur G

    2015-01-01

    The current study investigated how listeners understand English words that have shorter words embedded in them. A series of auditory-auditory priming experiments assessed the activation of six types of embedded words (2 embedded positions × 3 embedded proportions) under different listening conditions. Facilitation of lexical decision responses to targets (e.g., pig) associated with words embedded in primes (e.g., hamster ) indexed activation of the embedded words (e.g., ham ). When the listening conditions were optimal, isolated embedded words (e.g., ham ) primed their targets in all six conditions (Experiment 1a). Within carrier words (e.g., hamster ), the same set of embedded words produced priming only when they were at the beginning or comprised a large proportion of the carrier word (Experiment 1b). When the listening conditions were made suboptimal by expanding or compressing the primes, significant priming was found for isolated embedded words (Experiment 2a), but no priming was produced when the carrier words were compressed/expanded (Experiment 2b). Similarly, priming was eliminated when the carrier words were presented with one segment replaced by noise (Experiment 3). When cognitive load was imposed, priming for embedded words was again found when they were presented in isolation (Experiment 4a), but not when they were embedded in the carrier words (Experiment 4b). The results suggest that both embedded position and proportion play important roles in the activation of embedded words, but that such activation only occurs under unusually good listening conditions.

  13. Embedding Complementarity in HCI Methods and Techniques

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded in the tec......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...... the HCI paradigm in system development....

  14. Graphical Model Debugger Framework for Embedded Systems

    DEFF Research Database (Denmark)

    Zeng, Kebin

    2010-01-01

    Model Driven Software Development has offered a faster way to design and implement embedded real-time software by moving the design to a model level, and by transforming models to code. However, the testing of embedded systems has remained at the code level. This paper presents a Graphical Model...... Debugger Framework, providing an auxiliary avenue of analysis of system models at runtime by executing generated code and updating models synchronously, which allows embedded developers to focus on the model level. With the model debugger, embedded developers can graphically test their design model...

  15. Pockets of Participation: Revisiting Child-Centred Participation Research

    Science.gov (United States)

    Franks, Myfanwy

    2011-01-01

    This article revisits the theme of the clash of interests and power relations at work in participatory research which is prescribed from above. It offers a possible route toward solving conflict between adult-led research carried out by young researchers, funding requirements and organisational constraints. The article explores issues of…

  16. Faraday effect revisited: sum rules and convergence issues

    DEFF Research Database (Denmark)

    Cornean, Horia; Nenciu, Gheorghe

    2010-01-01

    This is the third paper of a series revisiting the Faraday effect. The question of the absolute convergence of the sums over the band indices entering the Verdet constant is considered. In general, sum rules and traces per unit volume play an important role in solid-state physics, and they give...

  17. Smart multicore embedded systems

    CERN Document Server

    Bertels, Koen; Karlsson, Sven; Pacull, François

    2014-01-01

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very often they are forced to rewrite sequential programs into parallel software, taking into account all the low level features and peculiarities of the underlying platforms. Readers will benefit from these authors’ approach, which takes into account both the application requirements and the platform specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generati...

  18. Energy Efficiency of Task Allocation for Embedded JPEG Systems

    Directory of Open Access Journals (Sweden)

    Yang-Hsin Fan

    2014-01-01

    Full Text Available Embedded system works everywhere for repeatedly performing a few particular functionalities. Well-known products include consumer electronics, smart home applications, and telematics device, and so forth. Recently, developing methodology of embedded systems is applied to conduct the design of cloud embedded system resulting in the applications of embedded system being more diverse. However, the more energy consumes result from the more embedded system works. This study presents hyperrectangle technology (HT to embedded system for obtaining energy saving. The HT adopts drift effect to construct embedded systems with more hardware circuits than software components or vice versa. It can fast construct embedded system with a set of hardware circuits and software components. Moreover, it has a great benefit to fast explore energy consumption for various embedded systems. The effects are presented by assessing a JPEG benchmarks. Experimental results demonstrate that the HT, respectively, achieves the energy saving by 29.84%, 2.07%, and 68.80% on average to GA, GHO, and Lin.

  19. Energy efficiency of task allocation for embedded JPEG systems.

    Science.gov (United States)

    Fan, Yang-Hsin; Wu, Jan-Ou; Wang, San-Fu

    2014-01-01

    Embedded system works everywhere for repeatedly performing a few particular functionalities. Well-known products include consumer electronics, smart home applications, and telematics device, and so forth. Recently, developing methodology of embedded systems is applied to conduct the design of cloud embedded system resulting in the applications of embedded system being more diverse. However, the more energy consumes result from the more embedded system works. This study presents hyperrectangle technology (HT) to embedded system for obtaining energy saving. The HT adopts drift effect to construct embedded systems with more hardware circuits than software components or vice versa. It can fast construct embedded system with a set of hardware circuits and software components. Moreover, it has a great benefit to fast explore energy consumption for various embedded systems. The effects are presented by assessing a JPEG benchmarks. Experimental results demonstrate that the HT, respectively, achieves the energy saving by 29.84%, 2.07%, and 68.80% on average to GA, GHO, and Lin.

  20. The Activation of Embedded Words in Spoken Word Recognition

    Science.gov (United States)

    Zhang, Xujin; Samuel, Arthur G.

    2015-01-01

    The current study investigated how listeners understand English words that have shorter words embedded in them. A series of auditory-auditory priming experiments assessed the activation of six types of embedded words (2 embedded positions × 3 embedded proportions) under different listening conditions. Facilitation of lexical decision responses to targets (e.g., pig) associated with words embedded in primes (e.g., hamster) indexed activation of the embedded words (e.g., ham). When the listening conditions were optimal, isolated embedded words (e.g., ham) primed their targets in all six conditions (Experiment 1a). Within carrier words (e.g., hamster), the same set of embedded words produced priming only when they were at the beginning or comprised a large proportion of the carrier word (Experiment 1b). When the listening conditions were made suboptimal by expanding or compressing the primes, significant priming was found for isolated embedded words (Experiment 2a), but no priming was produced when the carrier words were compressed/expanded (Experiment 2b). Similarly, priming was eliminated when the carrier words were presented with one segment replaced by noise (Experiment 3). When cognitive load was imposed, priming for embedded words was again found when they were presented in isolation (Experiment 4a), but not when they were embedded in the carrier words (Experiment 4b). The results suggest that both embedded position and proportion play important roles in the activation of embedded words, but that such activation only occurs under unusually good listening conditions. PMID:25593407

  1. Costs and benefits of embedded generation

    International Nuclear Information System (INIS)

    1999-11-01

    This project sought to evaluate the costs and benefits of embedded generation in the light of the UK government's consultation paper on the future of green generation, the government's aim to increase the levels of generation from renewable energy sources and cogeneration, the current Review of the Electricity Trading Arrangements, and the form of the Distribution Price Control. Definitions are given for embedded, centrally dispatched, and pooled generation, and licensed suppliers, and commercial and economic values. The commercial and economic value of embedded generation is examined in terms of generation prices, costs to electrical suppliers, losses (electrical, transmission, distribution), and effects on the national grid and distribution network. Diagrams showing the cost elements of trading through the Pool and the elements that are avoided by non-Pool embedded generator trading are presented

  2. Steganographic embedding in containers-images

    Science.gov (United States)

    Nikishova, A. V.; Omelchenko, T. A.; Makedonskij, S. A.

    2018-05-01

    Steganography is one of the approaches to ensuring the protection of information transmitted over the network. But a steganographic method should vary depending on a used container. According to statistics, the most widely used containers are images and the most common image format is JPEG. Authors propose a method of data embedding into a frequency area of images in format JPEG 2000. It is proposed to use the method of Benham-Memon- Yeo-Yeung, in which instead of discrete cosine transform, discrete wavelet transform is used. Two requirements for images are formulated. Structure similarity is chosen to obtain quality assessment of data embedding. Experiments confirm that requirements satisfaction allows achieving high quality assessment of data embedding.

  3. Embedding initial data for black hole collisions

    OpenAIRE

    Romano, Joseph D.; Price, Richard H.

    1994-01-01

    We discuss isometric embedding diagrams for the visualization of initial data for the problem of the head-on collision of two black holes. The problem of constructing the embedding diagrams is explicitly presented for the best studied initial data, the Misner geometry. We present a partial solution of the embedding diagrams and discuss issues related to completing the solution.

  4. Embedded Academic Librarianship: A Review of the Literature

    Directory of Open Access Journals (Sweden)

    Stephanie J. Schulte

    2012-12-01

    Full Text Available Objectives – The purpose of this review is to examine the development of embedded librarianship, its multiple meanings, and activities in practice. The review will also report on published outcomes and future research needs of embedded librarian programs.Methods – A search of current literature was conducted and summarized searching PubMed, CINAHL, Library, Information Science & Technology Abstracts (EBSCO, Academic Search Complete, and ERIC (EBSCO through August 23, 2012. Articles wereselected for inclusion in the review if they reported research findings related to embedded librarianship, if they provided unique case reports about embedded librarian programs, or if they provided substantive editorial comments on the topic. Relevant study findings were assessed for quality and presented in tabular and narrative form.Results – Currently, there is disparity in how embedded librarianship is being definedand used in common practice, ranging from embedding an online component into asingle course to full physical and cultural integration into an academic college orbusiness unit of an organization. Activities of embedded librarians include creatingcourse integrated instruction modules for either face-to-face or online courses, providingin depth research assistance to students or faculty, and co-locating within colleges orcustomer units via office hours for a few hours to all hours per week. Several case reports exist in the recent literature. Few high quality research studies reporting outcomes of librarians or library programs labeled as embedded exist at this point. Some evidence suggests that embedded librarians are effective with regards to student learning of information literacy objectives. Surveys suggest that both students and faculty appreciate embedded librarian services.Conclusion – Most published accounts discuss librarians embedding content and ready access to services in an online course management system. A few notable cases

  5. Modeling of Embedded Human Systems

    Science.gov (United States)

    2013-07-01

    ISAT study [7] for DARPA in 20051 concretized the notion of an embedded human, who is a necessary component of the system. The proposed work integrates...Technology, IEEE Transactions on, vol. 16, no. 2, pp. 229–244, March 2008. [7] C. J. Tomlin and S. S. Sastry, “Embedded humans,” tech. rep., DARPA ISAT

  6. Methodology and Supporting Toolset Advancing Embedded Systems Quality

    DEFF Research Database (Denmark)

    Berger, Michael Stübert; Soler, José; Brewka, Lukasz Jerzy

    2013-01-01

    Software quality is of primary importance in the development of embedded systems that are often used in safety-critical applications. Moreover, as the life cycle of embedded products becomes increasingly tighter, productivity and quality are simultaneously required and closely interrelated towards...... delivering competitive products. In this context, the MODUS (Methodology and supporting toolset advancing embedded systems quality) project aims to provide a pragmatic and viable solution that will allow SMEs to substantially improve their positioning in the embedded-systems development market. This paper...... will describe the MODUS project with focus on the technical methodologies that will be developed advancing embedded system quality....

  7. Quantum thetas on noncommutative Td with general embeddings

    International Nuclear Information System (INIS)

    Chang-Young, Ee; Kim, Hoil

    2008-01-01

    In this paper, we construct quantum theta functions over noncommutative T d with general embeddings. Manin has constructed quantum theta functions from the lattice embedding into vector space x finite group. We extend Manin's construction of quantum thetas to the case of general embedding of vector space x lattice x torus. It turns out that only for the vector space part of the embedding there exists the holomorphic theta vector, while for the lattice part there does not. Furthermore, the so-called quantum translations from embedding into the lattice part become non-additive, while those from the vector space part are additive

  8. AdS2 models in an embedding superspace

    International Nuclear Information System (INIS)

    McKeon, D.G.C.; Sherry, T.N.

    2003-01-01

    An embedding superspace, whose bosonic part is the flat (2+1)-dimensional embedding space for AdS 2 , is introduced. Superfields and several supersymmetric models are examined in the embedded AdS 2 superspace

  9. Short or Long End of the Lever? Associations between Provider Communication of the "Asthma-Action Plan" and Outpatient Revisits for Pediatric Asthma.

    Science.gov (United States)

    Rangachari, Pavani; Mehta, Renuka; Rethemeyer, R Karl; Ferrang, Carole; Dennis, Clifton; Redd, Vickie

    2015-10-01

    At the Children's Hospital of Georgia (CHOG), we found that outpatient revisits for pediatric asthma were significantly above national norms. According to the NIH, costly hospital revisits for asthma can be prevented through guidelines-based self-management of asthma, central to which, is the use of a written Asthma-Action Plan (AAP). The asthma services literature has emphasized the role of the healthcare provider in promoting asthma self-management using the AAP, to prevent hospital revisits. On the other hand, the asthma policy literature has emphasized the need for community-based interventions to promote asthma self-management. A gap remains in understanding the extent of leverage that healthcare providers may have in preventing hospital revisits for asthma, through effective communication of AAP in the outpatient setting. Our study sought to address this gap. We conducted a 6-month intervention to implement "patient-and-family-centered communication of the AAP" in CHOG outpatient clinics, based on the "change-management" theoretical framework. Provider communication of AAP was assessed through a survey of "Parent Understanding of the Child's AAP." A quasi-experimental approach was used to measure outpatient revisits for pediatric asthma, pre- and post-intervention. Survey results showed that provider communication of the AAP was unanimously perceived highly positively by parents of pediatric asthma patients, across various metrics of patient-centered care. However, there were no statistically significant differences in outpatient "revisit behavior" for pediatric asthma between pre- and post-intervention periods after controlling for several demographic variables. Additionally, revisits remained significantly above national norms. Results suggest limited potential of "effective provider communication of AAP," in reducing outpatient revisits for pediatric asthma; and indicate need for broader community-based interventions to address patient life variables

  10. Novel photodefined polymer-embedded vias for silicon interposers

    International Nuclear Information System (INIS)

    Thadesar, Paragkumar A; Bakir, Muhannad S

    2013-01-01

    This paper describes the fabrication and characterization of novel photodefined polymer-embedded vias for silicon interposers. The fabricated polymer-embedded vias can help obtain ∼3.8× reduction in via-to-via capacitance as well as a reduction in insertion loss compared to TSVs with a silicon dioxide liner. Polymer-embedded vias 100 μm in diameter, 270 μm tall and at 250 μm pitch were fabricated. Resistance and leakage measurements were performed for the fabricated polymer-embedded vias. The average value of the measured resistance for 20 polymer-embedded vias is 2.54 mΩ and the maximum measured via-to-via leakage current for 10 pairs of polymer-embedded vias is 80.8 pA for an applied voltage of 200 V. (paper)

  11. Additively homomorphic encryption with a double decryption mechanism, revisited

    NARCIS (Netherlands)

    Peter, Andreas; Kronberg, M.; Trei, W.; Katzenbeisser, S.

    We revisit the notion of additively homomorphic encryption with a double decryption mechanism (DD-PKE), which allows for additions in the encrypted domain while having a master decryption procedure that can decrypt all properly formed ciphertexts by using a special master secret. This type of

  12. Moral Judgment Development across Cultures: Revisiting Kohlberg's Universality Claims

    Science.gov (United States)

    Gibbs, John C.; Basinger, Karen S.; Grime, Rebecca L.; Snarey, John R.

    2007-01-01

    This article revisits Kohlberg's cognitive developmental claims that stages of moral judgment, facilitative processes of social perspective-taking, and moral values are commonly identifiable across cultures. Snarey [Snarey, J. (1985). "The cross-cultural universality of social-moral development: A critical review of Kohlbergian research."…

  13. Isometric embeddings in cosmology and astrophysics

    Indian Academy of Sciences (India)

    embedding theory, a given spacetime (or 'brane') is embedded in a higher- ..... If one recalls that the motivation (at least in part) for non-compact extra ... to successfully embed (apparently perfect fluid) astrophysical models, we typically need to.

  14. Radiative corrections to double-Dalitz decays revisited

    Science.gov (United States)

    Kampf, Karol; Novotný, Jiři; Sanchez-Puertas, Pablo

    2018-03-01

    In this study, we revisit and complete the full next-to-leading order corrections to pseudoscalar double-Dalitz decays within the soft-photon approximation. Comparing to the previous study, we find small differences, which are nevertheless relevant for extracting information about the pseudoscalar transition form factors. Concerning the latter, these processes could offer the opportunity to test them—for the first time—in their double-virtual regime.

  15. Embedded Hyperchaotic Generators: A Comparative Analysis

    Science.gov (United States)

    Sadoudi, Said; Tanougast, Camel; Azzaz, Mohamad Salah; Dandache, Abbas

    In this paper, we present a comparative analysis of FPGA implementation performances, in terms of throughput and resources cost, of five well known autonomous continuous hyperchaotic systems. The goal of this analysis is to identify the embedded hyperchaotic generator which leads to designs with small logic area cost, satisfactory throughput rates, low power consumption and low latency required for embedded applications such as secure digital communications between embedded systems. To implement the four-dimensional (4D) chaotic systems, we use a new structural hardware architecture based on direct VHDL description of the forth order Runge-Kutta method (RK-4). The comparative analysis shows that the hyperchaotic Lorenz generator provides attractive performances compared to that of others. In fact, its hardware implementation requires only 2067 CLB-slices, 36 multipliers and no block RAMs, and achieves a throughput rate of 101.6 Mbps, at the output of the FPGA circuit, at a clock frequency of 25.315 MHz with a low latency time of 316 ns. Consequently, these good implementation performances offer to the embedded hyperchaotic Lorenz generator the advantage of being the best candidate for embedded communications applications.

  16. A Feminist Revisit to the First-Year Curriculum.

    Science.gov (United States)

    Bernstein, Anita

    1996-01-01

    A seminar at Chicago-Kent College of Law (Illinois) that reviews six first-year law school courses by focusing on feminist issues in course content and structure is described. The seminar functions as both a review and a shift in perspective. Courses revisited include civil procedure, contracts, criminal law, justice and the legal system,…

  17. The art of designing embedded systems

    CERN Document Server

    Ganssle, Jack G

    2000-01-01

    Art of Designing Embedded Systems is apart primer and part reference, aimed at practicing embedded engineers, whether working on the code or the hardware design. Embedded systems suffer from a chaotic, ad hoc development process. This books lays out a very simple seven-step plan to get firmware development under control. There are no formal methodologies to master; the ideas are immediately useful. Most designers are unaware that code complexity grows faster than code size. This book shows a number of ways to linearize the complexity/size curve and get products out faster

  18. Embedded Solenoid Transformer for Power Conversion

    DEFF Research Database (Denmark)

    2015-01-01

    A resonant power converter for operation in the radio frequency range, preferably in the VHF, comprises at least one PCB-embedded transformer. The transformer is configured for radio frequency operation and comprises a printed circuit board defining a horizontal plane, the printed circuit board...... comprising at least two horizontal conductive layers separated by an isolating layer, a first embedded solenoid forming a primary winding of the transformer and a second embedded solenoid being arranged parallel to the first solenoid and forming a secondary winding of the transformer, wherein the first...

  19. Bootstrap embedding: An internally consistent fragment-based method

    Energy Technology Data Exchange (ETDEWEB)

    Welborn, Matthew; Tsuchimochi, Takashi; Van Voorhis, Troy [Department of Chemistry, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, Massachusetts 02139 (United States)

    2016-08-21

    Strong correlation poses a difficult problem for electronic structure theory, with computational cost scaling quickly with system size. Fragment embedding is an attractive approach to this problem. By dividing a large complicated system into smaller manageable fragments “embedded” in an approximate description of the rest of the system, we can hope to ameliorate the steep cost of correlated calculations. While appealing, these methods often converge slowly with fragment size because of small errors at the boundary between fragment and bath. We describe a new electronic embedding method, dubbed “Bootstrap Embedding,” a self-consistent wavefunction-in-wavefunction embedding theory that uses overlapping fragments to improve the description of fragment edges. We apply this method to the one dimensional Hubbard model and a translationally asymmetric variant, and find that it performs very well for energies and populations. We find Bootstrap Embedding converges rapidly with embedded fragment size, overcoming the surface-area-to-volume-ratio error typical of many embedding methods. We anticipate that this method may lead to a low-scaling, high accuracy treatment of electron correlation in large molecular systems.

  20. Embedded librarianship what every academic librarian should know

    CERN Document Server

    Russo, Michael F

    2013-01-01

    Is the embedded librarian an equal partner in the course, or is the librarian perceived as a "value-added" extra? What is the place of technology in this effort? Is there a line librarians should not cross? Taking into account both theory and practice to discuss multiple facets of the subject, Embedded Librarianship: What Every Academic Librarian Should Know thoroughly examines these questions and more from the perspectives of experienced embedded librarian contributors who have worked in higher education settings. The chapters illuminate the benefits and challenges of embedding, explain the planning required to set up an embedded course, identify the different forms of embedding, and consider information literacy instruction in various contexts. Readers who will benefit from this work include not only academic librarians but any professor who wants their students to be able to do better research in their fields.

  1. Quantum duel revisited

    International Nuclear Information System (INIS)

    Schmidt, Alexandre G M; Paiva, Milena M

    2012-01-01

    We revisit the quantum two-person duel. In this problem, both Alice and Bob each possess a spin-1/2 particle which models dead and alive states for each player. We review the Abbott and Flitney result—now considering non-zero α 1 and α 2 in order to decide if it is better for Alice to shoot or not the second time—and we also consider a duel where players do not necessarily start alive. This simple assumption allows us to explore several interesting special cases, namely how a dead player can win the duel shooting just once, or how can Bob revive Alice after one shot, and the better strategy for Alice—being either alive or in a superposition of alive and dead states—fighting a dead opponent. (paper)

  2. Multithreading for Embedded Reconfigurable Multicore Systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  3. Multithreading for embedded reconfigurable multicore systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  4. Heterogeneous Embedded Real-Time Systems Environment

    Science.gov (United States)

    2003-12-01

    AFRL-IF-RS-TR-2003-290 Final Technical Report December 2003 HETEROGENEOUS EMBEDDED REAL - TIME SYSTEMS ENVIRONMENT Integrated...HETEROGENEOUS EMBEDDED REAL - TIME SYSTEMS ENVIRONMENT 6. AUTHOR(S) Cosmo Castellano and James Graham 5. FUNDING NUMBERS C - F30602-97-C-0259

  5. The Importance of Being a Complement: CED Effects Revisited

    Science.gov (United States)

    Jurka, Johannes

    2010-01-01

    This dissertation revisits subject island effects (Ross 1967, Chomsky 1973) cross-linguistically. Controlled acceptability judgment studies in German, English, Japanese and Serbian show that extraction out of specifiers is consistently degraded compared to extraction out of complements, indicating that the Condition on Extraction domains (CED,…

  6. The Effect of Brand Equity and Perceived Value on Customer Revisit Intention: A Study in Quick-Service Restaurants in Vietnam

    Directory of Open Access Journals (Sweden)

    Ly Thi Minh Pham

    2016-10-01

    Full Text Available The purpose of this study is to examine how brand equity, from a customer point of view, influences quick-service restaurant revisit intention. The authors propose a conceptual framework in which three dimensions of brand equity including brand associations combined with brand awareness, perceived quality, brand loyalty and perceived value are related to revisit intention. Data from 570 customers who had visited four quick-service restaurants in Ho Chi Minh City were used for the structural equation modelling (SEM analysis. The results show that strong brand equity is significantly correlated with revisit intention. Additionally, the effect of brand equity on revisit intention was mediated by perceived value, among others. Overall, this study emphasizes the importance of perceived value in lodging in the customer’s mind. Finally, managerial implications are presented based on the study results.

  7. Critical points in an algebra of elementary embeddings

    OpenAIRE

    Dougherty, Randall

    1992-01-01

    Given two elementary embeddings from the collection of sets of rank less than $\\lambda$ to itself, one can combine them to obtain another such embedding in two ways: by composition, and by applying one to (initial segments of) the other. Hence, a single such nontrivial embedding $j$ generates an algebra of embeddings via these two operations, which satisfies certain laws (for example, application distributes over both composition and application). Laver has shown, among other things, that thi...

  8. Literary Origins of the Term "School Psychologist" Revisited

    Science.gov (United States)

    Fagan, Thomas K.

    2005-01-01

    Previous research on the literary origins of the term "school psychologist" is revisited, and conclusions are revised in light of new evidence. It appears that the origin of the term in the American literature occurred as early as 1898 in an article by Hugo Munsterberg, predating the usage by Wilhelm Stern in 1911. The early references to the…

  9. A Multi-Level Model of Moral Functioning Revisited

    Science.gov (United States)

    Reed, Don Collins

    2009-01-01

    The model of moral functioning scaffolded in the 2008 "JME" Special Issue is here revisited in response to three papers criticising that volume. As guest editor of that Special Issue I have formulated the main body of this response, concerning the dynamic systems approach to moral development, the problem of moral relativism and the role of…

  10. Short or Long End of the Lever? Associations between Provider Communication of the “Asthma-Action Plan” and Outpatient Revisits for Pediatric Asthma

    Science.gov (United States)

    Rangachari, Pavani; Mehta, Renuka; Rethemeyer, R. Karl; Ferrang, Carole; Dennis, Clifton; Redd, Vickie

    2017-01-01

    Background At the Children’s Hospital of Georgia (CHOG), we found that outpatient revisits for pediatric asthma were significantly above national norms. According to the NIH, costly hospital revisits for asthma can be prevented through guidelines-based self-management of asthma, central to which, is the use of a written Asthma-Action Plan (AAP). Purpose The asthma services literature has emphasized the role of the healthcare provider in promoting asthma self-management using the AAP, to prevent hospital revisits. On the other hand, the asthma policy literature has emphasized the need for community-based interventions to promote asthma self-management. A gap remains in understanding the extent of leverage that healthcare providers may have in preventing hospital revisits for asthma, through effective communication of AAP in the outpatient setting. Our study sought to address this gap. Methods We conducted a 6-month intervention to implement “patient-and-family-centered communication of the AAP” in CHOG outpatient clinics, based on the “change-management” theoretical framework. Provider communication of AAP was assessed through a survey of “Parent Understanding of the Child’s AAP.” A quasi-experimental approach was used to measure outpatient revisits for pediatric asthma, pre- and post-intervention. Results Survey results showed that provider communication of the AAP was unanimously perceived highly positively by parents of pediatric asthma patients, across various metrics of patient-centered care. However, there were no statistically significant differences in outpatient “revisit behavior” for pediatric asthma between pre- and post-intervention periods after controlling for several demographic variables. Additionally, revisits remained significantly above national norms. Conclusions Results suggest limited potential of “effective provider communication of AAP,” in reducing outpatient revisits for pediatric asthma; and indicate need for

  11. Distributed, Embedded and Real-time Java Systems

    CERN Document Server

    Wellings, Andy

    2012-01-01

    Research on real-time Java technology has been prolific over the past decade, leading to a large number of corresponding hardware and software solutions, and frameworks for distributed and embedded real-time Java systems.  This book is aimed primarily at researchers in real-time embedded systems, particularly those who wish to understand the current state of the art in using Java in this domain.  Much of the work in real-time distributed, embedded and real-time Java has focused on the Real-time Specification for Java (RTSJ) as the underlying base technology, and consequently many of the Chapters in this book address issues with, or solve problems using, this framework. Describes innovative techniques in: scheduling, memory management, quality of service and communication systems supporting real-time Java applications; Includes coverage of multiprocessor embedded systems and parallel programming; Discusses state-of-the-art resource management for embedded systems, including Java’s real-time garbage collect...

  12. inclusions revisited

    Directory of Open Access Journals (Sweden)

    S. Migórski

    1995-01-01

    Full Text Available In this paper we confirm the validity of some recent results of Hu, Lakshmikantham, Papageorgiou [4] and Papageorgiou [13] concerning the existence and relaxation for nonlinear evolution inclusions. We fill a gap in the proofs of these results due to the use of incorrect Nagy's compactness embedding theorem.

  13. Reframing in dentistry: Revisited

    Directory of Open Access Journals (Sweden)

    Sivakumar Nuvvula

    2013-01-01

    Full Text Available The successful practice of dentistry involves a good combination of technical skills and soft skills. Soft skills or communication skills are not taught extensively in dental schools and it can be challenging to learn and at times in treating dental patients. Guiding the child′s behavior in the dental operatory is one of the preliminary steps to be taken by the pediatric dentist and one who can successfully modify the behavior can definitely pave the way for a life time comprehensive oral care. This article is an attempt to revisit a simple behavior guidance technique, reframing and explain the possible psychological perspectives behind it for better use in the clinical practice.

  14. Apparatuses And Systems For Embedded Thermoelectric Generators

    KAUST Repository

    Hussain, Muhammad M.; Inayat, Salman Bin; Smith, Casey Eben

    2013-01-01

    An apparatus and a system for embedded thermoelectric generators are disclosed. In one embodiment, the apparatus is embedded in an interface where the ambient temperatures on two sides of the interface are different. In one embodiment, the apparatus is fabricated with the interface in integrity as a unitary piece. In one embodiment, the apparatus includes a first thermoelectric material embedded through the interface. The apparatus further includes a second thermoelectric material embedded through the interface. The first thermoelectric material is electrically coupled to the second thermoelectric material. In one embodiment, the apparatus further includes an output structure coupled to the first thermoelectric material and the second thermoelectric material and configured to output a voltage.

  15. Apparatuses And Systems For Embedded Thermoelectric Generators

    KAUST Repository

    Hussain, Muhammad M.

    2013-08-08

    An apparatus and a system for embedded thermoelectric generators are disclosed. In one embodiment, the apparatus is embedded in an interface where the ambient temperatures on two sides of the interface are different. In one embodiment, the apparatus is fabricated with the interface in integrity as a unitary piece. In one embodiment, the apparatus includes a first thermoelectric material embedded through the interface. The apparatus further includes a second thermoelectric material embedded through the interface. The first thermoelectric material is electrically coupled to the second thermoelectric material. In one embodiment, the apparatus further includes an output structure coupled to the first thermoelectric material and the second thermoelectric material and configured to output a voltage.

  16. Exact solutions for isometric embeddings of pseudo-Riemannian manifolds

    International Nuclear Information System (INIS)

    Amery, G; Moodley, J

    2014-01-01

    Embeddings into higher dimensions are of direct importance in the study of higher dimensional theories of our Universe, in high energy physics and in classical general relativity. Theorems have been established that guarantee the existence of local and global codimension-1 embeddings between pseudo-Riemannian manifolds, particularly for Einstein embedding spaces. A technique has been provided to determine solutions to such embeddings. However, general solutions have not yet been found and most known explicit solutions are for embedded spaces with relatively simple Ricci curvature. Motivated by this, we have considered isometric embeddings of 4-dimensional pseudo-Riemannian spacetimes into 5-dimensional Einstein manifolds. We have applied the technique to treat specific 4-dimensional cases of interest in astrophysics and cosmology (including the global monopole exterior and Vaidya-de Sitter-class solutions), and provided novel physical insights into, for example, Einstein-Gauss-Bonnet gravity. Since difficulties arise in solving the 5-dimensional equations for given 4-dimensional spaces, we have also investigated embedded spaces, which admit bulks with a particular metric form. These analyses help to provide insight to the general embedding problem

  17. Liquid-Embedded Elastomer Electronics

    Science.gov (United States)

    Kramer, Rebecca; Majidi, Carmel; Park, Yong-Lae; Paik, Jamie; Wood, Robert

    2012-02-01

    Hyperelastic sensors are fabricated by embedding a silicone rubber film with microchannels of conductive liquid. In the case of soft tactile sensors, pressing the surface of the elastomer will deform the cross-section of underlying channels and change their electrical resistance. Soft pressure sensors may be employed in a variety of applications. For example, a network of pressure sensors can serve as artificial skin by yielding detailed information about contact pressures. This concept was demonstrated in a hyperelastic keypad, where perpendicular conductive channels form a quasi-planar network within an elastomeric matrix that registers the location, intensity and duration of applied pressure. In a second demonstration, soft curvature sensors were used for joint angle proprioception. Because the sensors are soft and stretchable, they conform to the host without interfering with the natural mechanics of motion. This marked the first use of liquid-embedded elastomer electronics to monitor human or robotic motion. Finally, liquid-embedded elastomers may be implemented as conductors in applications that call for flexible or stretchable circuitry, such as robotic origami.

  18. Modern Embedded Computing Designing Connected, Pervasive, Media-Rich Systems

    CERN Document Server

    Barry, Peter

    2012-01-01

    Modern embedded systems are used for connected, media-rich, and highly integrated handheld devices such as mobile phones, digital cameras, and MP3 players. All of these embedded systems require networking, graphic user interfaces, and integration with PCs, as opposed to traditional embedded processors that can perform only limited functions for industrial applications. While most books focus on these controllers, Modern Embedded Computing provides a thorough understanding of the platform architecture of modern embedded computing systems that drive mobile devices. The book offers a comprehen

  19. Hardware Support for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2012-01-01

    The general Java runtime environment is resource hungry and unfriendly for real-time systems. To reduce the resource consumption of Java in embedded systems, direct hardware support of the language is a valuable option. Furthermore, an implementation of the Java virtual machine in hardware enables...... worst-case execution time analysis of Java programs. This chapter gives an overview of current approaches to hardware support for embedded and real-time Java....

  20. Molecular Properties through Polarizable Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2011-01-01

    We review the theory related to the calculation of electric and magnetic molecular properties through polarizable embedding. In particular, we derive the expressions for the response functions up to the level of cubic response within the density functional theory-based polarizable embedding (PE......-DFT) formalism. In addition, we discuss some illustrative applications related to the calculation of nuclear magnetic resonance parameters, nonlinear optical properties, and electronic excited states in solution....

  1. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...... be answered affirmatively for an idealized Haskell-like language and discuss to which extent Haskell can be used as a meta-language....

  2. Embedded computer systems for control applications in EBR-II

    International Nuclear Information System (INIS)

    Carlson, R.B.; Start, S.E.

    1993-01-01

    The purpose of this paper is to describe the embedded computer systems approach taken at Experimental Breeder Reactor II (EBR-II) for non-safety related systems. The hardware and software structures for typical embedded systems are presented The embedded systems development process is described. Three examples are given which illustrate typical embedded computer applications in EBR-II

  3. Bubbling and on-off intermittency in bailout embeddings.

    Science.gov (United States)

    Cartwright, Julyan H E; Magnasco, Marcelo O; Piro, Oreste; Tuval, Idan

    2003-07-01

    We establish and investigate the conceptual connection between the dynamics of the bailout embedding of a Hamiltonian system and the dynamical regimes associated with the occurrence of bubbling and blowout bifurcations. The roles of the invariant manifold and the dynamics restricted to it, required in bubbling and blowout bifurcating systems, are played in the bailout embedding by the embedded Hamiltonian dynamical system. The Hamiltonian nature of the dynamics is precisely the distinctive feature of this instance of a bubbling or blowout bifurcation. The detachment of the embedding trajectories from the original ones can thus be thought of as transient on-off intermittency, and noise-induced avoidance of some regions of the embedded phase space can be recognized as Hamiltonian bubbling.

  4. Embeddings for the Schwarzschild metric: classification and new results

    International Nuclear Information System (INIS)

    Paston, S A; Sheykin, A A

    2012-01-01

    We suggest a method to search the embeddings of Riemannian spaces with a high enough symmetry in a flat ambient space. It is based on a procedure of construction surfaces with a given symmetry. The method is used to classify the embeddings of the Schwarzschild metric which have the symmetry of this solution, and all such embeddings in a six-dimensional ambient space (i.e. a space with a minimal possible dimension) are constructed. Four of the six possible embeddings are already known, while the two others are new. One of the new embeddings is asymptotically flat, while the other embeddings in a six-dimensional ambient space do not have this property. The asymptotically flat embedding can be of use in the analysis of the many-body problem, as well as for the development of gravity description as a theory of a surface in a flat ambient space. (paper)

  5. Potential-functional embedding theory for molecules and materials.

    Science.gov (United States)

    Huang, Chen; Carter, Emily A

    2011-11-21

    We introduce a potential-functional embedding theory by reformulating a recently proposed density-based embedding theory in terms of functionals of the embedding potential. This potential-functional based theory completes the dual problem in the context of embedding theory for which density-functional embedding theory has existed for two decades. With this potential-functional formalism, it is straightforward to solve for the unique embedding potential shared by all subsystems. We consider charge transfer between subsystems and discuss how to treat fractional numbers of electrons in subsystems. We show that one is able to employ different energy functionals for different subsystems in order to treat different regions with theories of different levels of accuracy, if desired. The embedding potential is solved for by directly minimizing the total energy functional, and we discuss how to efficiently calculate the gradient of the total energy functional with respect to the embedding potential. Forces are also derived, thereby making it possible to optimize structures and account for nuclear dynamics. We also extend the theory to spin-polarized cases. Numerical examples of the theory are given for some homo- and hetero-nuclear diatomic molecules and a more complicated test of a six-hydrogen-atom chain. We also test our theory in a periodic bulk environment with calculations of basic properties of bulk NaCl, by treating each atom as a subsystem. Finally, we demonstrate the theory for water adsorption on the MgO(001)surface.

  6. Revisiting Jack Goody to Rethink Determinisms in Literacy Studies

    Science.gov (United States)

    Collin, Ross

    2013-01-01

    This article revisits Goody's arguments about literacy's influence on social arrangements, culture, cognition, economics, and other domains of existence. Whereas some of his arguments tend toward technological determinism (i.e., literacy causes change in the world), other of his arguments construe literacy as a force that shapes and is shaped by…

  7. A control center design revisited: learning from users’ appropriation

    DEFF Research Database (Denmark)

    Souza da Conceição, Carolina; Cordeiro, Cláudia

    2014-01-01

    This paper aims to present the lessons learned during a control center design project by revisiting another control center from the same company designed two and a half years before by the same project team. In light of the experience with the first project and its analysis, the designers and res...

  8. LSB steganography with improved embedding efficiency and undetectability

    OpenAIRE

    Khalind, Omed; Aziz, Benjamin Yowell Yousif

    2015-01-01

    In this paper, we propose a new method of non-adapt ive LSB steganography in still images to improve the embedding efficiency from 2 to 8/3 rand om bits per one embedding change even for the embedding rate of 1 bit per pixel. The method t akes 2-bits of the secret message at a time and compares them to the LSBs of the two chosen pix el values for embedding, it always assumes a single mismatch between the two and uses the seco nd LSB o...

  9. PENGARUH GUIDE PERFORMANCE DAN QUALITY TOURISM SERVICE TERHADAP REVISIT INTENTION DI KEBUN RAYA BOGOR

    Directory of Open Access Journals (Sweden)

    Rian Andriani

    2016-11-01

    ABSTRACT Bogor Botanical Gardens is one of tourist destination in Bogor City, West Java, which the geographical in a strategic location between two big cities, Jakarta and Bandung. This location factor is can become an opportunity for Bogor Botanical Gardens to become a favorite tourist destination in Bogor City. Guide Performance and Quality Tourism Service is one of part of the tourism, so the researcher focus to Guide Performance and Quality Tourism Service To Revisit Intention in Bogor Botanical Gardens. In this research, the researcher used quantitative methode with descriptive verificative. The researcher used 100 respondent for a sample. In this research, the researcher used multiple linier regresion analysis with hypotesis test used determination coefficient test and F test. The classical assumption of this research is used normality test, multicollinearity test, heteroskedastisitas test and auto correlation test. In this research, the Guide Performance and Quality Tourism Service factors has an influence 33,2% of Revisit Intention in Bogor Botanical Garden. Keywords: Guide Performance, Quality Tourism Service and Revisit Intention

  10. Revisiting the Political Economy of Communication

    Directory of Open Access Journals (Sweden)

    Nicholas Garnham

    2014-02-01

    The task of the paper and the seminar was to revisit some of Nicholas Garnham’s ideas, writings and contributions to the study of the Political Economy of Communication and to reflect on the concepts, history, current status and perspectives of this field and the broader study of political economy today. The topics covered include Raymond Williams’ cultural materialism, Pierre Bourdieu’s sociology of culture, the debate between Political Economy and Cultural Studies, information society theory, Karl Marx’s theory and the critique of capitalism.

  11. Unsupervised Document Embedding With CNNs

    OpenAIRE

    Liu, Chundi; Zhao, Shunan; Volkovs, Maksims

    2017-01-01

    We propose a new model for unsupervised document embedding. Leading existing approaches either require complex inference or use recurrent neural networks (RNN) that are difficult to parallelize. We take a different route and develop a convolutional neural network (CNN) embedding model. Our CNN architecture is fully parallelizable resulting in over 10x speedup in inference time over RNN models. Parallelizable architecture enables to train deeper models where each successive layer has increasin...

  12. Diverse Power Iteration Embeddings and Its Applications

    Energy Technology Data Exchange (ETDEWEB)

    Huang H.; Yoo S.; Yu, D.; Qin, H.

    2014-12-14

    Abstract—Spectral Embedding is one of the most effective dimension reduction algorithms in data mining. However, its computation complexity has to be mitigated in order to apply it for real-world large scale data analysis. Many researches have been focusing on developing approximate spectral embeddings which are more efficient, but meanwhile far less effective. This paper proposes Diverse Power Iteration Embeddings (DPIE), which not only retains the similar efficiency of power iteration methods but also produces a series of diverse and more effective embedding vectors. We test this novel method by applying it to various data mining applications (e.g. clustering, anomaly detection and feature selection) and evaluating their performance improvements. The experimental results show our proposed DPIE is more effective than popular spectral approximation methods, and obtains the similar quality of classic spectral embedding derived from eigen-decompositions. Moreover it is extremely fast on big data applications. For example in terms of clustering result, DPIE achieves as good as 95% of classic spectral clustering on the complex datasets but 4000+ times faster in limited memory environment.

  13. Technical solutions to enable embedded generation growth

    Energy Technology Data Exchange (ETDEWEB)

    Lynch, C.A.; Todd, S.; Millar, W.; Wood, H.S.

    2003-07-01

    This report describes the results of one of a series of studies commissioned by the UK Department of Trade and Industry into various aspects of embedded generation with the aim of supporting the development and deployment of electrical sources (particularly their ease of connection to the network) to deliver power to consumers. The first phase of the project involved a literature review and meetings with embedded generation developers and planning engineers from distribution network operators (DNOs). The second phase investigated embedded generation at different levels of the distribution network and included modelling a representative network. Technologies that could facilitate a significant increase in embedded generation were identified and estimates made of when and where significant development would be needed. Technical problems identified by DNOs were concerned with thermal loading, voltage regulation, fault levels, protection and network operation. A number of non-technical (commercial and regulatory) problems were also identified. The report describes the UK regulatory framework, the present situation, the British power system, the accommodation of embedded generation by established means, the representative model and technical innovations.

  14. An Overview of Reconfigurable Hardware in Embedded Systems

    Directory of Open Access Journals (Sweden)

    Wenyin Fu

    2006-09-01

    Full Text Available Over the past few years, the realm of embedded systems has expanded to include a wide variety of products, ranging from digital cameras, to sensor networks, to medical imaging systems. Consequently, engineers strive to create ever smaller and faster products, many of which have stringent power requirements. Coupled with increasing pressure to decrease costs and time-to-market, the design constraints of embedded systems pose a serious challenge to embedded systems designers. Reconfigurable hardware can provide a flexible and efficient platform for satisfying the area, performance, cost, and power requirements of many embedded systems. This article presents an overview of reconfigurable computing in embedded systems, in terms of benefits it can provide, how it has already been used, design issues, and hurdles that have slowed its adoption.

  15. Time-dependent potential-functional embedding theory

    International Nuclear Information System (INIS)

    Huang, Chen; Libisch, Florian; Peng, Qing; Carter, Emily A.

    2014-01-01

    We introduce a time-dependent potential-functional embedding theory (TD-PFET), in which atoms are grouped into subsystems. In TD-PFET, subsystems can be propagated by different suitable time-dependent quantum mechanical methods and their interactions can be treated in a seamless, first-principles manner. TD-PFET is formulated based on the time-dependent quantum mechanics variational principle. The action of the total quantum system is written as a functional of the time-dependent embedding potential, i.e., a potential-functional formulation. By exploiting the Runge-Gross theorem, we prove the uniqueness of the time-dependent embedding potential under the constraint that all subsystems share a common embedding potential. We derive the integral equation that such an embedding potential needs to satisfy. As proof-of-principle, we demonstrate TD-PFET for a Na 4 cluster, in which each Na atom is treated as one subsystem and propagated by time-dependent Kohn-Sham density functional theory (TDDFT) using the adiabatic local density approximation (ALDA). Our results agree well with a direct TDDFT calculation on the whole Na 4 cluster using ALDA. We envision that TD-PFET will ultimately be useful for studying ultrafast quantum dynamics in condensed matter, where key regions are solved by highly accurate time-dependent quantum mechanics methods, and unimportant regions are solved by faster, less accurate methods

  16. Fast and effective embedded systems design applying the ARM mbed

    CERN Document Server

    Toulson, Rob

    2012-01-01

    A hands-on introduction to the field of embedded systems; A focus on fast prototyping of embedded systems; All key embedded system concepts covered through simple and effective experimentation; An understanding of ARM technology, one of the world's leaders; A practical introduction to embedded C; Applies possibly the most accessible set of tools available in the embedded world.  This book is an introduction to embedded systems design, using the ARM mbed and C programming language as development tools. The mbed provides a compact, self-contained and low-cost hardware core, and the

  17. Hybrid Message-Embedded Cipher Using Logistic Map

    OpenAIRE

    Mishra, Mina; Mankar, V. H.

    2012-01-01

    The proposed hybrid message embedded scheme consists of hill cipher combined with message embedded chaotic scheme. Message-embedded scheme using non-linear feedback shift register as non-linear function and 1-D logistic map as chaotic map is modified, analyzed and tested for avalanche property and strength against known plaintext attack and brute-force attack. Parameter of logistic map acts as a secret key. As we know that the minimum key space to resist brute-force attack is 2100, and it is ...

  18. The vacuum structure, special relativity theory and quantum mechanics revisited: a field theory-no-geometry approach

    International Nuclear Information System (INIS)

    Bogolubov, N.N. Jr.; Prykarpatsky, A.K.; Ufuk Taneri

    2008-07-01

    The main fundamental principles characterizing the vacuum field structure are formulated and the modeling of the related vacuum medium and charged point particle dynamics by means of de- vised field theoretic tools are analyzed. The Maxwell electrodynamic theory is revisited and newly derived from the suggested vacuum field structure principles and the classical special relativity theory relationship between the energy and the corresponding point particle mass is revisited and newly obtained. The Lorentz force expression with respect to arbitrary non-inertial reference frames is revisited and discussed in detail, and some new interpretations of relations between the special relativity theory and quantum mechanics are presented. The famous quantum-mechanical Schroedinger type equations for a relativistic point particle in the external potential and magnetic fields within the quasiclassical approximation as the Planck constant (h/2π) → 0 and the light velocity c → ∞ are obtained. (author)

  19. K Mbugua The Problem of Hell Revisited pp93-103

    African Journals Online (AJOL)

    K Mbugua

    The Problem of Hell Revisited: Towards a Gentler Theology of Hell 93 ... One who, after He has killed, has authority to cast into hell; yes, I tell you, fear. Him! .... Suppose your spouse or parent or child goes to hell and you go to heaven.

  20. What matters to infrequent customers: a pragmatic approach to understanding perceived value and intention to revisit trendy coffee café.

    Science.gov (United States)

    Ting, Hiram; Thurasamy, Ramayah

    2016-01-01

    Notwithstanding the rise of trendy coffee café, little is done to investigate revisit intention towards the café in the context of developing markets. In particular, there is a lack of study which provides theoretical and practical explanation to the perceptions and behaviours of infrequent customers. Hence, the study aims to look into the subject matter by using the theory of reasoned action and social exchange theory as the underpinning basis. The framework proposed by Pine and Gilmore (Strat Leadersh 28:18-23, 2000), which asserts the importance of product quality, service quality and experience quality in a progressive manner, is used to decompose perceived value in the model so as to determine their effects on intention to revisit the café. Given the importance to gain practical insights into revisit intention of infrequent customers, pragmatism stance is assumed. Explanatory sequential mixed-method design is thus adopted whereby qualitative approach is used to confirm and complement quantitative findings. Self-administered questionnaire-based survey is first administered before personal interview is carried out at various cafés. Partial least squares structural equation modelling and content analysis are appropriated successively. In the quantitative findings, although product quality, service quality and experience quality are found to have positive effect on perceived value and revisit intention towards trendy coffee café, experience quality is found to have the greater effect than the others among the infrequent customers. The qualitative findings not only confirm their importance, but most importantly explain the favourable impressions they have at trendy coffee café based on their last in-store experience. While product and service quality might not necessary stimulate them to revisit trendy coffee café, experience quality driven by purposes of visit would likely affect their intention to revisit. As retaining customers is of utmost importance to

  1. Integrated Design and Implementation of Embedded Control Systems with Scilab.

    Science.gov (United States)

    Ma, Longhua; Xia, Feng; Peng, Zhe

    2008-09-05

    Embedded systems are playing an increasingly important role in control engineering. Despite their popularity, embedded systems are generally subject to resource constraints and it is therefore difficult to build complex control systems on embedded platforms. Traditionally, the design and implementation of control systems are often separated, which causes the development of embedded control systems to be highly timeconsuming and costly. To address these problems, this paper presents a low-cost, reusable, reconfigurable platform that enables integrated design and implementation of embedded control systems. To minimize the cost, free and open source software packages such as Linux and Scilab are used. Scilab is ported to the embedded ARM-Linux system. The drivers for interfacing Scilab with several communication protocols including serial, Ethernet, and Modbus are developed. Experiments are conducted to test the developed embedded platform. The use of Scilab enables implementation of complex control algorithms on embedded platforms. With the developed platform, it is possible to perform all phases of the development cycle of embedded control systems in a unified environment, thus facilitating the reduction of development time and cost.

  2. Integrated Design and Implementation of Embedded Control Systems with Scilab

    Directory of Open Access Journals (Sweden)

    Zhe Peng

    2008-09-01

    Full Text Available Embedded systems are playing an increasingly important role in control engineering. Despite their popularity, embedded systems are generally subject to resource constraints and it is therefore difficult to build complex control systems on embedded platforms. Traditionally, the design and implementation of control systems are often separated, which causes the development of embedded control systems to be highly timeconsuming and costly. To address these problems, this paper presents a low-cost, reusable, reconfigurable platform that enables integrated design and implementation of embedded control systems. To minimize the cost, free and open source software packages such as Linux and Scilab are used. Scilab is ported to the embedded ARM-Linux system. The drivers for interfacing Scilab with several communication protocols including serial, Ethernet, and Modbus are developed. Experiments are conducted to test the developed embedded platform. The use of Scilab enables implementation of complex control algorithms on embedded platforms. With the developed platform, it is possible to perform all phases of the development cycle of embedded control systems in a unified environment, thus facilitating the reduction of development time and cost.

  3. Radiative corrections to neutrino deep inelastic scattering revisited

    International Nuclear Information System (INIS)

    Arbuzov, Andrej B.; Bardin, Dmitry Yu.; Kalinovskaya, Lidia V.

    2005-01-01

    Radiative corrections to neutrino deep inelastic scattering are revisited. One-loop electroweak corrections are re-calculated within the automatic SANC system. Terms with mass singularities are treated including higher order leading logarithmic corrections. Scheme dependence of corrections due to weak interactions is investigated. The results are implemented into the data analysis of the NOMAD experiment. The present theoretical accuracy in description of the process is discussed

  4. Doppler Processing with Ultra-Wideband (UWB) Radar Revisited

    Science.gov (United States)

    2018-01-01

    REPORT TYPE Technical Note 3. DATES COVERED (From - To) December 2017 4. TITLE AND SUBTITLE Doppler Processing with Ultra-Wideband (UWB) Radar...unlimited. 13. SUPPLEMENTARY NOTES 14. ABSTRACT This technical note revisits previous work performed at the US Army Research Laboratory related to...target considered previously is proportional to a delayed version of the transmitted signal, up to a complex constant factor. We write the received

  5. Dynamics of Shape Fluctuations of Quasi-spherical Vesicles Revisited

    DEFF Research Database (Denmark)

    Miao, L.; Lomholt, Michael Andersen; Kleis, J.

    2002-01-01

    In this paper, the dynamics of spontaneous shape fluctuations of a single, giant quasi-spherical vesicle formed from a single lipid species is revisited theoretically. A coherent physical theory for the dynamics is developed based on a number of fundamental principles and considerations, and a sy......In this paper, the dynamics of spontaneous shape fluctuations of a single, giant quasi-spherical vesicle formed from a single lipid species is revisited theoretically. A coherent physical theory for the dynamics is developed based on a number of fundamental principles and considerations...... of the phenomenological constants in a canonical continuum description of fluid lipid-bilayer membranes and shown the consequences of this new interpretation in terms of the characteristics of the dynamics of vesicle shape fluctuations. Moreover, we have used the systematic formulation of our theory as a framework...... against which we have discussed the previously existing theories and their discrepancies. Finally, we have made a systematic prediction about the system-dependent characteristics of the relaxation dynamics of shape fluctuations of quasi-spherical vesicles with a view of experimental studies...

  6. Revisiting Constructivist Teaching Methods in Ontario Colleges Preparing for Accreditation

    Science.gov (United States)

    Schultz, Rachel A.

    2015-01-01

    At the time of writing, the first community colleges in Ontario were preparing for transition to an accreditation model from an audit system. This paper revisits constructivist literature, arguing that a more pragmatic definition of constructivism effectively blends positivist and interactionist philosophies to achieve both student centred…

  7. Thorbecke Revisited : The Role of Doctrinaire Liberalism in Dutch Politics

    NARCIS (Netherlands)

    Drentje, Jan

    2011-01-01

    Thorbecke Revisited: The Role of Doctrinaire Liberalism in Dutch Politics In the political history of the nineteenth century Thorbecke played a crucial role. As the architect of the 1848 liberal constitutional reform he led three cabinets. In many ways he dominated the political discourse during the

  8. Revisiting Cementoblastoma with a Rare Case Presentation

    Directory of Open Access Journals (Sweden)

    Vijayanirmala Subramani

    2017-01-01

    Full Text Available Cementoblastoma is a rare benign odontogenic neoplasm which is characterized by the proliferation of cellular cementum. Diagnosis of cementoblastoma is challenging because of its protracted clinical, radiographic features, and bland histological appearance; most often cementoblastoma is often confused with other cementum and bone originated lesions. The aim of this article is to overview/revisit, approach the diagnosis of cementoblastoma, and also present a unique radiographic appearance of a cementoblastoma lesion associated with an impacted tooth.

  9. Autonomous Multicamera Tracking on Embedded Smart Cameras

    Directory of Open Access Journals (Sweden)

    Bischof Horst

    2007-01-01

    Full Text Available There is currently a strong trend towards the deployment of advanced computer vision methods on embedded systems. This deployment is very challenging since embedded platforms often provide limited resources such as computing performance, memory, and power. In this paper we present a multicamera tracking method on distributed, embedded smart cameras. Smart cameras combine video sensing, processing, and communication on a single embedded device which is equipped with a multiprocessor computation and communication infrastructure. Our multicamera tracking approach focuses on a fully decentralized handover procedure between adjacent cameras. The basic idea is to initiate a single tracking instance in the multicamera system for each object of interest. The tracker follows the supervised object over the camera network, migrating to the camera which observes the object. Thus, no central coordination is required resulting in an autonomous and scalable tracking approach. We have fully implemented this novel multicamera tracking approach on our embedded smart cameras. Tracking is achieved by the well-known CamShift algorithm; the handover procedure is realized using a mobile agent system available on the smart camera network. Our approach has been successfully evaluated on tracking persons at our campus.

  10. Self-Organization in Embedded Real-Time Systems

    CERN Document Server

    Brinkschulte, Uwe; Rettberg, Achim

    2013-01-01

    This book describes the emerging field of self-organizing, multicore, distributed and real-time embedded systems.  Self-organization of both hardware and software can be a key technique to handle the growing complexity of modern computing systems. Distributed systems running hundreds of tasks on dozens of processors, each equipped with multiple cores, requires self-organization principles to ensure efficient and reliable operation. This book addresses various, so-called Self-X features such as self-configuration, self-optimization, self-adaptation, self-healing and self-protection. Presents open components for embedded real-time adaptive and self-organizing applications; Describes innovative techniques in: scheduling, memory management, quality of service, communications supporting organic real-time applications; Covers multi-/many-core embedded systems supporting real-time adaptive systems and power-aware, adaptive hardware and software systems; Includes case studies of open embedded real-time self-organizi...

  11. Poincaré Embeddings for Learning Hierarchical Representations

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Abstracts: Representation learning has become an invaluable approach for learning from symbolic data such as text and graphs. However, while complex symbolic datasets often exhibit a latent hierarchical structure, state-of-the-art methods typically do not account for this property. In this talk, I will discuss a new approach for learning hierarchical representations of symbolic data by embedding them into hyperbolic space -- or more precisely into an n-dimensional Poincaré ball. Due to the underlying hyperbolic geometry, this allows us to learn parsimonious representations of symbolic data by simultaneously capturing hierarchy and similarity. We introduce an efficient algorithm to learn the embeddings based on Riemannian optimization and show experimentally that Poincaré embeddings outperform Euclidean embeddings significantly on data with latent hierarchies, both in terms of representation capacity and in terms of generalization ability.      &...

  12. Embedded data representations

    DEFF Research Database (Denmark)

    Willett, Wesley; Jansen, Yvonne; Dragicevic, Pierre

    2017-01-01

    We introduce embedded data representations, the use of visual and physical representations of data that are deeply integrated with the physical spaces, objects, and entities to which the data refers. Technologies like lightweight wireless displays, mixed reality hardware, and autonomous vehicles...

  13. Two diverse models of embedding class one

    Science.gov (United States)

    Kuhfittig, Peter K. F.

    2018-05-01

    Embedding theorems have continued to be a topic of interest in the general theory of relativity since these help connect the classical theory to higher-dimensional manifolds. This paper deals with spacetimes of embedding class one, i.e., spacetimes that can be embedded in a five-dimensional flat spacetime. These ideas are applied to two diverse models, a complete solution for a charged wormhole admitting a one-parameter group of conformal motions and a new model to explain the flat rotation curves in spiral galaxies without the need for dark matter.

  14. Secure smart embedded devices, platforms and applications

    CERN Document Server

    Markantonakis, Konstantinos

    2013-01-01

    New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and consider

  15. Development of an Erlang System Adaopted to Embedded Devices

    OpenAIRE

    Andersson, Fredrik; Bergström, Fabian

    2011-01-01

    Erlang is a powerful and robust language for writing massively parallel and distributed applications. With the introduction of multi-core ARM processors, the embedded market will be looking for ways of taking advantage of the newfound opportunities for parallelism. To support the development of embedded applications using Erlang we want to provide Erlang and Embedded developers with a run-time system suited for embedded devices. We have managed to shrink the disk size of the Erlang runtime sy...

  16. Embedding methods for phi4-interaction

    International Nuclear Information System (INIS)

    Hanckowiak, J.

    1985-01-01

    The idea of embedding a given theory in a class of similar theories is applied to quantum field theory in the case of phi 4 -interaction to derive different equations for the generating functional. The number of possible embeddings has been restricted by demanding that for the defined projections of the generating functional a closed system of equations be obtained

  17. Embedded Systems Design with 8051 Microcontrollers

    DEFF Research Database (Denmark)

    Karakahayov, Zdravko; Winther, Ole; Christensen, Knud Smed

    Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator.......Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator....

  18. ASSESSMENT OF SEISMIC ANALYSIS METHODOLOGIES FOR DEEPLY EMBEDDED NPP STRUCTURES

    International Nuclear Information System (INIS)

    XU, J.; MILLER, C.; COSTANTINO, C.; HOFMAYER, C.; GRAVES, H. NRC.

    2005-01-01

    Several of the new generation nuclear power plant designs have structural configurations which are proposed to be deeply embedded. Since current seismic analysis methodologies have been applied to shallow embedded structures (e.g., ASCE 4 suggest that simple formulations may be used to model embedment effect when the depth of embedment is less than 30% of its foundation radius), the US Nuclear Regulatory Commission is sponsoring a program at the Brookhaven National Laboratory with the objective of investigating the extent to which procedures acceptable for shallow embedment depths are adequate for larger embedment depths. This paper presents the results of a study comparing the response spectra obtained from two of the more popular analysis methods for structural configurations varying from shallow embedment to complete embedment. A typical safety related structure embedded in a soil profile representative of a typical nuclear power plant site was utilized in the study and the depths of burial (DOB) considered range from 25-100% the height of the structure. Included in the paper are: (1) the description of a simplified analysis and a detailed approach for the SSI analyses of a structure with various DOB, (2) the comparison of the analysis results for the different DOBs between the two methods, and (3) the performance assessment of the analysis methodologies for SSI analyses of deeply embedded structures. The resulting assessment from this study has indicated that simplified methods may be capable of capturing the seismic response for much deeper embedded structures than would be normally allowed by the standard practice

  19. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Reinholdt, Peter; Kongsted, Jacob; Olsen, Jógvan Magnus Haugaard

    2017-01-01

    We analyze the performance of the polarizable density embedding (PDE) model-a new multiscale computational approach designed for prediction and rationalization of general molecular properties of large and complex systems. We showcase how the PDE model very effectively handles the use of large...

  20. Implementation of an embedded computer

    OpenAIRE

    Pikl, Bojan

    2011-01-01

    The goal of this thesis is to describe a production of an embedded computer. The thesis describes development and production of an embedded computer for the medical diode laser DL30 that is being developed in Robomed d.o.o.. The first part of the thesis describes the choice of hardware devices. I mostly describe the technologies that one can buy on the market. Moreover for every part of the computer installed and developed there is an argument why we selected that exact part. The second part ...

  1. Quantum Thetas on Noncommutative T^d with General Embeddings

    OpenAIRE

    Chang-Young, Ee; Kim, Hoil

    2007-01-01

    In this paper we construct quantum theta functions over noncommutative T^d with general embeddings. Manin has constructed quantum theta functions from the lattice embedding into vector space x finite group. We extend Manin's construction of quantum thetas to the case of general embedding of vector space x lattice x torus. It turns out that only for the vector space part of the embedding there exists the holomorphic theta vector, while for the lattice part there does not. Furthermore, the so-c...

  2. Experimental study on embedment effect of foundation, 2

    International Nuclear Information System (INIS)

    Ohtomo, Keizo; Toma, Junichi; Hashimoto, Koichi; Hanada, Kazutake; Ueshima, Teruyuki; Yajima, Hiroshi

    1986-01-01

    In order to make clear the dynamic behavior of a embeded foundation on the quarternary ground experimentally, a series of forced vibration tests and seismic observation on both the small foundation (4 x 4 x 3 m) and the embeded form larger scale foundation of the shaking table (16 x 16 x 7.7 m) were conducted at the same site. The purposes this study are evaluating the dynamic behavior and the characteristics of dynamic stiffness and damping of the larger foundation based on forced vibration tests, and applying them to the dynamic response analysis of variable embedded foundations. In this report, the authors first examine frequency dependent property and its theoretical tendency of dynamic stiffness and damping surrounding table foundation. And then, consider an applicability and point of discussion related with the some theories which influence the embedment effect, in contrast with the experimental datum of the model foundation are past studies on a embedment effect (JPDR, Large-Scale Foundation in Tadotsu). (author)

  3. Programming Embedded Systems With C and GNU Development Tools

    CERN Document Server

    Barr, Michael

    2009-01-01

    Whether you're writing your first embedded program, designing the latest generation of hand-held whatchamacalits, or managing the people who do, this book is for you. Programming Embedded Systems will help you develop the knowledge and skills you need to achieve proficiency with embedded software.

  4. Increased 30-Day Emergency Department Revisits Among Homeless Patients with Mental Health Conditions

    Directory of Open Access Journals (Sweden)

    Chun Nok Lam

    2016-09-01

    Full Text Available Introduction: Patients with mental health conditions frequently use emergency medical services. Many suffer from substance use and homelessness. If they use the emergency department (ED as their primary source of care, potentially preventable frequent ED revisits and hospital readmissions can worsen an already crowded healthcare system. However, the magnitude to which homelessness affects health service utilization among patients with mental health conditions remains unclear in the medical community. This study assessed the impact of homelessness on 30-day ED revisits and hospital readmissions among patients presenting with mental health conditions in an urban, safety-net hospital. Methods: We conducted a secondary analysis of administrative data on all adult ED visits in 2012 in an urban safety-net hospital. Patient demographics, mental health status, homelessness, insurance coverage, level of acuity, and ED disposition per ED visit were analyzed using multilevel modeling to control for multiple visits nested within patients. We performed multivariate logistic regressions to evaluate if homelessness moderated the likelihood of mental health patients’ 30-day ED revisits and hospital readmissions. Results: Study included 139,414 adult ED visits from 92,307 unique patients (43.5±15.1 years, 51.3% male, 68.2% Hispanic/Latino. Nearly 8% of patients presented with mental health conditions, while 4.6% were homeless at any time during the study period. Among patients with mental health conditions, being homeless contributed to an additional 28.0% increase in likelihood (4.28 to 5.48 odds of 30-day ED revisits and 38.2% increase in likelihood (2.04 to 2.82 odds of hospital readmission, compared to non-homeless, non-mental health (NHNM patients as the base category. Adjusted predicted probabilities showed that homeless patients presenting with mental health conditions have a 31.1% chance of returning to the ED within 30-day post discharge and a 3

  5. Feasibility study on embedded transport core calculations

    International Nuclear Information System (INIS)

    Ivanov, B.; Zikatanov, L.; Ivanov, K.

    2007-01-01

    The main objective of this study is to develop an advanced core calculation methodology based on embedded diffusion and transport calculations. The scheme proposed in this work is based on embedded diffusion or SP 3 pin-by-pin local fuel assembly calculation within the framework of the Nodal Expansion Method (NEM) diffusion core calculation. The SP 3 method has gained popularity in the last 10 years as an advanced method for neutronics calculation. NEM is a multi-group nodal diffusion code developed, maintained and continuously improved at the Pennsylvania State University. The developed calculation scheme is a non-linear iteration process, which involves cross-section homogenization, on-line discontinuity factors generation, and boundary conditions evaluation by the global solution passed to the local calculation. In order to accomplish the local calculation, a new code has been developed based on the Finite Elements Method (FEM), which is capable of performing both diffusion and SP 3 calculations. The new code will be used in the framework of the NEM code in order to perform embedded pin-by-pin diffusion and SP 3 calculations on fuel assembly basis. The development of the diffusion and SP 3 FEM code is presented first following by its application to several problems. Description of the proposed embedded scheme is provided next as well as the obtained preliminary results of the C3 MOX benchmark. The results from the embedded calculations are compared with direct pin-by-pin whole core calculations in terms of accuracy and efficiency followed by conclusions made about the feasibility of the proposed embedded approach. (authors)

  6. Unsteady Flame Embedding

    KAUST Repository

    El-Asrag, Hossam A.

    2011-01-01

    Direct simulation of all the length and time scales relevant to practical combustion processes is computationally prohibitive. When combustion processes are driven by reaction and transport phenomena occurring at the unresolved scales of a numerical simulation, one must introduce a dynamic subgrid model that accounts for the multiscale nature of the problem using information available on a resolvable grid. Here, we discuss a model that captures unsteady flow-flame interactions- including extinction, re-ignition, and history effects-via embedded simulations at the subgrid level. The model efficiently accounts for subgrid flame structure and incorporates detailed chemistry and transport, allowing more accurate prediction of the stretch effect and the heat release. In this chapter we first review the work done in the past thirty years to develop the flame embedding concept. Next we present a formulation for the same concept that is compatible with Large Eddy Simulation in the flamelet regimes. The unsteady flame embedding approach (UFE) treats the flame as an ensemble of locally one-dimensional flames, similar to the flamelet approach. However, a set of elemental one-dimensional flames is used to describe the turbulent flame structure directly at the subgrid level. The calculations employ a one-dimensional unsteady flame model that incorporates unsteady strain rate, curvature, and mixture boundary conditions imposed by the resolved scales. The model is used for closure of the subgrid terms in the context of large eddy simulation. Direct numerical simulation (DNS) data from a flame-vortex interaction problem is used for comparison. © Springer Science+Business Media B.V. 2011.

  7. TTCN-3 for distributed testing embedded systems

    NARCIS (Netherlands)

    Blom, S.C.C.; Deiß, T.; Ioustinova, N.; Kontio, A.; Pol, van de J.C.; Rennoch, A.; Sidorova, N.; Virbitskaite, I.; Voronkov, A.

    2007-01-01

    Abstract. TTCN-3 is a standardized language for specifying and executing test suites that is particularly popular for testing embedded systems. Prior to testing embedded software in a target environment, the software is usually tested in the host environment. Executing in the host environment often

  8. Advanced Technologies, Embedded and Multimedia for Human-Centric Computing

    CERN Document Server

    Chao, Han-Chieh; Deng, Der-Jiunn; Park, James; HumanCom and EMC 2013

    2014-01-01

    The theme of HumanCom and EMC are focused on the various aspects of human-centric computing for advances in computer science and its applications, embedded and multimedia computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of human-centric computing. And the theme of EMC (Advanced in Embedded and Multimedia Computing) is focused on the various aspects of embedded system, smart grid, cloud and multimedia computing, and it provides an opportunity for academic, industry professionals to discuss the latest issues and progress in the area of embedded and multimedia computing. Therefore this book will be include the various theories and practical applications in human-centric computing and embedded and multimedia computing.

  9. Homogeneous Spaces and Equivariant Embeddings

    CERN Document Server

    Timashev, DA

    2011-01-01

    Homogeneous spaces of linear algebraic groups lie at the crossroads of algebraic geometry, theory of algebraic groups, classical projective and enumerative geometry, harmonic analysis, and representation theory. By standard reasons of algebraic geometry, in order to solve various problems on a homogeneous space it is natural and helpful to compactify it keeping track of the group action, i.e. to consider equivariant completions or, more generally, open embeddings of a given homogeneous space. Such equivariant embeddings are the subject of this book. We focus on classification of equivariant em

  10. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, Rene Rydhof

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety......-critical applications, a predictable Java processor built with FPGA technology, and an Eclipse based application development environment that binds the profile and the platform together and provides analyses that help to provide evidence that can be used as part of a safety case. This paper summarizes key contributions...

  11. Morphware - Fremtidens Embedded System Platform

    DEFF Research Database (Denmark)

    Madsen, Jan

    2006-01-01

    FPGA'er bliver i stigende grad brugt som komponenter i embedded systemer. Faldende priser, større kapacitet og en større felksibilitet har gjort FPGA'en til en attraktiv og konkurrencedygtig teknologi der tillader en stadig stigende grad af system integration, hvor traditionel hardware og software...... kombineres og rekonfigureres. Muligheden for at rekonfigurere systemet, og specielt rekonfigurerer det medens det kører, giver nogle helt nye muligheder for at designe og programmere embedded systemer. Dette foredrag vil give et indblik i disse nye og fremtidige muligheder....

  12. Small Private Key PKS on an Embedded Microprocessor

    OpenAIRE

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor...

  13. A Resource-Aware Component Model for Embedded Systems

    OpenAIRE

    Vulgarakis, Aneta

    2009-01-01

    Embedded systems are microprocessor-based systems that cover a large range of computer systems from ultra small computer-based devices to large systems monitoring and controlling complex processes. The particular constraints that must be met by embedded systems, such as timeliness, resource-use efficiency, short time-to-market and low cost, coupled with the increasing complexity of embedded system software, demand technologies and processes that will tackle these issues. An attractive approac...

  14. Multi-purpose passive debugging for embedded wireless

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    Debugging embedded wireless systems can be cumbersome and hard due to low visibility. To ease the task of debugging we propose a multi-purpose passive debugging framework, called TinyDebug, for developing embedded wireless systems. TinyDebug is designed to be used throughout the entire system...

  15. Patron perception and utilization of an embedded librarian program.

    Science.gov (United States)

    Blake, Lindsay; Ballance, Darra; Davies, Kathy; Gaines, Julie K; Mears, Kim; Shipman, Peter; Connolly-Brown, Maryska; Burchfield, Vicki

    2016-07-01

    The study measured the perceived value of an academic library's embedded librarian service model. The study took place at the health sciences campuses of a research institution. A web-based survey was distributed that asked respondents a series of questions about their utilization of and satisfaction with embedded librarians and services. Over 58% of respondents reported being aware of their embedded librarians, and 95% of these were satisfied with provided services. The overall satisfaction with services was encouraging, but awareness of the embedded program was low, suggesting an overall need for marketing of services.

  16. PCB Embedded Inductor for High-Frequency ZVS SEPIC Converter

    DEFF Research Database (Denmark)

    Dou, Yi; Ouyang, Ziwei; Thummala, Prasanth

    2018-01-01

    The volume and temperature rise of passive components, especially inductors, limit the momentum toward high power density in high-frequency power converters. To address the limitations, PCB integration of passive components should be considered with the benefit of low profile, excellent thermal...... characteristic and cost reduction. This paper investigates an embedded structure of inductors to further increase the power density of a low power DC-DC converter. A pair of coupling inductors have been embedded into the PCB. The detailed embedded process has been described and the characteristics of embedded...

  17. Surface tension in soap films: revisiting a classic demonstration

    International Nuclear Information System (INIS)

    Behroozi, F

    2010-01-01

    We revisit a classic demonstration for surface tension in soap films and introduce a more striking variation of it. The demonstration shows how the film, pulling uniformly and normally on a loose string, transforms it into a circular arc under tension. The relationship between the surface tension and the string tension is analysed and presented in a useful graphical form. (letters and comments)

  18. The Neutrosophic Logic View to Schrodinger's Cat Paradox, Revisited

    Directory of Open Access Journals (Sweden)

    Florentin Smarandache

    2008-07-01

    Full Text Available The present article discusses Neutrosophic logic view to Schrodinger's cat paradox. We argue that this paradox involves some degree of indeterminacy (unknown which Neutrosophic logic can take into consideration, whereas other methods including Fuzzy logic cannot. To make this proposition clear, we revisit our previous paper by offering an illustration using modified coin tossing problem, known as Parrondo's game.

  19. Surface tension in soap films: revisiting a classic demonstration

    Energy Technology Data Exchange (ETDEWEB)

    Behroozi, F [Department of Physics, University of Northern Iowa, Cedar Falls, IA 50614 (United States)], E-mail: behroozi@uni.edu

    2010-01-15

    We revisit a classic demonstration for surface tension in soap films and introduce a more striking variation of it. The demonstration shows how the film, pulling uniformly and normally on a loose string, transforms it into a circular arc under tension. The relationship between the surface tension and the string tension is analysed and presented in a useful graphical form. (letters and comments)

  20. Revisiting the quantum harmonic oscillator via unilateral Fourier transforms

    International Nuclear Information System (INIS)

    Nogueira, Pedro H F; Castro, Antonio S de

    2016-01-01

    The literature on the exponential Fourier approach to the one-dimensional quantum harmonic oscillator problem is revised and criticized. It is shown that the solution of this problem has been built on faulty premises. The problem is revisited via the Fourier sine and cosine transform method and the stationary states are properly determined by requiring definite parity and square-integrable eigenfunctions. (paper)

  1. Transport benchmarks for one-dimensional binary Markovian mixtures revisited

    International Nuclear Information System (INIS)

    Malvagi, F.

    2013-01-01

    The classic benchmarks for transport through a binary Markovian mixture are revisited to look at the probability distribution function of the chosen 'results': reflection, transmission and scalar flux. We argue that the knowledge of the ensemble averaged results is not sufficient for reliable predictions: a measure of the dispersion must also be obtained. An algorithm to estimate this dispersion is tested. (author)

  2. STFTP: Secure TFTP Protocol for Embedded Multi-Agent Systems Communication

    Directory of Open Access Journals (Sweden)

    ZAGAR, D.

    2013-05-01

    Full Text Available Today's embedded systems have evolved into multipurpose devices moving towards an embedded multi-agent system (MAS infrastructure. With the involvement of MAS in embedded systems, one remaining issues is establishing communication between agents in low computational power and low memory embedded systems without present Embedded Operating System (EOS. One solution is the extension of an outdated Trivial File Transfer Protocol (TFTP. The main advantage of using TFTP in embedded systems is the easy implementation. However, the problem at hand is the overall lack of security mechanisms in TFTP. This paper proposes an extension to the existing TFTP in a form of added security mechanisms: STFTP. The authentication is proposed using Digest Access Authentication process whereas the data encryption can be performed by various cryptographic algorithms. The proposal is experimentally tested using two embedded systems based on micro-controller architecture. Communication is analyzed for authentication, data rate and transfer time versus various data encryption ciphers and files sizes. STFTP results in an expected drop in performance, which is in the range of similar encryption algorithms. The system could be improved by using embedded systems of higher computational power or by the use of hardware encryption modules.

  3. Resolution of Reflection Seismic Data Revisited

    DEFF Research Database (Denmark)

    Hansen, Thomas Mejer; Mosegaard, Klaus; Zunino, Andrea

    The Rayleigh Principle states that the minimum separation between two reflectors that allows them to be visually separated is the separation where the wavelet maxima from the two superimposed reflections combine into one maximum. This happens around Δtres = λb/8, where λb is the predominant...... lower vertical resolution of reflection seismic data. In the following we will revisit think layer model and demonstrate that there is in practice no limit to the vertical resolution using the parameterization of Widess (1973), and that the vertical resolution is limited by the noise in the data...

  4. Experiences as an embedded librarian in online courses.

    Science.gov (United States)

    Konieczny, Alison

    2010-01-01

    Embedded librarianship gives librarians a prime opportunity to have a direct, positive impact in a clinical setting, classroom setting, or within a working group by providing integrated services that cater to the group's needs. Extending embedded librarian services beyond the various physical settings and into online classrooms is an exceptional way for librarians to engage online learners. This group of students is growing rapidly in numbers and could benefit greatly from having library services and resources incorporated into their classes. The author's services as an embedded librarian in fully online courses at a medium-sized university will be discussed, as will strategies, lessons learned, and opportunities for engaging in this realm. To develop a foundation of knowledge on embedded librarianship, an overview of this topic is provided.

  5. Comparison of Video Steganography Methods for Watermark Embedding

    Directory of Open Access Journals (Sweden)

    Griberman David

    2016-05-01

    Full Text Available The paper focuses on the comparison of video steganography methods for the purpose of digital watermarking in the context of copyright protection. Four embedding methods that use Discrete Cosine and Discrete Wavelet Transforms have been researched and compared based on their embedding efficiency and fidelity. A video steganography program has been developed in the Java programming language with all of the researched methods implemented for experiments. The experiments used 3 video containers with different amounts of movement. The impact of the movement has been addressed in the paper as well as the ways of potential improvement of embedding efficiency using adaptive embedding based on the movement amount. Results of the research have been verified using a survey with 17 participants.

  6. Earthquake response of nuclear reactor buildings deeply embedded in soil

    International Nuclear Information System (INIS)

    Masao, T.; Takasaki, Y.; Hirasawa, M.; Okajima, M.; Yamamoto, S.; Kawata, E.; Koori, Y.; Ochiai, S.; Shimizu, N.

    1980-01-01

    This paper is concerned with experimental and analytical studies to investigate dynamic behavior of deeply embedded structures such as nuclear reactor buildings. The principal points studied are as follows: (1) Examination of stiffness and radiation damping effects according to embedded depth, (2) verification for distributions of earth pressure according to embedded depth, (3) differences of response characteristics during oscillation according to embedded depth, and (4) proposal of an analytical method for seismic design. Experimental studies were performed by two ways: forced vibration test, and earthquake observation against a rigid body model embedded in soil. Three analytical procedures were performed to compare experimental results and to examine the relation between each procedure. Finally, the dynamic behavior for nuclear reactor buildings with different embedded depths were evaluated by an analytical method. (orig.)

  7. Embedding in thermosetting resins

    International Nuclear Information System (INIS)

    Buzonniere, A. de

    1985-01-01

    Medium activity waste coming either from nuclear power plants in operation such as evaporator concentrates, spent resins, filter cartridges or the dismantling of installations are embedded in order to obtain a product suitable for long term disposal. Embedding in thermosetting resins (polyester or epoxy) is one among currently used techniques; it is being developed by the CEA (Commissariat a l'Energie Atomique) and Technicatome (subsidiary of CEA and EDF). The process is easy to operate and yields excellent results particularly as far as volume reduction and radioelement containment (cesium particularly) are concerned. The process has already been in operation in four stationary plants for several years. Extension of the process to mobile units has been completed by Technicatome in collaboration with the CEA [fr

  8. Embedding of the radiation cosmos

    International Nuclear Information System (INIS)

    Wang, J.Z.

    1986-01-01

    The embedding of the Friedmann manifold into a higher dimensional Minkowski space is investigated. As solutions of the Friedmann equation with vanishing cosmological term, Friedmann models describe a first expanding, then contracting universe and predict a big bang singularity. For cosmic time t → 0, R(t) → 0, there is an infinite scalar, curvature in the matter cosmos, and an infinite eigenvalue corresponding to the unique timelike eigenvector of the energy-momentum tensor in the radiation cosmos. The big bang, therefore, is an intrinsic singularity of the space time. To investigate the singularity one resorts to the embedding of the Friedmann manifold into a higher dimensional Minkowski space. For the matter cosmos such an investigation has already been done (Lauro and Schucking, 1984). However, the matter cosmos is not a suitable model to discuss the very early universe where the radiation dominates. Geometric properties, such as the Riemann tensor, the Guassian curvature and the global behavior of the geodesics of the embedded manifold, are discussed in detail

  9. Sloan Digital Sky Survey Photometric Calibration Revisited

    International Nuclear Information System (INIS)

    Marriner, John

    2012-01-01

    The Sloan Digital Sky Survey calibration is revisited to obtain the most accurate photometric calibration. A small but significant error is found in the flat-fielding of the Photometric telescope used for calibration. Two SDSS star catalogs are compared and the average difference in magnitude as a function of right ascension and declination exhibits small systematic errors in relative calibration. The photometric transformation from the SDSS Photometric Telescope to the 2.5 m telescope is recomputed and compared to synthetic magnitudes computed from measured filter bandpasses.

  10. REVISITING A CLASSIC: THE PARKER–MOFFATT PROBLEM

    International Nuclear Information System (INIS)

    Pezzi, O.; Servidio, S.; Valentini, F.; Malara, F.; Veltri, P.; Parashar, T. N.; Yang, Y.; Matthaeus, W. H.; Vásconez, C. L.

    2017-01-01

    The interaction of two colliding Alfvén wave packets is described here by means of magnetohydrodynamics (MHD) and hybrid kinetic numerical simulations. The MHD evolution revisits the theoretical insights described by Moffatt, Parker, Kraichnan, Chandrasekhar, and Elsässer in which the oppositely propagating large-amplitude wave packets interact for a finite time, initiating turbulence. However, the extension to include compressive and kinetic effects, while maintaining the gross characteristics of the simpler classic formulation, also reveals intriguing features that go beyond the pure MHD treatment.

  11. REVISITING A CLASSIC: THE PARKER–MOFFATT PROBLEM

    Energy Technology Data Exchange (ETDEWEB)

    Pezzi, O.; Servidio, S.; Valentini, F.; Malara, F.; Veltri, P. [Dipartimento di Fisica, Università della Calabria, 87036 Rende (CS) (Italy); Parashar, T. N.; Yang, Y.; Matthaeus, W. H. [Department of Physics and Astronomy, University of Delaware, DE 19716 (United States); Vásconez, C. L. [Departamento de Física, Escuela Politécnica Nacional, Quito (Ecuador)

    2017-01-10

    The interaction of two colliding Alfvén wave packets is described here by means of magnetohydrodynamics (MHD) and hybrid kinetic numerical simulations. The MHD evolution revisits the theoretical insights described by Moffatt, Parker, Kraichnan, Chandrasekhar, and Elsässer in which the oppositely propagating large-amplitude wave packets interact for a finite time, initiating turbulence. However, the extension to include compressive and kinetic effects, while maintaining the gross characteristics of the simpler classic formulation, also reveals intriguing features that go beyond the pure MHD treatment.

  12. Sloan Digital Sky Survey Photometric Calibration Revisited

    Energy Technology Data Exchange (ETDEWEB)

    Marriner, John; /Fermilab

    2012-06-29

    The Sloan Digital Sky Survey calibration is revisited to obtain the most accurate photometric calibration. A small but significant error is found in the flat-fielding of the Photometric telescope used for calibration. Two SDSS star catalogs are compared and the average difference in magnitude as a function of right ascension and declination exhibits small systematic errors in relative calibration. The photometric transformation from the SDSS Photometric Telescope to the 2.5 m telescope is recomputed and compared to synthetic magnitudes computed from measured filter bandpasses.

  13. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  14. Noncommutativity and Duality through the Symplectic Embedding Formalism

    Directory of Open Access Journals (Sweden)

    Everton M.C. Abreu

    2010-07-01

    Full Text Available This work is devoted to review the gauge embedding of either commutative and noncommutative (NC theories using the symplectic formalism framework. To sum up the main features of the method, during the process of embedding, the infinitesimal gauge generators of the gauge embedded theory are easily and directly chosen. Among other advantages, this enables a greater control over the final Lagrangian and brings some light on the so-called ''arbitrariness problem''. This alternative embedding formalism also presents a way to obtain a set of dynamically dual equivalent embedded Lagrangian densities which is obtained after a finite number of steps in the iterative symplectic process, oppositely to the result proposed using the BFFT formalism. On the other hand, we will see precisely that the symplectic embedding formalism can be seen as an alternative and an efficient procedure to the standard introduction of the Moyal product in order to produce in a natural way a NC theory. In order to construct a pedagogical explanation of the method to the nonspecialist we exemplify the formalism showing that the massive NC U(1 theory is embedded in a gauge theory using this alternative systematic path based on the symplectic framework. Further, as other applications of the method, we describe exactly how to obtain a Lagrangian description for the NC version of some systems reproducing well known theories. Naming some of them, we use the procedure in the Proca model, the irrotational fluid model and the noncommutative self-dual model in order to obtain dual equivalent actions for these theories. To illustrate the process of noncommutativity introduction we use the chiral oscillator and the nondegenerate mechanics.

  15. Spatially Partitioned Embedded Runge--Kutta Methods

    KAUST Repository

    Ketcheson, David I.

    2013-10-30

    We study spatially partitioned embedded Runge--Kutta (SPERK) schemes for partial differential equations (PDEs), in which each of the component schemes is applied over a different part of the spatial domain. Such methods may be convenient for problems in which the smoothness of the solution or the magnitudes of the PDE coefficients vary strongly in space. We focus on embedded partitioned methods as they offer greater efficiency and avoid the order reduction that may occur in nonembedded schemes. We demonstrate that the lack of conservation in partitioned schemes can lead to nonphysical effects and propose conservative additive schemes based on partitioning the fluxes rather than the ordinary differential equations. A variety of SPERK schemes are presented, including an embedded pair suitable for the time evolution of fifth-order weighted nonoscillatory spatial discretizations. Numerical experiments are provided to support the theory.

  16. Spatially Partitioned Embedded Runge--Kutta Methods

    KAUST Repository

    Ketcheson, David I.; MacDonald, Colin B.; Ruuth, Steven J.

    2013-01-01

    We study spatially partitioned embedded Runge--Kutta (SPERK) schemes for partial differential equations (PDEs), in which each of the component schemes is applied over a different part of the spatial domain. Such methods may be convenient for problems in which the smoothness of the solution or the magnitudes of the PDE coefficients vary strongly in space. We focus on embedded partitioned methods as they offer greater efficiency and avoid the order reduction that may occur in nonembedded schemes. We demonstrate that the lack of conservation in partitioned schemes can lead to nonphysical effects and propose conservative additive schemes based on partitioning the fluxes rather than the ordinary differential equations. A variety of SPERK schemes are presented, including an embedded pair suitable for the time evolution of fifth-order weighted nonoscillatory spatial discretizations. Numerical experiments are provided to support the theory.

  17. Embedded and real-time operating systems

    CERN Document Server

    Wang, K C

    2017-01-01

    This book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems. It includes all the foundational and background information on ARM architecture, ARM instructions and programming, toolchain for developing programs, virtual machines for software implementation and testing, program execution image, function call conventions, run-time stack usage and link C programs with assembly code. It describes the design and implementation of a complete OS for embedded systems in incremental steps, explaining the design principles and implementation techniques. For Symmetric Multiprocessing (SMP) embedded systems, the author examines the ARM MPcore processors, which include the SCU and GIC for interrupts routing and interprocessor communication and synchronization by Software Generated Interrupts (SGIs). Throughout the book, complete working sample systems demonstrate the design principles and...

  18. Patron perception and utilization of an embedded librarian program

    Directory of Open Access Journals (Sweden)

    Lindsay Blake, MLIS, AHIP

    2016-09-01

    Full Text Available Objective: The study measured the perceived value of an academic library’s embedded librarian service model. Setting: The study took place at the health sciences campuses of a research institution. Methods: A web-based survey was distributed that asked respondents a series of questions about their utilization of and satisfaction with embedded librarians and services. Results: Over 58% of respondents reported being aware of their embedded librarians, and 95% of these were satisfied with provided services. Conclusions: The overall satisfaction with services was encouraging, but awareness of the embedded program was low, suggesting an overall need for marketing of services.

  19. Six transformer based asymmetrical embedded Z-source inverters

    DEFF Research Database (Denmark)

    Wei, Mo; Poh Chiang, Loh; Chi, Jin

    2013-01-01

    Embedded/Asymmetrical embedded Z-source inverters were proposed to maintain smooth input current/voltage across the dc source and within the impedance network, remain the shoot-through feature used to boost up the dc-link voltage without adding bulky filter at input side. This paper introduces a ...... a class of transformer based asymmetrical embedded Z-source inverters which keep the smooth input current and voltage while achieving enhanced voltage boost capability. The presented inverters are verified by laboratory prototypes experimentally....

  20. Making the Case for Embedded Metadata in Digital Images

    DEFF Research Database (Denmark)

    Smith, Kari R.; Saunders, Sarah; Kejser, U.B.

    2014-01-01

    This paper discusses the standards, methods, use cases, and opportunities for using embedded metadata in digital images. In this paper we explain the past and current work engaged with developing specifications, standards for embedding metadata of different types, and the practicalities of data...... exchange in heritage institutions and the culture sector. Our examples and findings support the case for embedded metadata in digital images and the opportunities for such use more broadly in non-heritage sectors as well. We encourage the adoption of embedded metadata by digital image content creators...... and curators as well as those developing software and hardware that support the creation or re-use of digital images. We conclude that the usability of born digital images as well as physical objects that are digitized can be extended and the files preserved more readily with embedded metadata....

  1. Making the Case for Embedded Metadata in Digital Images

    DEFF Research Database (Denmark)

    Smith, Kari R.; Saunders, Sarah; Kejser, U.B.

    2014-01-01

    exchange in heritage institutions and the culture sector. Our examples and findings support the case for embedded metadata in digital images and the opportunities for such use more broadly in non-heritage sectors as well. We encourage the adoption of embedded metadata by digital image content creators......This paper discusses the standards, methods, use cases, and opportunities for using embedded metadata in digital images. In this paper we explain the past and current work engaged with developing specifications, standards for embedding metadata of different types, and the practicalities of data...... and curators as well as those developing software and hardware that support the creation or re-use of digital images. We conclude that the usability of born digital images as well as physical objects that are digitized can be extended and the files preserved more readily with embedded metadata....

  2. Revisiting deforestation in Africa (1990–2010): One more lost ...

    African Journals Online (AJOL)

    This spotlight revisits the dynamics and prognosis outlined in the late 1980's published in Déforestation en Afrique. This book on deforestation in Africa utilized available statistical data from the 1980's and was a pioneering self - styled attempt to provide a holistic viewpoint of the ongoing trends pertaining to deforestation in ...

  3. Operating system concepts for embedded multicores

    OpenAIRE

    Horst, Oliver; Schmidt, Adriaan

    2014-01-01

    Currently we can see an increasing adoption of multi-core platforms in the area of embedded systems. While these new hardware platforms offer the potential to satisfy the ever increasing demand for computational power, they pose considerable challenges with regard to software development. This affects the application software itself, but also the system design and architecture. Here, we address the consequences for operating system architecture in embedded systems. After dis-cussing current a...

  4. Revisiting Individual Creativity Assessment: Triangulation in Subjective and Objective Assessment Methods

    Science.gov (United States)

    Park, Namgyoo K.; Chun, Monica Youngshin; Lee, Jinju

    2016-01-01

    Compared to the significant development of creativity studies, individual creativity research has not reached a meaningful consensus regarding the most valid and reliable method for assessing individual creativity. This study revisited 2 of the most popular methods for assessing individual creativity: subjective and objective methods. This study…

  5. Teaching Embedded System Concepts for Technological Literacy

    Science.gov (United States)

    Winzker, M.; Schwandt, A.

    2011-01-01

    A basic understanding of technology is recognized as important knowledge even for students not connected with engineering and computer science. This paper shows that embedded system concepts can be taught in a technological literacy course. An embedded system teaching block that has been used in an electronics module for non-engineers is…

  6. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply......-typed terms can be represented in Haskell using phantom types? And conversely, can all simply-typed terms be represented in Haskell under the restrictions imposed by phantom types? In this article we investigate the conditions under which these assumptions are true: We show that these questions can...

  7. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2002-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply......-typed terms can be represented in Haskell using phantom types? And conversely, can all simply-typed terms be represented in Haskell under the restrictions imposed by phantom types? In this article we investigate the conditions under which these assumptions are true: We show that these questions can...

  8. Embedded Fragments Registry (EFR)

    Data.gov (United States)

    Department of Veterans Affairs — In 2009, the Department of Defense estimated that approximately 40,000 service members who served in OEF/OIF may have embedded fragment wounds as the result of small...

  9. RESLanjut: The learning media for improve students understanding in embedded systems

    Science.gov (United States)

    Indrianto, Susanti, Meilia Nur Indah; Karina, Djunaidi

    2017-08-01

    The use of network in embedded system can be done with many kinds of network, with the use of mobile phones, bluetooths, modems, ethernet cards, wireless technology and so on. Using network in embedded system could help people to do remote controlling. On previous research, researchers found that many students have the ability to comprehend the basic concept of embedded system. They could also make embedded system tools but without network integration. And for that, a development is needed for the embedded system module. The embedded system practicum module design needs a prototype method in order to achieve the desired goal. The prototype method is often used in the real world. Or even, a prototype method is a part of products that consist of logic expression or external physical interface. The embedded system practicum module is meant to increase student comprehension of embedded system course, and also to encourage students to innovate on technology based tools. It is also meant to help teachers to teach the embedded system concept on the course. The student comprehension is hoped to increase with the use of practicum course.

  10. Logistics Innovation Process Revisited

    DEFF Research Database (Denmark)

    Gammelgaard, Britta; Su, Shong-Iee Ivan; Yang, Su-Lan

    2011-01-01

    Purpose – The purpose of this paper is to learn more about logistics innovation processes and their implications for the focal organization as well as the supply chain, especially suppliers. Design/methodology/approach – The empirical basis of the study is a longitudinal action research project...... that was triggered by the practical needs of new ways of handling material flows of a hospital. This approach made it possible to revisit theory on logistics innovation process. Findings – Apart from the tangible benefits reported to the case hospital, five findings can be extracted from this study: the logistics...... innovation process model may include not just customers but also suppliers; logistics innovation in buyer-supplier relations may serve as an alternative to outsourcing; logistics innovation processes are dynamic and may improve supplier partnerships; logistics innovations in the supply chain are as dependent...

  11. Life quality index revisited

    DEFF Research Database (Denmark)

    Ditlevsen, Ove Dalager

    2004-01-01

    The derivation of the life quality index (LQI) is revisited for a revision. This revision takes into account the unpaid but necessary work time needed to stay alive in clean and healthy conditions to be fit for effective wealth producing work and to enjoyable free time. Dimension analysis...... at birth should not vary between countries. Finally the distributional assumptions are relaxed as compared to the assumptions made in an earlier work by the author. These assumptions concern the calculation of the life expectancy change due to the removal of an accident source. Moreover a simple public...... consistency problems with the standard power function expression of the LQI are pointed out. It is emphasized that the combination coefficient in the convex differential combination between the relative differential of the gross domestic product per capita and the relative differential of the expected life...

  12. Klein's double discontinuity revisited

    DEFF Research Database (Denmark)

    Winsløw, Carl; Grønbæk, Niels

    2014-01-01

    Much effort and research has been invested into understanding and bridging the ‘gaps’ which many students experience in terms of contents and expectations as they begin university studies with a heavy component of mathematics, typically in the form of calculus courses. We have several studies...... of bridging measures, success rates and many other aspects of these “entrance transition” problems. In this paper, we consider the inverse transition, experienced by university students as they revisit core parts of high school mathematics (in particular, calculus) after completing the undergraduate...... mathematics courses which are mandatory to become a high school teacher of mathematics. To what extent does the “advanced” experience enable them to approach the high school calculus in a deeper and more autonomous way ? To what extent can “capstone” courses support such an approach ? How could it be hindered...

  13. Embedding the Finite Sampling Process at a Rate

    OpenAIRE

    Shorack, Galen R.

    1991-01-01

    A huge body of if and only if theorems can be obtained based on certain strong embedding theorems for the partial sum process $\\mathbb{S}_n$ and the uniform empirical and quantile processes $\\mathbb{U}_n$ and $\\mathbb{V}_n$. This embedding was accomplished in 1986 by M. Csorgo, S. Csorgo, L. Horvath and D. Mason. Their embedding is beautifully formulated so that many necessary and sufficient type results can be established using it. It is worthwhile to have an accessible proof. Indeed, these ...

  14. Making embedded systems design patterns for great software

    CERN Document Server

    White, Elecia

    2011-01-01

    Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate a host of good development practices, based on classic software design patterns and new patterns unique to embedded programming. Learn how to build system architecture for processors, not operating systems, and discover specific techniques for dealing with hardware difficulties and manufacturing requirements. Written by an expert who's created embedded systems ranging from urban surveillance and DNA scanner

  15. Is embedding entailed in consumer valuation of food safety characteristics?

    DEFF Research Database (Denmark)

    Mørkbak, Morten Raun; Christensen, Tove; Gyrd-Hansen, Dorte

    2011-01-01

    Consumers' preferences for food safety characteristics are investigated with a particular focus on the existence of an embedding effect. Embedding exists if consumer valuation of food safety is insensitive to scope. We conduct between-attribute external tests for embedding in two choice experiments...

  16. Embedded fiber optic ultrasonic sensors and generators

    Science.gov (United States)

    Dorighi, John F.; Krishnaswamy, Sridhar; Achenbach, Jan D.

    1995-04-01

    Ultrasonic sensors and generators based on fiber-optic systems are described. It is shown that intrinsic fiber optic Fabry-Perot ultrasound sensors that are embedded in a structure can be stabilized by actively tuning the laser frequency. The need for this method of stabilization is demonstrated by detecting piezoelectric transducer-generated ultrasonic pulses in the presence of low frequency dynamic strains that are intentionally induced to cause sensor drift. The actively stabilized embedded fiber optic Fabry-Perot sensor is also shown to have sufficient sensitivity to detect ultrasound that is generated in the interior of a structure by means of a high-power optical fiber that pipes energy from a pulsed laser to an embedded generator of ultrasound.

  17. Eulerian graph embeddings and trails confined to lattice tubes

    International Nuclear Information System (INIS)

    Soteros, C E

    2006-01-01

    Embeddings of graphs in sublattices of the square and simple cubic lattice known as tubes (or prisms) are considered. For such sublattices, two combinatorial bounds are obtained which each relate the number of embeddings of all closed eulerian graphs with k branch points (vertices of degree greater than two) to the number of self-avoiding polygons. From these bounds it is proved that the entropic critical exponent for the number of embeddings of closed eulerian graphs with k branch points is equal to k, and the entropic critical exponent for the number of closed trails with k branch points is equal to k + 1. One of the required combinatorial bounds is obtained via Madras' 1999 lattice cluster pattern theorem, which yields a bound on the number of ways to convert a self-avoiding polygon into a closed eulerian graph embedding with k branch points. The other combinatorial bound is established by constructing a method for sequentially removing branch points from a closed eulerian graph embedding; this yields a bound on the number of ways to convert a closed eulerian graph embedding into a self-avoiding polygon

  18. Rereading Albert B. Lord's The Singer of Tales . Revisiting the ...

    African Journals Online (AJOL)

    Access to a fresh set of video-recordings of Sesotho praise-poetry made in the year 2000 enabled the author to revisit his adaptation of Albert Lord's definition of the formula as a dynamic compositional device that the oral poet utilizes during delivery. The basic adaptation made in 1983 pertains to heroic praises (dithoko tsa ...

  19. Re-Visit to the School Nurse and Adolescents' Medicine Use

    Science.gov (United States)

    Borup, Ina K.; Andersen, Anette; Holstein, Bjorn E.

    2011-01-01

    Objective: To examine if students who re-visit the school nurse use medicines differently than other students when exposed to aches and psychological problems. Methods: The study includes all 11-, 13- and 15-year-old students from a random sample of schools in Denmark, response rate 87 per cent, n = 5,205. The data collection followed the…

  20. Embedding beyond electrostatics-The role of wave function confinement.

    Science.gov (United States)

    Nåbo, Lina J; Olsen, Jógvan Magnus Haugaard; Holmgaard List, Nanna; Solanko, Lukasz M; Wüstner, Daniel; Kongsted, Jacob

    2016-09-14

    We study excited states of cholesterol in solution and show that, in this specific case, solute wave-function confinement is the main effect of the solvent. This is rationalized on the basis of the polarizable density embedding scheme, which in addition to polarizable embedding includes non-electrostatic repulsion that effectively confines the solute wave function to its cavity. We illustrate how the inclusion of non-electrostatic repulsion results in a successful identification of the intense π → π(∗) transition, which was not possible using an embedding method that only includes electrostatics. This underlines the importance of non-electrostatic repulsion in quantum-mechanical embedding-based methods.

  1. Design Technology for Heterogeneous Embedded Systems

    CERN Document Server

    O'Connor, Ian; Piguet, Christian

    2012-01-01

    Designing technology to address the problem of heterogeneous embedded systems, while remaining compatible with standard “More Moore” flows, i.e. capable of handling simultaneously both silicon complexity and system complexity, represents one of the most important challenges facing the semiconductor industry today. While the micro-electronics industry has built its own specific design methods to focus mainly on the management of complexity through the establishment of abstraction levels, the emergence of device heterogeneity requires new approaches enabling the satisfactory design of physically heterogeneous embedded systems for the widespread deployment of such systems. This book, compiled largely from a set of contributions from participants of past editions of the Winter School on Heterogeneous Embedded Systems Design Technology (FETCH), proposes a broad and holistic overview of design techniques used to tackle the various facets of heterogeneity in terms of technology and opportunities at the physical ...

  2. Dynamic memory management for embedded systems

    CERN Document Server

    Atienza Alonso, David; Poucet, Christophe; Peón-Quirós, Miguel; Bartzas, Alexandros; Catthoor, Francky; Soudris, Dimitrios

    2015-01-01

    This book provides a systematic and unified methodology, including basic principles and reusable processes, for dynamic memory management (DMM) in embedded systems.  The authors describe in detail how to design and optimize the use of dynamic memory in modern, multimedia and network applications, targeting the latest generation of portable embedded systems, such as smartphones. Coverage includes a variety of design and optimization topics in electronic design automation of DMM, from high-level software optimization to microarchitecture-level hardware support. The authors describe the design of multi-layer dynamic data structures for the final memory hierarchy layers of the target portable embedded systems and how to create a low-fragmentation, cost-efficient, dynamic memory management subsystem out of configurable components for the particular memory allocation and de-allocation patterns for each type of application.  The design methodology described in this book is based on propagating constraints among de...

  3. Distributed embedded smart cameras architectures, design and applications

    CERN Document Server

    Velipasalar, Senem

    2014-01-01

    This publication addresses distributed embedded smart cameras –cameras that perform onboard analysis and collaborate with other cameras. This book provides the material required to better understand the architectural design challenges of embedded smart camera systems, the hardware/software ecosystem, the design approach for, and applications of distributed smart cameras together with the state-of-the-art algorithms. The authors concentrate on the architecture, hardware/software design, realization of smart camera networks from applications to architectures, in particular in the embedded and mobile domains. •                    Examines energy issues related to wireless communication such as decreasing energy consumption to increase battery-life •                    Discusses processing large volumes of video data on an embedded environment in real-time •                    Covers design of realistic applications of distributed and embedded smart...

  4. An analytic algorithm for global coverage of the revisiting orbit and its application to the CFOSAT satellite

    Science.gov (United States)

    Xu, Ming; Huang, Li

    2014-08-01

    This paper addresses a new analytic algorithm for global coverage of the revisiting orbit and its application to the mission revisiting the Earth within long periods of time, such as Chinese-French Oceanic Satellite (abbr., CFOSAT). In the first, it is presented that the traditional design methodology of the revisiting orbit for some imaging satellites only on the single (ascending or descending) pass, and the repeating orbit is employed to perform the global coverage within short periods of time. However, the selection of the repeating orbit is essentially to yield the suboptimum from the rare measure of rational numbers of passes per day, which will lose lots of available revisiting orbits. Thus, an innovative design scheme is proposed to check both rational and irrational passes per day to acquire the relationship between the coverage percentage and the altitude. To improve the traditional imaging only on the single pass, the proposed algorithm is mapping every pass into its ascending and descending nodes on the specified latitude circle, and then is accumulating the projected width on the circle by the field of view of the satellite. The ergodic geometry of coverage percentage produced from the algorithm is affecting the final scheme, such as the optimal one owning the largest percentage, and the balance one possessing the less gradient in its vicinity, and is guiding to heuristic design for the station-keeping control strategies. The application of CFOSAT validates the feasibility of the algorithm.

  5. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems.......This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  6. Embedded generation connection incentives for distribution network operators

    Energy Technology Data Exchange (ETDEWEB)

    Williams, P.; Andrews, S.

    2002-07-01

    This is the final report with respect to work commissioned by the Department of Trade and Industry (DTI) as part of the New and Renewable Energy Programme into incentives for distribution network operators (DNOs) for the connection of embedded generation. This report, which incorporates the contents of the interim report submitted in February 2002, considers the implications of changes in the structure and regulation in the UK electricity industry on the successful technical and commercial integrated of embedded generation into distribution networks. The report examines: the obligations of public electricity suppliers (PESs); current DNO practices regarding the connection of embedded generation; the changes introduced by the Utilities Act 2000, including the impact of new obligations placed on DNOs on the connection of embedded generation and the requirements of the new Electricity Distribution Standard Licence conditions; and problems and prospects for DNO incentives.

  7. Scheduling of network access for feedback-based embedded systems

    Science.gov (United States)

    Liberatore, Vincenzo

    2002-07-01

    nd communication capabilities. Examples range from smart dust embedded in building materials to networks of appliances in the home. Embedded devices will be deployed in unprecedented numbers, will enable pervasive distributed computing, and will radically change the way people interact with the surrounding environment [EGH00a]. The paper targets embedded systems and their real-time (RT) communication requirements. RT requirements arise from the

  8. Programming Windows® Embedded CE 60 Developer Reference

    CERN Document Server

    Boling, Douglas

    2010-01-01

    Get the popular, practical reference to developing small footprint applications-now updated for the Windows Embedded CE 6.0 kernel. Written by an authority on embedded application development, this book focuses in on core operating concepts and the Win32 API. It delivers extensive code samples and sample projects-helping you build proficiency creating innovative Windows applications for a new generation of devices. Discover how to: Create complex applications designed for the unique requirements of embedded devicesManage virtual memory, heaps, and the stack to minimize your memory footprintC

  9. Embedded Visual System and its Applications on Robots

    CERN Document Server

    Xu, De

    2010-01-01

    Embedded vision systems such as smart cameras have been rapidly developed recently. Vision systems have become smaller and lighter, but their performance has improved. The algorithms in embedded vision systems have their specifications limited by frequency of CPU, memory size, and architecture. The goal of this e-book is to provide a an advanced reference work for engineers, researchers and scholars in the field of robotics, machine vision, and automation and to facilitate the exchange of their ideas, experiences and views on embedded vision system models. The effectiveness for all methods is

  10. Strength and fatigue life evaluation of composite laminate with embedded sensors

    Science.gov (United States)

    Rathod, Vivek T.; Hiremath, S. R.; Roy Mahapatra, D.

    2014-04-01

    Prognosis regarding durability of composite structures using various Structural Health Monitoring (SHM) techniques is an important and challenging topic of research. Ultrasonic SHM systems with embedded transducers have potential application here due to their instant monitoring capability, compact packaging potential toward unobtrusiveness and noninvasiveness as compared to non-contact ultrasonic and eddy current techniques which require disassembly of the structure. However, embedded sensors pose a risk to the structure by acting as a flaw thereby reducing life. The present paper focuses on the determination of strength and fatigue life of the composite laminate with embedded film sensors like CNT nanocomposite, PVDF thin films and piezoceramic films. First, the techniques of embedding these sensors in composite laminates is described followed by the determination of static strength and fatigue life at coupon level testing in Universal Testing Machine (UTM). Failure mechanisms of the composite laminate with embedded sensors are studied for static and dynamic loading cases. The coupons are monitored for loading and failure using the embedded sensors. A comparison of the performance of these three types of embedded sensors is made to study their suitability in various applications. These three types of embedded sensors cover a wide variety of applications, and prove to be viable in embedded sensor based SHM of composite structures.

  11. Applications of scenarios in early embedded system design space exploration

    NARCIS (Netherlands)

    van Stralen, P.

    2014-01-01

    One of the challenges during embedded system design is the application driven design. Due to the application driven design, the objectives that are steering the design of an embedded system are mainly based on the needs of the application(s). Examples of embedded system objectives are performance,

  12. Word embeddings quantify 100 years of gender and ethnic stereotypes.

    Science.gov (United States)

    Garg, Nikhil; Schiebinger, Londa; Jurafsky, Dan; Zou, James

    2018-04-17

    Word embeddings are a powerful machine-learning framework that represents each English word by a vector. The geometric relationship between these vectors captures meaningful semantic relationships between the corresponding words. In this paper, we develop a framework to demonstrate how the temporal dynamics of the embedding helps to quantify changes in stereotypes and attitudes toward women and ethnic minorities in the 20th and 21st centuries in the United States. We integrate word embeddings trained on 100 y of text data with the US Census to show that changes in the embedding track closely with demographic and occupation shifts over time. The embedding captures societal shifts-e.g., the women's movement in the 1960s and Asian immigration into the United States-and also illuminates how specific adjectives and occupations became more closely associated with certain populations over time. Our framework for temporal analysis of word embedding opens up a fruitful intersection between machine learning and quantitative social science.

  13. OLP embedment design method research for AP1000 nuclear plant

    International Nuclear Information System (INIS)

    Li Cheng; Li Shaoping; Liu Jianwei

    2013-01-01

    Background: One of the most advanced nuclear power technology, the first AP1000 reactor is under construction in China. Modularization is one of the main characteristics for AP1000 nuclear plant building. Module wall with steel face plate is used instead of reinforced concrete structure wall. A number of OLP embedments need to be installed into the module wall to connect other structures such as pipes, equipment, operation platforms and any other component attached to the module wall. Therefore, the design of embedment is very important in AP1000 structural design. Purpose: A finite element analysis method and tool for embedment design is needed for convenience. Methods: This paper applies the self-developed GTStrudl command template and VBA macro program for embedment capacity calculation and evaluation based on Microsoft Excel to the embedment design. Results: A Microsoft Excel template for embedment design is developed. Conclusions: The analysis method and template brings reasonable results and may provide some help and use for reference for the engineering practice. (authors)

  14. Hawking into Unruh mapping for embeddings of hyperbolic type

    International Nuclear Information System (INIS)

    Paston, S A

    2015-01-01

    We study the conditions of the existence of Hawking into Unruh mapping for hyperbolic (Fronsdal-type) metric embeddings into the Minkowski space, for which timelines are hyperbolas. Many examples are known for global embeddings into the Minkowskian spacetime (GEMS), with such mapping for physically interesting metrics with some symmetry. However, examples of embeddings, both smooth and hyperbolic, for which there is no mapping, were also given. In the present work we prove that Hawking into Unruh mapping takes place for a hyperbolic embedding of an arbitrary metric with a time-like Killing vector and a Killing horizon if the embedding of such type exists and smoothly covers the horizon. At the same time, we do not assume any symmetry (spherical, for example), except the time translational invariance, which corresponds to the existence of a time-like Killing vector. We show that the known examples of the absence of mapping do not satisfy the formulated conditions of its existence. (paper)

  15. Communicating embedded systems software and design

    CERN Document Server

    Jard, Claude

    2013-01-01

    The increased complexity of embedded systems coupled with quick design cycles to accommodate faster time-to-market requires increased system design productivity that involves both model-based design and tool-supported methodologies. Formal methods are mathematically-based techniques and provide a clean framework in which to express requirements and models of the systems, taking into account discrete, stochastic and continuous (timed or hybrid) parameters with increasingly efficient tools. This book deals with these formal methods applied to communicating embedded systems by presenting the

  16. Frozen density embedding with non-integer subsystems' particle numbers.

    Science.gov (United States)

    Fabiano, Eduardo; Laricchia, Savio; Della Sala, Fabio

    2014-03-21

    We extend the frozen density embedding theory to non-integer subsystems' particles numbers. Different features of this formulation are discussed, with special concern for approximate embedding calculations. In particular, we highlight the relation between the non-integer particle-number partition scheme and the resulting embedding errors. Finally, we provide a discussion of the implications of the present theory for the derivative discontinuity issue and the calculation of chemical reactivity descriptors.

  17. Research and application of embedded real-time operating system

    Science.gov (United States)

    Zhang, Bo

    2013-03-01

    In this paper, based on the analysis of existing embedded real-time operating system, the architecture of an operating system is designed and implemented. The experimental results show that the design fully complies with the requirements of embedded real-time operating system, can achieve the purposes of reducing the complexity of embedded software design and improving the maintainability, reliability, flexibility. Therefore, this design program has high practical value.

  18. The Peter Effect Revisited: Reading Habits and Attitudes of College Students

    Science.gov (United States)

    Applegate, Anthony J.; Applegate, Mary DeKonty; Mercantini, Martha A.; McGeehan, Catherine M.; Cobb, Jeanne B.; DeBoy, Joanne R.; Modla, Virginia B.; Lewinski, Kimberly E.

    2014-01-01

    Certainly a primary goal of literacy education is the creation of avid, enthusiastic, and highly motivated readers. However, in this article revisiting the Peter Effect (Applegate & Applegate, 2004), researchers surveyed more than 1,000 college sophomores and found strikingly low levels of enthusiasm for reading. Only 46.6% of surveyed…

  19. Checkpointing for graceful degradation in distributed embedded systems

    Science.gov (United States)

    Sababha, Belal Hussein

    Graceful degradation is an approach to developing dependable safety-critical embedded applications, where redundant active or standby resources are used to cope with faults through a system reconfiguration at run-time. Compared to traditional hardware and software redundancy, it is a promising technique that may achieve dependability with a significant reduction in cost, size, weight, and power requirements. Reconfiguration at run-time necessitates using proper checkpointing protocols to support state reservation to ensure correct task restarts after a system reconfiguration. One of the most common checkpointing protocols are communication induced checkpointing (CIC) protocols, which are well developed and understood for large parallel and information systems, but not much has been done for resource limited embedded systems. This work implements and evaluates some of the most common CIC protocols in a periodic resource constrained distributed embedded system for graceful degradation purposes. A test-bed has been developed and used for the evaluation of the various protocols. The implemented protocols are thoroughly studied and performances are contrasted. Specifically the periodicity property and how it benefits checkpointing in embedded systems is investigated. This work introduces a unique effort of CIC protocol implementation and evaluation in the field of distributed embedded systems. Other than providing a test-bed for graceful degradation support, this work shows that some checkpointing protocols that are not efficient in large information systems and supercomputers perform well in embedded systems. We show that a simple index-based CIC protocol, such as the BCS protocol, is more appropriate in embedded system applications compared to other protocols that piggyback a significant amount of information to reduce the number of forced checkpoints. Finally, this work proposes a whole graceful degradation approach to achieve fault tolerance in resource constrained

  20. Embedded adhesive connection for laminated glass plates

    DEFF Research Database (Denmark)

    Hansen, Jens Zangenberg; Poulsen, S.H.; Bagger, A.

    2012-01-01

    The structural behavior of a new connection design, the embedded adhesive connection, used for laminated glass plates is investigated. The connection consists of an aluminum plate encapsulated in-between two adjacent triple layered laminated glass plates. Fastening between glass and aluminum...... usage in a design situation. The embedded connection shows promising potential as a future fastening system for load-carrying laminated glass plates....

  1. Ambulatory thyroidectomy: A multistate study of revisits and complications

    OpenAIRE

    Orosco, RK; Lin, HW; Bhattacharyya, N

    2015-01-01

    © 2015 American Academy of Otolaryngology - Head and Neck Surgery Foundation. Objective. Determine rates and reasons for revisits after ambulatory adult thyroidectomy. Study Design. Cross-sectional analysis of multistate ambulatory surgery and hospital databases. Setting. Ambulatory surgery data from the State Ambulatory Surgery Databases of California, Florida, Iowa, and New York for calendar years 2010 and 2011. Subjects and Methods. Ambulatory thyroidectomy cases were linked to state ambul...

  2. Design of embedded control system for high-power tetrode modulator

    International Nuclear Information System (INIS)

    Tu Rui; Yao Lieying; Xuan Weimin

    2010-01-01

    The design of embedded control system for the high-power tetrode modulator and its test results are given. This control system is a closed-loop feedback system based on the DSP and embedded into the high-voltage modulator. A new modified method of VF fiber transmission is used in the embedded control system. The new method improves the speed of the transmission of feedback system. The results of the experiment demonstrate that the embedded feedback control system greatly increases the response speed of the whole system and improves the performance of the high-power tetrode on the HL-2A tokamak. This embedded feedback control system greatly simplifies the complexity of the original centralized control system. The operation of the control system is reliable. (authors)

  3. Seismic response analysis of BWR buildings with embedded foundation

    International Nuclear Information System (INIS)

    Fukuzawa, R.; Chiba, O.; Tohdo, M.

    1985-01-01

    An investigation on the effect of various types of foundations embedded into soil deposit to the responses of BWR buildings is made. The frequency characteristics of massless rigid foundations such as impedance functions and input motion are first obtained, depending on the embedment depth, contact condition of side wall to soil and the thickness of surface layer in a two-layered soil. From the results it is found that the embedment depth and the thickness of surface layer have a distinct effect to the responses contributed by the impedance functions and the response values characterized by the input motions are obviously influenced by the embedment depth and the contact length of side wall to soil deposit. (orig.)

  4. Taï chimpanzees anticipate revisiting high-valued fruit trees from further distances.

    Science.gov (United States)

    Ban, Simone D; Boesch, Christophe; Janmaat, Karline R L

    2014-11-01

    The use of spatio-temporal memory has been argued to increase food-finding efficiency in rainforest primates. However, the exact content of this memory is poorly known to date. This study investigated what specific information from previous feeding visits chimpanzees (Pan troglodytes verus), in Taï National Park, Côte d'Ivoire, take into account when they revisit the same feeding trees. By following five adult females for many consecutive days, we tested from what distance the females directed their travels towards previously visited feeding trees and how previous feeding experiences and fruit tree properties influenced this distance. To exclude the influence of sensory cues, the females' approach distance was measured from their last significant change in travel direction until the moment they entered the tree's maximum detection field. We found that chimpanzees travelled longer distances to trees at which they had previously made food grunts and had rejected fewer fruits compared to other trees. In addition, the results suggest that the chimpanzees were able to anticipate the amount of fruit that they would find in the trees. Overall, our findings are consistent with the hypothesis that chimpanzees act upon a retrieved memory of their last feeding experiences long before they revisit feeding trees, which would indicate a daily use of long-term prospective memory. Further, the results are consistent with the possibility that positive emotional experiences help to trigger prospective memory retrieval in forest areas that are further away and have fewer cues associated with revisited feeding trees.

  5. An analysis of electric utility embedded power supply costs

    International Nuclear Information System (INIS)

    Kahal, M.; Brown, D.

    1998-01-01

    There is little doubt that for the vast majority of electric utilities the embedded costs of power supply exceed market prices, giving rise to the stranded cost problem. Beyond that simple generalization, there are a number of crucial questions, which this study attempts to answer. What are the regional patterns of embedded cost differences? To what extent is the cost problem attributable to nuclear power? How does the cost of purchased power compare to the cost of utility self-generation? What is the breakdown of utility embedded generation costs between operating costs - which are potentially avoidable--and ownership costs, which by definition are ''sunk'' and therefore not avoidable? How will embedded generation costs and market prices compare over time? These are the crucial questions for states as they address retail-restructuring proposal. This study presents an analysis of generation costs, which addresses these key questions. A computerized costing model was developed and applied using FERC Form 1 data for 1995. The model analyzed embedded power supply costs (i.e.; self-generation plus purchased power) for two groups of investor-owned utilities, 49 non-nuclear vs. 63 nuclear. These two subsamples represent substantially the entire US investor-owned electric utility industry. For each utility, embedded cost is estimated both at busbar and at meter

  6. When does the Hawking into Unruh mapping for global embeddings work?

    International Nuclear Information System (INIS)

    Paston, S.A.

    2014-01-01

    We discuss for which smooth global embeddings of a metric into a Minkowskian spacetime the Hawking into Unruh mapping takes place. There is a series of examples of global embeddings into the Minkowskian spacetime (GEMS) with such mapping for physically interesting metrics. These examples use Fronsdal-type embeddings for which timelines are hyperbolas. In the present work we show that for some new embeddings (non Fronsdal-type) of the Schwarzschild and Reissner-Nordström metrics there is no mapping. We give also the examples of hyperbolic and non hyperbolic type embeddings for the de Sitter metric for which there is no mapping. For the Minkowski metric where there is no Hawking radiation we consider a non trivial embedding with hyperbolic timelines, hence in the ambient space the Unruh effect takes place, and it follows that there is no mapping too. The considered examples show that the meaning of the Hawking into Unruh mapping for global embeddings remains still insufficiently clear and requires further investigations.

  7. Automatic generation of co-embeddings from relational data with adaptive shaping.

    Science.gov (United States)

    Mu, Tingting; Goulermas, John Yannis

    2013-10-01

    In this paper, we study the co-embedding problem of how to map different types of patterns into one common low-dimensional space, given only the associations (relation values) between samples. We conduct a generic analysis to discover the commonalities between existing co-embedding algorithms and indirectly related approaches and investigate possible factors controlling the shapes and distributions of the co-embeddings. The primary contribution of this work is a novel method for computing co-embeddings, termed the automatic co-embedding with adaptive shaping (ACAS) algorithm, based on an efficient transformation of the co-embedding problem. Its advantages include flexible model adaptation to the given data, an economical set of model variables leading to a parametric co-embedding formulation, and a robust model fitting criterion for model optimization based on a quantization procedure. The secondary contribution of this work is the introduction of a set of generic schemes for the qualitative analysis and quantitative assessment of the output of co-embedding algorithms, using existing labeled benchmark datasets. Experiments with synthetic and real-world datasets show that the proposed algorithm is very competitive compared to existing ones.

  8. Exact density functional and wave function embedding schemes based on orbital localization

    International Nuclear Information System (INIS)

    Hégely, Bence; Nagy, Péter R.; Kállay, Mihály; Ferenczy, György G.

    2016-01-01

    Exact schemes for the embedding of density functional theory (DFT) and wave function theory (WFT) methods into lower-level DFT or WFT approaches are introduced utilizing orbital localization. First, a simple modification of the projector-based embedding scheme of Manby and co-workers [J. Chem. Phys. 140, 18A507 (2014)] is proposed. We also use localized orbitals to partition the system, but instead of augmenting the Fock operator with a somewhat arbitrary level-shift projector we solve the Huzinaga-equation, which strictly enforces the Pauli exclusion principle. Second, the embedding of WFT methods in local correlation approaches is studied. Since the latter methods split up the system into local domains, very simple embedding theories can be defined if the domains of the active subsystem and the environment are treated at a different level. The considered embedding schemes are benchmarked for reaction energies and compared to quantum mechanics (QM)/molecular mechanics (MM) and vacuum embedding. We conclude that for DFT-in-DFT embedding, the Huzinaga-equation-based scheme is more efficient than the other approaches, but QM/MM or even simple vacuum embedding is still competitive in particular cases. Concerning the embedding of wave function methods, the clear winner is the embedding of WFT into low-level local correlation approaches, and WFT-in-DFT embedding can only be more advantageous if a non-hybrid density functional is employed.

  9. Exact density functional and wave function embedding schemes based on orbital localization

    Science.gov (United States)

    Hégely, Bence; Nagy, Péter R.; Ferenczy, György G.; Kállay, Mihály

    2016-08-01

    Exact schemes for the embedding of density functional theory (DFT) and wave function theory (WFT) methods into lower-level DFT or WFT approaches are introduced utilizing orbital localization. First, a simple modification of the projector-based embedding scheme of Manby and co-workers [J. Chem. Phys. 140, 18A507 (2014)] is proposed. We also use localized orbitals to partition the system, but instead of augmenting the Fock operator with a somewhat arbitrary level-shift projector we solve the Huzinaga-equation, which strictly enforces the Pauli exclusion principle. Second, the embedding of WFT methods in local correlation approaches is studied. Since the latter methods split up the system into local domains, very simple embedding theories can be defined if the domains of the active subsystem and the environment are treated at a different level. The considered embedding schemes are benchmarked for reaction energies and compared to quantum mechanics (QM)/molecular mechanics (MM) and vacuum embedding. We conclude that for DFT-in-DFT embedding, the Huzinaga-equation-based scheme is more efficient than the other approaches, but QM/MM or even simple vacuum embedding is still competitive in particular cases. Concerning the embedding of wave function methods, the clear winner is the embedding of WFT into low-level local correlation approaches, and WFT-in-DFT embedding can only be more advantageous if a non-hybrid density functional is employed.

  10. Exact density functional and wave function embedding schemes based on orbital localization

    Energy Technology Data Exchange (ETDEWEB)

    Hégely, Bence; Nagy, Péter R.; Kállay, Mihály, E-mail: kallay@mail.bme.hu [MTA-BME Lendület Quantum Chemistry Research Group, Department of Physical Chemistry and Materials Science, Budapest University of Technology and Economics, P.O. Box 91, H-1521 Budapest (Hungary); Ferenczy, György G. [Medicinal Chemistry Research Group, Research Centre for Natural Sciences, Hungarian Academy of Sciences, Magyar tudósok körútja 2, H-1117 Budapest (Hungary); Department of Biophysics and Radiation Biology, Semmelweis University, Tűzoltó u. 37-47, H-1094 Budapest (Hungary)

    2016-08-14

    Exact schemes for the embedding of density functional theory (DFT) and wave function theory (WFT) methods into lower-level DFT or WFT approaches are introduced utilizing orbital localization. First, a simple modification of the projector-based embedding scheme of Manby and co-workers [J. Chem. Phys. 140, 18A507 (2014)] is proposed. We also use localized orbitals to partition the system, but instead of augmenting the Fock operator with a somewhat arbitrary level-shift projector we solve the Huzinaga-equation, which strictly enforces the Pauli exclusion principle. Second, the embedding of WFT methods in local correlation approaches is studied. Since the latter methods split up the system into local domains, very simple embedding theories can be defined if the domains of the active subsystem and the environment are treated at a different level. The considered embedding schemes are benchmarked for reaction energies and compared to quantum mechanics (QM)/molecular mechanics (MM) and vacuum embedding. We conclude that for DFT-in-DFT embedding, the Huzinaga-equation-based scheme is more efficient than the other approaches, but QM/MM or even simple vacuum embedding is still competitive in particular cases. Concerning the embedding of wave function methods, the clear winner is the embedding of WFT into low-level local correlation approaches, and WFT-in-DFT embedding can only be more advantageous if a non-hybrid density functional is employed.

  11. Composable Virtual Platforms for Mixed-Criticality Embedded Systems

    NARCIS (Netherlands)

    Beyranvand Nejad, A.

    2014-01-01

    Recent trends show a steady increase towards concurrently executing more and more applications on a single embedded system. Multi-Processor System-on-Chip (MPSoC) architectures are proposed to allow complex design of embedded systems. This is achieved by integrating as many processing resources as

  12. Composable virtual platforms for mixed-criticality embedded systems

    NARCIS (Netherlands)

    Nejad, A.B.

    2014-01-01

    Recent trends show a steady increase towards concurrently executing more and more applications on a single embedded system. Multi-Processor System-on-Chip (MPSoC) architectures are proposed to allow complex design of embedded systems. This is achieved by integrating as many processing resources as

  13. Multiple M2-branes and the embedding tensor

    NARCIS (Netherlands)

    Bergshoeff, Eric A.; de Roo, Mees; Hohm, Olaf

    2008-01-01

    We show that the Bagger-Lambert theory of multiple M2-branes fits into the general construction of maximally supersymmetric gauge theories using the embedding tensor technique. We apply the embedding tensor technique in order to systematically obtain the consistent gaugings of N = 8 superconformal

  14. Using Software Architectures for Designing Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Christensen, Henrik Bærbak

    In this paper, we outline an on-going project of designing distributed embedded systems for closed-loop process control. The project is a joint effort between software architecture researchers and developers from two companies that produce commercial embedded process control systems. The project...... has a strong emphasis on software architectural issues and terminology in order to envision, design and analyze design alternatives. We present two results. First, we outline how focusing on software architecture, architectural issues and qualities are beneficial in designing distributed, embedded......, systems. Second, we present two different architectures for closed-loop process control and discuss benefits and reliabilities....

  15. High precision mass measurements in Ψ and Υ families revisited

    International Nuclear Information System (INIS)

    Artamonov, A.S.; Baru, S.E.; Blinov, A.E.

    2000-01-01

    High precision mass measurements in Ψ and Υ families performed in 1980-1984 at the VEPP-4 collider with OLYA and MD-1 detectors are revisited. The corrections for the new value of the electron mass are presented. The effect of the updated radiative corrections has been calculated for the J/Ψ(1S) and Ψ(2S) mass measurements [ru

  16. The art of programming embedded systems

    CERN Document Server

    Ganssle, Jack

    1992-01-01

    Embedded systems are products such as microwave ovens, cars, and toys that rely on an internal microprocessor. This book is oriented toward the design engineer or programmer who writes the computer code for such a system. There are a number of problems specific to the embedded systems designer, and this book addresses them and offers practical solutions.Key Features* Offers cookbook routines, algorithms, and design techniques* Includes tips for handling debugging management and testing* Explores the philosophy of tightly coupling software and hardware in programming and dev

  17. Modern system architectures in embedded systems

    International Nuclear Information System (INIS)

    Korhonen, T.

    2012-01-01

    Several new technologies are making their way also in embedded systems. In addition to the FPGA technology which has become commonplace, multi-core CPUs and I/O virtualization (the implementation of the tasks of a software hyper-visor in hardware to improve the efficiency) are being introduced to the embedded systems. In this paper we review the trends and discuss how to take advantage of these features in control systems. Some potential application examples like parallelization, data streaming, high-speed data acquisition and virtualization are discussed

  18. Effects of non-uniform embedments on earthquake responses of nuclear reactor building

    International Nuclear Information System (INIS)

    Koyanagi, Y.; Okamoto, S.; Yoshida, K.; Inove, H.

    1989-01-01

    The nuclear reactor buildings have the portion embedded in soil. In the seismic design of such structures, it is essential to consider the effects of the embedment on the earthquake response. Most studies on these effects, however, assume the uniform embedment, i.e. the depth of the embedment is constant, which is convenient for the design and analysis. The behavior of the earthquake response considering the three-dimensional aspects of non-uniform embedment has not been made clear yet. In this paper, the authors evaluate the effects of the non-uniform embedment in an inclined ground surface on the earthquake response of a nuclear reactor building as illustrated. A typical PWR type reactor building is chosen as an analysis structure model. Four different types of embedment are set up for the comparison study. The three-dimensional analysis is carried out considering the geometry of embedment

  19. Quantum thetas on noncommutative T4 from embeddings into lattice

    International Nuclear Information System (INIS)

    Chang-Young, Ee; Kim, Hoil

    2007-01-01

    In this paper, we investigate the theta vector and quantum theta function over noncommutative T 4 from the embedding of RxZ 2 . Manin has constructed the quantum theta functions from the lattice embedding into vector space (x finite group). We extend Manin's construction of the quantum theta function to the embedding of vector space x lattice case. We find that the holomorphic theta vector exists only over the vector space part of the embedding, and over the lattice part we can only impose the condition for the Schwartz function. The quantum theta function built on this partial theta vector satisfies the requirement of the quantum theta function. However, two subsequent quantum translations from the embedding into the lattice part are nonadditive, contrary to the additivity of those from the vector space part

  20. Static Schedulers for Embedded Real-Time Systems

    Science.gov (United States)

    1989-12-01

    Because of the need for having efficient scheduling algorithms in large scale real time systems , software engineers put a lot of effort on developing...provide static schedulers for he Embedded Real Time Systems with single processor using Ada programming language. The independent nonpreemptable...support the Computer Aided Rapid Prototyping for Embedded Real Time Systems so that we determine whether the system, as designed, meets the required

  1. Java for Cost Effective Embedded Real-Time Software

    DEFF Research Database (Denmark)

    Korsholm, Stephan Erbs

    2012-01-01

    This thesis presents the analysis, design and implementation of the Hardware near Virtual Machine (HVM) - a Java virtual machine for embedded devices. The HVM supports the execution of Java programs on low-end embedded hard- ware environments with as little as a few kB of RAM and 32 kB of ROM....... The HVM is based on a Java-to-C translation mechanism and it produces selfcontained, strict ANSI-C code that has been specially crafted to allow it to be embedded into existing C based build and execution environments; environ- ments which may be based on non standard C compilers and libraries. The HVM...... does not require a POSIX-like OS, nor does it require a C runtime library to be present for the target. The main distinguishing feature of the HVM is to support the stepwise addition of Java into an existing C based build and execution environment for low-end embedded systems. This will allow...

  2. Java for Cost Effective Embedded Real-Time Software

    DEFF Research Database (Denmark)

    Korsholm, Stephan

    This thesis presents the analysis, design and implementation of the Hardware near Virtual Machine (HVM) - a Java virtual machine for embedded devices. The HVM supports the execution of Java programs on low-end embedded hard- ware environments with as little as a few kB of RAM and 32 kB of ROM....... The HVM is based on a Java-to-C translation mechanism and it produces self- contained, strict ANSI-C code that has been specially crafted to allow it to be embedded into existing C based build and execution environments; environ- ments which may be based on non standard C compilers and libraries. The HVM...... does not require a POSIX-like OS, nor does it require a C runtime library to be present for the target. The main distinguishing feature of the HVM is to support the stepwise addition of Java into an existing C based build and execution environment for low-end embedded systems. This will allow...

  3. OPERATIONAL PERFORMANCES DEMONSTRATION OF POLYMER-CERAMIC EMBEDDED CAPACITORS FOR MMIC APPLICATIONS

    OpenAIRE

    Bord-Majek , Isabelle; Kertesz , Philippe; Mazeau , Julie; Caban-Chastas , Daniel; Levrier , Bruno; Bechou , Laurent; Ousten , Yves

    2011-01-01

    International audience; Embedded passives are becoming increasingly important for the manufacture of highly integrated electronic boards and packages. The need for embedded passives emerges from the growing consumer demand for product miniaturization thus requiring smaller components and space efficient packaging. This can be realized by replacing discrete components that demands a higher volume than embedded passives. Embedded passives have already been investigated in the last few years. Ho...

  4. Computers as components principles of embedded computing system design

    CERN Document Server

    Wolf, Marilyn

    2012-01-01

    Computers as Components: Principles of Embedded Computing System Design, 3e, presents essential knowledge on embedded systems technology and techniques. Updated for today's embedded systems design methods, this edition features new examples including digital signal processing, multimedia, and cyber-physical systems. Author Marilyn Wolf covers the latest processors from Texas Instruments, ARM, and Microchip Technology plus software, operating systems, networks, consumer devices, and more. Like the previous editions, this textbook: Uses real processors to demonstrate both technology and tec

  5. Perturbation Theory of Embedded Eigenvalues

    DEFF Research Database (Denmark)

    Engelmann, Matthias

    project gives a general and systematic approach to analytic perturbation theory of embedded eigenvalues. The spectral deformation technique originally developed in the theory of dilation analytic potentials in the context of Schrödinger operators is systematized by the use of Mourre theory. The group...... of dilations is thereby replaced by the unitary group generated y the conjugate operator. This then allows to treat the perturbation problem with the usual Kato theory.......We study problems connected to perturbation theory of embedded eigenvalues in two different setups. The first part deals with second order perturbation theory of mass shells in massive translation invariant Nelson type models. To this end an expansion of the eigenvalues w.r.t. fiber parameter up...

  6. Commentary on "Distributed Revisiting: An Analytic for Retention of Coherent Science Learning"

    Science.gov (United States)

    Hewitt, Jim

    2015-01-01

    The article, "Distributed Revisiting: An Analytic for Retention of Coherent Science Learning" is an interesting study that operates at the intersection of learning theory and learning analytics. The authors observe that the relationship between learning theory and research in the learning analytics field is constrained by several…

  7. Double digest revisited : Complexity and Approximability in the Presence of Noisy Data

    NARCIS (Netherlands)

    Cieliebak, Mark; Eidenbenz, Stephan; Woeginger, Gerhard; Warnow, Tandy; Zhu, Binhai

    2003-01-01

    We revisit the Double Digest problem, which occurs in sequencing of large DNA strings and consists of reconstructing the relative positions of cut sites from two different enzymes: we first show that Double Digest is strongly NP-complete, improving upon previous results that only showed weak

  8. Proposal of Integrated Safety Assessment Methodology for Embedded System

    International Nuclear Information System (INIS)

    Sun, Wei; Kageyama, Makoto; Kanemoto, Shigeru

    2011-01-01

    To do risk analysis and risk evaluation for complicated safety critical embedded systems, there are three things should be paid a good attention: 1) an efficient and integrated model expression of embedded systems: 2) systematic risk analysis based on integrated system model: 3) quantitative risk evaluation for software and hardware integrated system. In this paper, taken electric water boiler as a target system, a proposal of risk analysis and risk evaluation for the embedded system is presented to meet these three purposes. In risk analysis, MFM is used and FT is generated automatically from MFM following some rules: And in risk evaluation, GO-FLOW is used to evaluate the reliability of sensors. And furthermore, FIT is applied to evaluate the safety software logic based on the diversity design concept. Although the electric water boiler is a simple example, it includes the key components of the embedded system like sensors, actuators, and software component. So, the process of modeling, analysis, and evaluation could be applied to other kinds of complicated embedded systems

  9. Secret data embedding scheme modifying the frequency of ...

    Indian Academy of Sciences (India)

    The main purpose of this presented work is to develop a data embedding method based on a new digital image histogram modification approach. The proposed scheme fundamentally is concerned about the frequency of occurrence of the image brightness values of the cover image for the data embedding procedures.

  10. Real-time embedded face recognition for smart home

    NARCIS (Netherlands)

    Zuo, F.; With, de P.H.N.

    2005-01-01

    We propose a near real-time face recognition system for embedding in consumer applications. The system is embedded in a networked home environment and enables personalized services by automatic identification of users. The aim of our research is to design and build a face recognition system that is

  11. Embedded Multimaterial Extrusion Bioprinting

    NARCIS (Netherlands)

    Rocca, Marco; Fragasso, Alessio; Liu, Wanjun; Heinrich, Marcel A.; Zhang, Yu Shrike

    Embedded extrusion bioprinting allows for the generation of complex structures that otherwise cannot be achieved with conventional layer-by-layer deposition from the bottom, by overcoming the limits imposed by gravitational force. By taking advantage of a hydrogel bath, serving as a sacrificial

  12. NOISE SECURES SECRET DATA! BY ACT AS A REFERENCE FOR EMBEDDING

    Directory of Open Access Journals (Sweden)

    J. Jayaseelan

    2014-03-01

    Full Text Available Data Security is that the most crucial think about a communication network. Data security is achieved by cryptography and data concealing. Steganography is one of the info concealing technique; here any form of signal is concealing by exploitation a picture, audio or video. In an exceedingly spatial domain steganography, most typically the info is embedded into a LSB’s of the cover image pixels. As a result of it maintain the standard of the stego image as like as cover image instead of embedded into MSB’s. To embedding into a LSB’s of cover image (R, G, B plane researchers are using different types of pixel indicating methods, random embedding, edge based embedding in spatial domain or applying completely different reworks in transform domain. In this paper, for spatial domain steganography noise based embedding technique is proposed; it is entirely different from the out there techniques. In this paper two copies of JPEG, PNG, GIF, or BMP etc., images are used. One is taken as a reference image and noise is added onto that. Supported this reference image knowledge is embedded into the LSB’s of cover image. Proposed system using salt and pepper noise for data embedding, it is an ON, OFF noise. Based on added salt, pepper, and no noise portions of reference image completely different range of bits are embedded into the cover image. The result is analyzed by using MSE, PSNR and capacity performance metrics.

  13. First-principles lattice-gas Hamiltonian revisited: O-Pd(100)

    OpenAIRE

    Kappus, Wolfgang

    2016-01-01

    The methodology of deriving an adatom lattice-gas Hamiltonian (LGH) from first principles (FP) calculations is revisited. Such LGH cluster expansions compute a large set of lateral pair-, trio-, quarto interactions by solving a set of linear equations modelling regular adatom configurations and their FP energies. The basic assumption of truncating interaction terms beyond fifth nearest neighbors does not hold when adatoms show longer range interactions, e.g. substrate mediated elastic interac...

  14. Bandwidth Extension of Telephone Speech Aided by Data Embedding

    Directory of Open Access Journals (Sweden)

    Sagi Ariel

    2007-01-01

    Full Text Available A system for bandwidth extension of telephone speech, aided by data embedding, is presented. The proposed system uses the transmitted analog narrowband speech signal as a carrier of the side information needed to carry out the bandwidth extension. The upper band of the wideband speech is reconstructed at the receiving end from two components: a synthetic wideband excitation signal, generated from the narrowband telephone speech and a wideband spectral envelope, parametrically represented and transmitted as embedded data in the telephone speech. We propose a novel data embedding scheme, in which the scalar Costa scheme is combined with an auditory masking model allowing high rate transparent embedding, while maintaining a low bit error rate. The signal is transformed to the frequency domain via the discrete Hartley transform (DHT and is partitioned into subbands. Data is embedded in an adaptively chosen subset of subbands by modifying the DHT coefficients. In our simulations, high quality wideband speech was obtained from speech transmitted over a telephone line (characterized by spectral magnitude distortion, dispersion, and noise, in which side information data is transparently embedded at the rate of 600 information bits/second and with a bit error rate of approximately . In a listening test, the reconstructed wideband speech was preferred (at different degrees over conventional telephone speech in of the test utterances.

  15. Bandwidth Extension of Telephone Speech Aided by Data Embedding

    Directory of Open Access Journals (Sweden)

    David Malah

    2007-01-01

    Full Text Available A system for bandwidth extension of telephone speech, aided by data embedding, is presented. The proposed system uses the transmitted analog narrowband speech signal as a carrier of the side information needed to carry out the bandwidth extension. The upper band of the wideband speech is reconstructed at the receiving end from two components: a synthetic wideband excitation signal, generated from the narrowband telephone speech and a wideband spectral envelope, parametrically represented and transmitted as embedded data in the telephone speech. We propose a novel data embedding scheme, in which the scalar Costa scheme is combined with an auditory masking model allowing high rate transparent embedding, while maintaining a low bit error rate. The signal is transformed to the frequency domain via the discrete Hartley transform (DHT and is partitioned into subbands. Data is embedded in an adaptively chosen subset of subbands by modifying the DHT coefficients. In our simulations, high quality wideband speech was obtained from speech transmitted over a telephone line (characterized by spectral magnitude distortion, dispersion, and noise, in which side information data is transparently embedded at the rate of 600 information bits/second and with a bit error rate of approximately 3⋅10−4. In a listening test, the reconstructed wideband speech was preferred (at different degrees over conventional telephone speech in 92.5% of the test utterances.

  16. Advanced Change Theory Revisited: An Article Critique

    Directory of Open Access Journals (Sweden)

    R. Scott Pochron

    2008-12-01

    Full Text Available The complexity of life in 21st century society requires new models for leading and managing change. With that in mind, this paper revisits the model for Advanced Change Theory (ACT as presented by Quinn, Spreitzer, and Brown in their article, “Changing Others Through Changing Ourselves: The Transformation of Human Systems” (2000. The authors present ACT as a potential model for facilitating change in complex organizations. This paper presents a critique of the article and summarizes opportunities for further exploring the model in the light of current trends in developmental and integral theory.

  17. Revisiting fifth forces in the Galileon model

    Energy Technology Data Exchange (ETDEWEB)

    Burrage, Clare [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany). Gruppe Theorie; Seery, David [Sussex Univ., Brighton (United Kingdom). Dept. of Physics and Astronomy

    2010-05-15

    A Galileon field is one which obeys a spacetime generalization of the non- relativistic Galilean invariance. Such a field may possess non-canonical kinetic terms, but ghost-free theories with a well-defined Cauchy problem exist, constructed using a finite number of relevant operators. The interactions of this scalar with matter are hidden by the Vainshtein effect, causing the Galileon to become weakly coupled near heavy sources. We revisit estimates of the fifth force mediated by a Galileon field, and show that the parameters of the model are less constrained by experiment than previously supposed. (orig.)

  18. Large J expansion in ABJM theory revisited.

    Science.gov (United States)

    Dimov, H; Mladenov, S; Rashkov, R C

    Recently there has been progress in the computation of the anomalous dimensions of gauge theory operators at strong coupling by making use of the AdS/CFT correspondence. On the string theory side they are given by dispersion relations in the semiclassical regime. We revisit the problem of a large-charge expansion of the dispersion relations for simple semiclassical strings in an [Formula: see text] background. We present the calculation of the corresponding anomalous dimensions of the gauge theory operators to an arbitrary order using three different methods. Although the results of the three methods look different, power series expansions show their consistency.

  19. The power reinforcement framework revisited

    DEFF Research Database (Denmark)

    Nielsen, Jeppe; Andersen, Kim Normann; Danziger, James N.

    2016-01-01

    Whereas digital technologies are often depicted as being capable of disrupting long-standing power structures and facilitating new governance mechanisms, the power reinforcement framework suggests that information and communications technologies tend to strengthen existing power arrangements within...... public organizations. This article revisits the 30-yearold power reinforcement framework by means of an empirical analysis on the use of mobile technology in a large-scale programme in Danish public sector home care. It explores whether and to what extent administrative management has controlled decision......-making and gained most benefits from mobile technology use, relative to the effects of the technology on the street-level workers who deliver services. Current mobile technology-in-use might be less likely to be power reinforcing because it is far more decentralized and individualized than the mainly expert...

  20. Thermal Conductivity of Carbon Nanotubes Embedded in Solids

    Institute of Scientific and Technical Information of China (English)

    CAO Bing-Yang; HOU Quan-Wen

    2008-01-01

    @@ A carbon-nanotube-atom fixed and activated scheme of non-equilibrium molecular dynamics simulations is put forward to extract the thermal conductivity of carbon nanotubes (CNTs) embedded in solid argon. Though a 6.5% volume fraction of CNTs increases the composite thermal conductivity to about twice as much as that of the pure basal material, the thermal conductivity of CNTs embedded in solids is found to be decreased by 1/8-1/5with reference to that of pure ones. The decrease of the intrinsic thermal conductivity of the solid-embedded CNTs and the thermal interface resistance are demonstrated to be responsible for the results.

  1. ROPE: Recoverable Order-Preserving Embedding of Natural Language

    Energy Technology Data Exchange (ETDEWEB)

    Widemann, David P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wang, Eric X. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Thiagarajan, Jayaraman J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-02-11

    We present a novel Recoverable Order-Preserving Embedding (ROPE) of natural language. ROPE maps natural language passages from sparse concatenated one-hot representations to distributed vector representations of predetermined fixed length. We use Euclidean distance to return search results that are both grammatically and semantically similar. ROPE is based on a series of random projections of distributed word embeddings. We show that our technique typically forms a dictionary with sufficient incoherence such that sparse recovery of the original text is possible. We then show how our embedding allows for efficient and meaningful natural search and retrieval on Microsoft’s COCO dataset and the IMDB Movie Review dataset.

  2. Nonlinear soil parameter effects on dynamic embedment of offshore pipeline on soft clay

    Directory of Open Access Journals (Sweden)

    Su Young Yu

    2015-03-01

    Full Text Available In this paper, the effects of nonlinear soft clay on dynamic embedment of offshore pipeline were investigated. Seabed embedment by pipe-soil interactions has impacts on the structural boundary conditions for various subsea structures such as pipeline, riser, pile, and many other systems. A number of studies have been performed to estimate real soil behavior, but their estimation of seabed embedment has not been fully identified and there are still many uncertainties. In this regards, comparison of embedment between field survey and existing empirical models has been performed to identify uncertainties and investigate the effect of nonlinear soil parameter on dynamic embedment. From the comparison, it is found that the dynamic embedment with installation effects based on nonlinear soil model have an influence on seabed embedment. Therefore, the pipe embedment under dynamic condition by nonlinear para- meters of soil models was investigated by Dynamic Embedment Factor (DEF concept, which is defined as the ratio of the dynamic and static embedment of pipeline, in order to overcome the gap between field embedment and currently used empirical and numerical formula. Although DEF through various researches is suggested, its range is too wide and it does not consider dynamic laying effect. It is difficult to find critical parameters that are affecting to the embedment result. Therefore, the study on dynamic embedment factor by soft clay parameters of nonlinear soil model was conducted and the sensitivity analyses about parameters of nonlinear soil model were performed as well. The tendency on dynamic embedment factor was found by conducting numerical analyses using OrcaFlex software. It is found that DEF was influenced by shear strength gradient than other factors. The obtained results will be useful to understand the pipe embedment on soft clay seabed for applying offshore pipeline designs such as on-bottom stability and free span analyses.

  3. Rhombic embeddings of planar graphs with faces of degree 4

    OpenAIRE

    Kenyon, Richard; Schlenker, Jean-Marc

    2003-01-01

    Given a finite or infinite planar graph all of whose faces have degree 4, we study embeddings in the plane in which all edges have length 1, that is, in which every face is a rhombus. We give a necessary and sufficient condition for the existence of such an embedding, as well as a description of the set of all such embeddings.

  4. Small private key MQPKS on an embedded microprocessor.

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  5. Small Private Key PKS on an Embedded Microprocessor

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  6. Test process for the safety-critical embedded software

    International Nuclear Information System (INIS)

    Sung, Ahyoung; Choi, Byoungju; Lee, Jangsoo

    2004-01-01

    Digitalization of nuclear Instrumentation and Control (I and C) system requires high reliability of not only hardware but also software. Verification and Validation (V and V) process is recommended for software reliability. But a more quantitative method is necessary such as software testing. Most of software in the nuclear I and C system is safety-critical embedded software. Safety-critical embedded software is specified, verified and developed according to V and V process. Hence two types of software testing techniques are necessary for the developed code. First, code-based software testing is required to examine the developed code. Second, after code-based software testing, software testing affected by hardware is required to reveal the interaction fault that may cause unexpected results. We call the testing of hardware's influence on software, an interaction testing. In case of safety-critical embedded software, it is also important to consider the interaction between hardware and software. Even if no faults are detected when testing either hardware or software alone, combining these components may lead to unexpected results due to the interaction. In this paper, we propose a software test process that embraces test levels, test techniques, required test tasks and documents for safety-critical embedded software. We apply the proposed test process to safety-critical embedded software as a case study, and show the effectiveness of it. (author)

  7. Revisit boundary conditions for the self-adjoint angular flux formulation

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yaqi [Idaho National Lab. (INL), Idaho Falls, ID (United States); Gleicher, Frederick N. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-03-01

    We revisit the boundary conditions for SAAF. We derived the equivalent parity variational form ready for coding up. The more rigorous approach of evaluating odd parity should be solving the odd parity equation coupled with the even parity. We proposed a symmetric reflecting boundary condition although neither positive definiteness nor even-odd decoupling is achieved. A simple numerical test verifies the validity of these boundary conditions.

  8. Place attachment and social legitimacy: Revisiting the sustainable entrepreneurship journey

    OpenAIRE

    Kibler, E; Fink, M; Lang, R; Munoz, PA

    2015-01-01

    This paper revisits the sustainable entrepreneurship journey by introducing a ‘place- based’ sustainable venture path model. We suggest that distinguishing between emo- tional (‘caring about the place’) and instrumental (‘using the place’) place attachment of sustainable entrepreneurs deepens our understanding of how place-based challenges of sustainable venture legitimacy are managed over time. We conclude with avenues for future sustainable entrepreneurship research.

  9. Teacher Communication Concerns Revisited: Calling into Question the Gnawing Pull towards Equilibrium

    Science.gov (United States)

    Dannels, Deanna P.

    2015-01-01

    This study revisits the long-standing teacher communication concerns framework originating over three decades ago. Analysis of 10 years of contemporary GTA teacher communication concerns reveals a typology of 10 concerns, which taken together construct teaching as a process of negotiating relationships, managing identities, and focusing attention.…

  10. Revisiting Learning in Higher Education--Framing Notions Redefined through an Ecological Perspective

    Science.gov (United States)

    Damsa, Crina; Jornet, Alfredo

    2016-01-01

    This article employs an ecological perspective as a means of revisiting the notion of learning, with a particular focus on learning in higher education. Learning is reconceptualised as a process entailing mutually constitutive, epistemic, social and affective relations in which knowledge, identity and agency become collective achievements of whole…

  11. Costs and benefits of embedded generation

    International Nuclear Information System (INIS)

    1996-01-01

    Ilex Associates has been appointed by ETSU to examine the underlying costs and benefits of embedded generation (i.e. generation which is directly connected into a REF's distribution network instead of the national transmission network). The main impetus for this work stems from the need to understand the true value of embedded generation in time to review the development of further NFFO contracts following the expiry of the, so called, ''nuclear levy''. This is particularly important at this time because of the view expressed by the Director General of Electricity Supply (DGES) that to continue to receive support renewables technologies should be able to demonstrate good progress in converging towards a market price. The prime objectives of this study are to determine the costs and benefits of connecting and operating a generator that is embedded in a local Regional Electricity Company's (REC's) distribution network compared to the alternative option of providing electricity from a large generating station which is connected directly to the transmission system (and colloquially known as directly connected generation). (UK)

  12. Lorentz violation naturalness revisited

    Energy Technology Data Exchange (ETDEWEB)

    Belenchia, Alessio; Gambassi, Andrea; Liberati, Stefano [SISSA - International School for Advanced Studies, via Bonomea 265, 34136 Trieste (Italy); INFN, Sezione di Trieste, via Valerio 2, 34127 Trieste (Italy)

    2016-06-08

    We revisit here the naturalness problem of Lorentz invariance violations on a simple toy model of a scalar field coupled to a fermion field via a Yukawa interaction. We first review some well-known results concerning the low-energy percolation of Lorentz violation from high energies, presenting some details of the analysis not explicitly discussed in the literature and discussing some previously unnoticed subtleties. We then show how a separation between the scale of validity of the effective field theory and that one of Lorentz invariance violations can hinder this low-energy percolation. While such protection mechanism was previously considered in the literature, we provide here a simple illustration of how it works and of its general features. Finally, we consider a case in which dissipation is present, showing that the dissipative behaviour does not percolate generically to lower mass dimension operators albeit dispersion does. Moreover, we show that a scale separation can protect from unsuppressed low-energy percolation also in this case.

  13. Numerical simulation of a hovering rotor using embedded grids

    Science.gov (United States)

    Duque, Earl-Peter N.; Srinivasan, Ganapathi R.

    1992-01-01

    The flow field for a rotor blade in hover was computed by numerically solving the compressible thin-layer Navier-Stokes equations on embedded grids. In this work, three embedded grids were used to discretize the flow field - one for the rotor blade and two to convect the rotor wake. The computations were performed at two hovering test conditions, for a two-bladed rectangular rotor of aspect ratio six. The results compare fairly with experiment and illustrates the use of embedded grids in solving helicopter type flow fields.

  14. A Real-Time Embedded Control System for Electro-Fused Magnesia Furnace

    Directory of Open Access Journals (Sweden)

    Fang Zheng

    2013-01-01

    Full Text Available Since smelting process of electro-fused magnesia furnace is a complicated process which has characteristics like complex operation conditions, strong nonlinearities, and strong couplings, traditional linear controller cannot control it very well. Advanced intelligent control strategy is a good solution to this kind of industrial process. However, advanced intelligent control strategy always involves huge programming task and hard debugging and maintaining problems. In this paper, a real-time embedded control system is proposed for the process control of electro-fused magnesia furnace based on intelligent control strategy and model-based design technology. As for hardware, an embedded controller based on an industrial Single Board Computer (SBC is developed to meet industrial field environment demands. As for software, a Linux based on Real-Time Application Interface (RTAI is used as the real-time kernel of the controller to improve its real-time performance. The embedded software platform is also modified to support generating embedded code automatically from Simulink/Stateflow models. Based on the proposed embedded control system, the intelligent embedded control software of electro-fused magnesium furnace can be directly generated from Simulink/Stateflow models. To validate the effectiveness of the proposed embedded control system, hardware-in-the-loop (HIL and industrial field experiments are both implemented. Experiments results show that the embedded control system works very well in both laboratory and industry environments.

  15. The embedded operating system project

    Science.gov (United States)

    Campbell, R. H.

    1984-01-01

    This progress report describes research towards the design and construction of embedded operating systems for real-time advanced aerospace applications. The applications concerned require reliable operating system support that must accommodate networks of computers. The report addresses the problems of constructing such operating systems, the communications media, reconfiguration, consistency and recovery in a distributed system, and the issues of realtime processing. A discussion is included on suitable theoretical foundations for the use of atomic actions to support fault tolerance and data consistency in real-time object-based systems. In particular, this report addresses: atomic actions, fault tolerance, operating system structure, program development, reliability and availability, and networking issues. This document reports the status of various experiments designed and conducted to investigate embedded operating system design issues.

  16. Designing the role of the embedded care manager.

    Science.gov (United States)

    Hines, Patricia; Mercury, Marge

    2013-01-01

    : The role of the professional case manager is changing rapidly. Health reform has called upon the industry to ensure that care is delivered in an efficient, effective, and high-quality and low cost manner. As a means to achieve this objective, health plans and health systems are moving the care manager out of a centralized location within their organizations to "embedding" them into physician offices. This move enables the care manager to work alongside the primary care physicians and their high-risk patients. This article discusses the framework for designing and implementing an embedded care manager role into a physician practice. Key elements of the program are discussed. IMPLICATIONS FOR CARE MANAGEMENT:: Historically care management has played a foundational role in improving the quality of care for individuals and populations via the efficient and effective use of resources. Now with the goals of health care reform, a successful transition from a volume-based to value-based reimbursement system requires primary care physicians to welcome care managers into their practices to improve patient care, quality, and costs through care coordination across health care settings and populations. : As patient-centered medical homes and integrated delivery systems formulate their plans for population health management, their efforts have included embedding a care manager in the primary practice setting. Having care managers embedded at the physician offices increases their ability to collaborate with the physician and their staff in the implementation and monitoring care plans for their patients. : Implementing an embedded care manager into an existing physician's practice requires the following:Although the embedded care manager is a highly evolving role, physician groups are beginning to realize the benefits from their care management collaborations. Examples cited include improved outreach and coordination, patient adherence to care plans, and improved quality of life.

  17. Embedding objects during 3D printing to add new functionalities.

    Science.gov (United States)

    Yuen, Po Ki

    2016-07-01

    A novel method for integrating and embedding objects to add new functionalities during 3D printing based on fused deposition modeling (FDM) (also known as fused filament fabrication or molten polymer deposition) is presented. Unlike typical 3D printing, FDM-based 3D printing could allow objects to be integrated and embedded during 3D printing and the FDM-based 3D printed devices do not typically require any post-processing and finishing. Thus, various fluidic devices with integrated glass cover slips or polystyrene films with and without an embedded porous membrane, and optical devices with embedded Corning(®) Fibrance™ Light-Diffusing Fiber were 3D printed to demonstrate the versatility of the FDM-based 3D printing and embedding method. Fluid perfusion flow experiments with a blue colored food dye solution were used to visually confirm fluid flow and/or fluid perfusion through the embedded porous membrane in the 3D printed fluidic devices. Similar to typical 3D printed devices, FDM-based 3D printed devices are translucent at best unless post-polishing is performed and optical transparency is highly desirable in any fluidic devices; integrated glass cover slips or polystyrene films would provide a perfect optical transparent window for observation and visualization. In addition, they also provide a compatible flat smooth surface for biological or biomolecular applications. The 3D printed fluidic devices with an embedded porous membrane are applicable to biological or chemical applications such as continuous perfusion cell culture or biocatalytic synthesis but without the need for any post-device assembly and finishing. The 3D printed devices with embedded Corning(®) Fibrance™ Light-Diffusing Fiber would have applications in display, illumination, or optical applications. Furthermore, the FDM-based 3D printing and embedding method could also be utilized to print casting molds with an integrated glass bottom for polydimethylsiloxane (PDMS) device replication

  18. An Embedded System Dedicated to Intervehicle Communication Applications

    Directory of Open Access Journals (Sweden)

    Zhou Haiying

    2010-01-01

    Full Text Available To overcome system latency and network delay is essential for intervehicle communication (IVC applications such as hazard alarming and cooperative driving. This paper proposes a low-cost embedded software system dedicated to such applications. It consists of two basic component layers: an operating system, named HEROS (hybrid event-driven and real-time multitasking operating system, and a communication protocol, named CIVIC (Communication Inter Véhicule Intelligente et Coopérative. HEROS is originally designed for wireless sensor networks (WSNs. It contains a component-based resource-aware kernel and a low-latency tuple-based communication system. Moreover, it provides a configurable event-driven and/or real-time multitasking mechanism for various embedded applications. The CIVIC is an autoconfiguration cooperative IVC protocol. It merges proactive and reactive approaches to speed up and optimize location-based routing discovery with high-mobility nodes. Currently, this embedded system has been implemented and tested. The experiment results show that the new embedded system has low system latency and network delay under the principle of small resource consumption.

  19. GLYCOL METHACRYLATE EMBEDDING OF ALGINATE-POLYLYSINE MICROENCAPSULATED PANCREATIC-ISLETS

    NARCIS (Netherlands)

    FRITSCHY, WM; GERRITS, PO; WOLTERS, GHJ; PASMA, A; VANSCHILFGAARDE, R

    A method for processing and embedding alginate-polylysine microencapsulated pancreatic tissue in glycol methacrylate resin (GMA) is described. Fixation in 4% phosphate buffered formaldehyde, processing in ascending concentrations of glycol methacrylate monomer and embedding in Technovit 7100 results

  20. Co-design for an SoC embedded network controller

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With the development of Ethernet systems and the growing capacity of modern silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardware/software co-design is a methodology for solving design problems in processor based embedded systems. In this work, we implemented a new 1-cycle pipeline microprocessor and a fast Ethernet transceiver and established a low cost, high performance embedded network controller, and designed a TCP/IP stack to access the Internet. We discussed the hardware/software architecture in the forepart, and then the whole system-on-a-chip on Altera Stratix EP1S25F780C6 device. Using the FPGA environment and SmartBit tester, we tested the system's throughput. Our simulation results showed that the maximum throughput of Ethernet packets is up to 7 Mbps, that of UDP packets is up to 5.8 Mbps, and that of TCP packets is up to 3.4 Mbps, which showed that this embedded system can easily transmit basic voice and video signals through Ethernet, and that using only one chip can realize that many electronic devices access to the Internet directly and get high performance.

  1. Extending density functional embedding theory for covalently bonded systems.

    Science.gov (United States)

    Yu, Kuang; Carter, Emily A

    2017-12-19

    Quantum embedding theory aims to provide an efficient solution to obtain accurate electronic energies for systems too large for full-scale, high-level quantum calculations. It adopts a hierarchical approach that divides the total system into a small embedded region and a larger environment, using different levels of theory to describe each part. Previously, we developed a density-based quantum embedding theory called density functional embedding theory (DFET), which achieved considerable success in metals and semiconductors. In this work, we extend DFET into a density-matrix-based nonlocal form, enabling DFET to study the stronger quantum couplings between covalently bonded subsystems. We name this theory density-matrix functional embedding theory (DMFET), and we demonstrate its performance in several test examples that resemble various real applications in both chemistry and biochemistry. DMFET gives excellent results in all cases tested thus far, including predicting isomerization energies, proton transfer energies, and highest occupied molecular orbital-lowest unoccupied molecular orbital gaps for local chromophores. Here, we show that DMFET systematically improves the quality of the results compared with the widely used state-of-the-art methods, such as the simple capped cluster model or the widely used ONIOM method.

  2. Fermat's least-time principle and the embedded transparent lens

    Science.gov (United States)

    Kantowski, R.; Chen, B.; Dai, X.

    2013-10-01

    We present a simplified version of the lowest-order embedded point mass gravitational lens theory and then make the extension of this theory to any embedded transparent lens. Embedding a lens effectively reduces the gravitational potential’s range, i.e., partially shields the lensing potential because the lens mass is made a contributor to the mean mass density of the Universe and not simply superimposed upon it. We give the time-delay function for the embedded point mass lens from which we can derive the simplified lens equation by applying Fermat’s least-time principle. Even though rigorous derivations are only made for the point mass in a flat background, the generalization of the lens equation to lowest order for any distributed lens in any homogeneous background is obvious. We find from this simplified theory that embedding can introduce corrections above the few percent level in weak lensing shears caused by large clusters but only at large impacts. The potential part of the time delay is also affected in strong lensing at the few percent level. Additionally we again confirm that the presence of a cosmological constant alters the gravitational deflection of passing photons.

  3. Quark matter revisited with non-extensive MIT bag model

    Energy Technology Data Exchange (ETDEWEB)

    Cardoso, Pedro H.G.; Nunes da Silva, Tiago; Menezes, Debora P. [Universidade Federal de Santa Catarina, Departamento de Fisica, CFM, Florianopolis (Brazil); Deppman, Airton [Instituto de Fisica da Universidade de Sao Paulo, Sao Paulo (Brazil)

    2017-10-15

    In this work we revisit the MIT bag model to describe quark matter within both the usual Fermi-Dirac and the Tsallis statistics. We verify the effects of the non-additivity of the latter by analysing two different pictures: the first order phase transition of the QCD phase diagram and stellar matter properties. While the QCD phase diagram is visually affected by the Tsallis statistics, the resulting effects on quark star macroscopic properties are barely noticed. (orig.)

  4. Tools for Embedded Computing Systems Software

    Science.gov (United States)

    1978-01-01

    A workshop was held to assess the state of tools for embedded systems software and to determine directions for tool development. A synopsis of the talk and the key figures of each workshop presentation, together with chairmen summaries, are presented. The presentations covered four major areas: (1) tools and the software environment (development and testing); (2) tools and software requirements, design, and specification; (3) tools and language processors; and (4) tools and verification and validation (analysis and testing). The utility and contribution of existing tools and research results for the development and testing of embedded computing systems software are described and assessed.

  5. Model-based testing for embedded systems

    CERN Document Server

    Zander, Justyna; Mosterman, Pieter J

    2011-01-01

    What the experts have to say about Model-Based Testing for Embedded Systems: "This book is exactly what is needed at the exact right time in this fast-growing area. From its beginnings over 10 years ago of deriving tests from UML statecharts, model-based testing has matured into a topic with both breadth and depth. Testing embedded systems is a natural application of MBT, and this book hits the nail exactly on the head. Numerous topics are presented clearly, thoroughly, and concisely in this cutting-edge book. The authors are world-class leading experts in this area and teach us well-used

  6. Microring embedded hollow polymer fiber laser

    Energy Technology Data Exchange (ETDEWEB)

    Linslal, C. L., E-mail: linslal@gmail.com; Sebastian, S.; Mathew, S.; Radhakrishnan, P.; Nampoori, V. P. N.; Girijavallabhan, C. P.; Kailasnath, M. [International School of Photonics, Cochin University of Science and Technology, Cochin 22 (India)

    2015-03-30

    Strongly modulated laser emission has been observed from rhodamine B doped microring resonator embedded in a hollow polymer optical fiber by transverse optical pumping. The microring resonator is fabricated on the inner wall of a hollow polymer fiber. Highly sharp lasing lines, strong mode selection, and a collimated laser beam are observed from the fiber. Nearly single mode lasing with a side mode suppression ratio of up to 11.8 dB is obtained from the strongly modulated lasing spectrum. The microring embedded hollow polymer fiber laser has shown efficient lasing characteristics even at a propagation length of 1.5 m.

  7. EMBEDDED CONTROL SYSTEM FOR MOBILE ROBOTS WITH DIFFERENTIAL DRIVE

    Directory of Open Access Journals (Sweden)

    Michal KOPČÍK

    2017-09-01

    Full Text Available This article deals with design and implementation of control system for mobile robots with differential drive using embedded system. This designed embedded system consists of single control board featuring ARM based microcontroller which control the peripherals in real time and perform all low-level motion control. Designed embedded system can be easily expanded with additional sensors, actuators or control units to enhance applicability of mobile robot. Designed embedded system also features build-in communication module, which can be used for data for data acquisition and control of the mobile robot. Control board was implemented on two different types of mobile robots with differential drive, one of which was wheeled and other was tracked. These mobile robots serve as testing platform for Fault Detection and Isolation using hardware and analytical redundancy using Multisensor Data Fusion based on Kalman filters.

  8. Embedded Design Research of Iris Information Acquisition System

    Directory of Open Access Journals (Sweden)

    Huiyan Xu

    2014-09-01

    Full Text Available In view of the limitation of traditional identification, it is easy to lose and copy keys, cards or ID cards, and it is easy to forget the password, so we designed an embedded application system based on the iris identification technology, which can realize the functions of gathering, inputting, and registering the iris information and identification. The hardware circuit was designed by using advanced RISC machines (ARM embedded microprocessor as the core. The iris sensor was used to gather the iris information, and the development of software was accomplished with the embedded OS Windows CE. The system can be used on the company entrance guard system, customs security of airport and criminal identification.

  9. A Trusted Computing Architecture of Embedded System Based on Improved TPM

    Directory of Open Access Journals (Sweden)

    Wang Xiaosheng

    2017-01-01

    Full Text Available The Trusted Platform Module (TPM currently used by PCs is not suitable for embedded systems, it is necessary to improve existing TPM. The paper proposes a trusted computing architecture with new TPM and the cryptographic system developed by China for the embedded system. The improved TPM consists of the Embedded System Trusted Cryptography Module (eTCM and the Embedded System Trusted Platform Control Module (eTPCM, which are combined and implemented the TPM’s autonomous control, active defense, high-speed encryption/decryption and other function through its internal bus arbitration module and symmetric and asymmetric cryptographic engines to effectively protect the security of embedded system. In our improved TPM, a trusted measurement method with chain model and star type model is used. Finally, the improved TPM is designed by FPGA, and it is used to a trusted PDA to carry out experimental verification. Experiments show that the trusted architecture of the embedded system based on the improved TPM is efficient, reliable and secure.

  10. My First CMC Article Revisited: A Window on Spanish L2 Interlanguage

    Science.gov (United States)

    Blake, Robert

    2016-01-01

    The computer-assisted language learning (CALL) field seems to change overnight with new technological affordances. Blake revisits his 2000 "LLT" article on computer-mediation communication (CMC) in order to reflect on how the field has examined this topic over the past decade or so. While the Interaction Hypothesis continues to guide…

  11. Embedded arrays of vertically aligned carbon nanotube carpets and methods for making them

    Science.gov (United States)

    Kim, Myung Jong; Nicholas, Nolan Walker; Kittrell, W. Carter; Schmidt, Howard K.

    2015-06-30

    According to some embodiments, the present invention provides a system and method for supporting a carbon nanotube array that involve an entangled carbon nanotube mat integral with the array, where the mat is embedded in an embedding material. The embedding material may be depositable on a carbon nanotube. A depositable material may be metallic or nonmetallic. The embedding material may be an adhesive material. The adhesive material may optionally be mixed with a metal powder. The embedding material may be supported by a substrate or self-supportive. The embedding material may be conductive or nonconductive. The system and method provide superior mechanical and, when applicable, electrical, contact between the carbon nanotubes in the array and the embedding material. The optional use of a conductive material for the embedding material provides a mechanism useful for integration of carbon nanotube arrays into electronic devices.

  12. Risk prediction of emergency department revisit 30 days post discharge: a prospective study.

    Directory of Open Access Journals (Sweden)

    Shiying Hao

    Full Text Available Among patients who are discharged from the Emergency Department (ED, about 3% return within 30 days. Revisits can be related to the nature of the disease, medical errors, and/or inadequate diagnoses and treatment during their initial ED visit. Identification of high-risk patient population can help device new strategies for improved ED care with reduced ED utilization.A decision tree based model with discriminant Electronic Medical Record (EMR features was developed and validated, estimating patient ED 30 day revisit risk. A retrospective cohort of 293,461 ED encounters from HealthInfoNet (HIN, Maine's Health Information Exchange (HIE, between January 1, 2012 and December 31, 2012, was assembled with the associated patients' demographic information and one-year clinical histories before the discharge date as the inputs. To validate, a prospective cohort of 193,886 encounters between January 1, 2013 and June 30, 2013 was constructed. The c-statistics for the retrospective and prospective predictions were 0.710 and 0.704 respectively. Clinical resource utilization, including ED use, was analyzed as a function of the ED risk score. Cluster analysis of high-risk patients identified discrete sub-populations with distinctive demographic, clinical and resource utilization patterns.Our ED 30-day revisit model was prospectively validated on the Maine State HIN secure statewide data system. Future integration of our ED predictive analytics into the ED care work flow may lead to increased opportunities for targeted care intervention to reduce ED resource burden and overall healthcare expense, and improve outcomes.

  13. Relating loop quantum cosmology to loop quantum gravity: symmetric sectors and embeddings

    International Nuclear Information System (INIS)

    Engle, J

    2007-01-01

    In this paper we address the meaning of states in loop quantum cosmology (LQC), in the context of loop quantum gravity. First, we introduce a rigorous formulation of an embedding proposed by Bojowald and Kastrup, of LQC states into loop quantum gravity. Then, using certain holomorphic representations, a new class of embeddings, called b-embeddings, are constructed, following the ideas of Engle (2006 Quantum field theory and its symmetry reduction Class. Quantum Gravity 23 2861-94). We exhibit a class of operators preserving each of these embeddings, and show their consistency with the LQC quantization. In the b-embedding case, the classical analogues of these operators separate points in phase space. Embedding at the gauge and diffeomorphism invariant level is discussed briefly in the conclusions

  14. Embedded EZ-Source Inverters

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Loh, Poh Chiang; Gao, F.

    2008-01-01

    -voltage oscillations to the system. Therefore, Z-source inverters are in effect safer and less complex, and can be implemented using only passive elements with no additional active semiconductor needed. Believing in the prospects of Z-source inverters, this paper contributes by introducing a new family of embedded EZ...

  15. New approach to invariant-embedding methods in reactor physics calculations

    International Nuclear Information System (INIS)

    Forsbacka, M.J.; Rydin, R.A.

    1997-01-01

    Invariant-embedding methods offer an alternative approach to modeling physical phenomena and solving mathematical problems. Invariant embedding allows one to express traditional boundary-value problems as initial-value problems. In doing this, one effectively reformulates a problem to be solved in terms of an embedding parameter. In this paper, a hybrid method that consists of Monte Carlo-generated response functions that describe the neutronic properties of local spatial cells are coupled together in a global reactor model using the invariant embedding methodology, where the system multiplication factor k eff is used as the embedding parameter. Thus, k eff is computed directly rather than as the result of a secondary eigenvalue calculation. Because the response functions can represent any arbitrary material distribution within a local cell, this method shows promise to accurately assess the change in reactivity due to core disruptive accidents and other changes in system configuration such as changing control rod positions. This paper reports a series of proof-of-concept calculations that assess this method

  16. Study on vertical seismic response characteristics of deeply embedded reactor building

    International Nuclear Information System (INIS)

    Morishita, H.; Nakamura, N.; Uchiyama, S.; Fukuoka, A.; Ishizaki, M.

    1993-01-01

    This paper describes vertical response characteristics, especially effects of embedment, and analytical methods for seismic design of a deeply embedded reactor building. The influence of embedment on vertical response was found to be minimal by evaluating results of forced vibration tests of a reactor building model and performing simplified analyses. Subsequently, simulation analyses of the forced vibration test and actual earthquake induced response were performed using both the axisymmetric FEM model and the simplified mass and spring model. It was concluded that the analytical models taking the embedment into the consideration closely simulated the observation records, and the omission of embedment in the analyses tended to increase the predicted response which was conservative in respect an actual design consideration. (author)

  17. Embedded Lattice and Properties of Gram Matrix

    Directory of Open Access Journals (Sweden)

    Futa Yuichi

    2017-03-01

    Full Text Available In this article, we formalize in Mizar [14] the definition of embedding of lattice and its properties. We formally define an inner product on an embedded module. We also formalize properties of Gram matrix. We formally prove that an inverse of Gram matrix for a rational lattice exists. Lattice of Z-module is necessary for lattice problems, LLL (Lenstra, Lenstra and Lov´asz base reduction algorithm [16] and cryptographic systems with lattice [17].

  18. FingerScanner: Embedding a Fingerprint Scanner in a Raspberry Pi

    Directory of Open Access Journals (Sweden)

    Jordi Sapes

    2016-02-01

    Full Text Available Nowadays, researchers are paying increasing attention to embedding systems. Cost reduction has lead to an increase in the number of platforms supporting the operating system Linux, jointly with the Raspberry Pi motherboard. Thus, embedding devices on Raspberry-Linux systems is a goal in order to make competitive commercial products. This paper presents a low-cost fingerprint recognition system embedded into a Raspberry Pi with Linux.

  19. Nuclear Magnetic Shielding Constants from Quantum Mechanical/Molecular Mechanical Calculations Using Polarizable Embedding: Role of the Embedding Potential

    DEFF Research Database (Denmark)

    Steinmann, Casper; Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2014-01-01

    We present NMR shielding constants obtained through quantum mechanical/molecular mechanical (QM/MM) embedding calculations. Contrary to previous reports, we show that a relatively small QM region is sufficient, provided that a high-quality embedding potential is used. The calculated averaged NMR...... shielding constants of both acrolein and acetone solvated in water are based on a number of snapshots extracted from classical molecular dynamics simulations. We focus on the carbonyl chromophore in both molecules, which shows large solvation effects, and we study the convergence of shielding constants...

  20. The Best and the Rest: Revisiting the Norm of Normality of Individual Performance

    Science.gov (United States)

    O'Boyle, Ernest, Jr.; Aguinis, Herman

    2012-01-01

    We revisit a long-held assumption in human resource management, organizational behavior, and industrial and organizational psychology that individual performance follows a Gaussian (normal) distribution. We conducted 5 studies involving 198 samples including 633,263 researchers, entertainers, politicians, and amateur and professional athletes.…

  1. Multiple Embedded Processors for Fault-Tolerant Computing

    Science.gov (United States)

    Bolotin, Gary; Watson, Robert; Katanyoutanant, Sunant; Burke, Gary; Wang, Mandy

    2005-01-01

    A fault-tolerant computer architecture has been conceived in an effort to reduce vulnerability to single-event upsets (spurious bit flips caused by impingement of energetic ionizing particles or photons). As in some prior fault-tolerant architectures, the redundancy needed for fault tolerance is obtained by use of multiple processors in one computer. Unlike prior architectures, the multiple processors are embedded in a single field-programmable gate array (FPGA). What makes this new approach practical is the recent commercial availability of FPGAs that are capable of having multiple embedded processors. A working prototype (see figure) consists of two embedded IBM PowerPC 405 processor cores and a comparator built on a Xilinx Virtex-II Pro FPGA. This relatively simple instantiation of the architecture implements an error-detection scheme. A planned future version, incorporating four processors and two comparators, would correct some errors in addition to detecting them.

  2. Embedded Thermal Control for Spacecraft Subsystems Miniaturization

    Science.gov (United States)

    Didion, Jeffrey R.

    2014-01-01

    Optimization of spacecraft size, weight and power (SWaP) resources is an explicit technical priority at Goddard Space Flight Center. Embedded Thermal Control Subsystems are a promising technology with many cross cutting NSAA, DoD and commercial applications: 1.) CubeSatSmallSat spacecraft architecture, 2.) high performance computing, 3.) On-board spacecraft electronics, 4.) Power electronics and RF arrays. The Embedded Thermal Control Subsystem technology development efforts focus on component, board and enclosure level devices that will ultimately include intelligent capabilities. The presentation will discuss electric, capillary and hybrid based hardware research and development efforts at Goddard Space Flight Center. The Embedded Thermal Control Subsystem development program consists of interrelated sub-initiatives, e.g., chip component level thermal control devices, self-sensing thermal management, advanced manufactured structures. This presentation includes technical status and progress on each of these investigations. Future sub-initiatives, technical milestones and program goals will be presented.

  3. Small Private Key MQPKS on an Embedded Microprocessor

    Directory of Open Access Journals (Sweden)

    Hwajeong Seo

    2014-03-01

    Full Text Available Multivariate quadratic (MQ cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011, a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  4. The design and implementation of embedded database in HIRFL-CSR

    International Nuclear Information System (INIS)

    Xu Yang; Liu Wufeng; Long Yindong; Chinese Academy of Sciences, Beijing; Qiao Weimin; Guo Yuhui

    2008-01-01

    This article introduces design and implementation of embedded database for control system in HIRFL-CSR. The control system has three level database for centralized-manage and distributed control. Level I and level II are based on Windows, connecting with each other by ODBC of Oracle database. Level III according to the control system is based on Embedded-Linux to communicate with others by SQLite database engine. The overall control room sends wave-data, event-table and other data to front embedded database in advance, the embedded database SQLite relay the data to wave generator DSP while experimentation. On the control of synchronization trigger, the DSP generates wave-data for the control of power supply and magnetic field. (authors)

  5. The Levy sections theorem revisited

    International Nuclear Information System (INIS)

    Figueiredo, Annibal; Gleria, Iram; Matsushita, Raul; Silva, Sergio Da

    2007-01-01

    This paper revisits the Levy sections theorem. We extend the scope of the theorem to time series and apply it to historical daily returns of selected dollar exchange rates. The elevated kurtosis usually observed in such series is then explained by their volatility patterns. And the duration of exchange rate pegs explains the extra elevated kurtosis in the exchange rates of emerging markets. In the end, our extension of the theorem provides an approach that is simpler than the more common explicit modelling of fat tails and dependence. Our main purpose is to build up a technique based on the sections that allows one to artificially remove the fat tails and dependence present in a data set. By analysing data through the lenses of the Levy sections theorem one can find common patterns in otherwise very different data sets

  6. The Levy sections theorem revisited

    Science.gov (United States)

    Figueiredo, Annibal; Gleria, Iram; Matsushita, Raul; Da Silva, Sergio

    2007-06-01

    This paper revisits the Levy sections theorem. We extend the scope of the theorem to time series and apply it to historical daily returns of selected dollar exchange rates. The elevated kurtosis usually observed in such series is then explained by their volatility patterns. And the duration of exchange rate pegs explains the extra elevated kurtosis in the exchange rates of emerging markets. In the end, our extension of the theorem provides an approach that is simpler than the more common explicit modelling of fat tails and dependence. Our main purpose is to build up a technique based on the sections that allows one to artificially remove the fat tails and dependence present in a data set. By analysing data through the lenses of the Levy sections theorem one can find common patterns in otherwise very different data sets.

  7. "Rapid Revisit" Measurements of Sea Surface Winds Using CYGNSS

    Science.gov (United States)

    Park, J.; Johnson, J. T.

    2017-12-01

    The Cyclone Global Navigation Satellite System (CYGNSS) is a space-borne GNSS-R (GNSS-Reflectometry) mission that launched December 15, 2016 for ocean surface wind speed measurements. CYGNSS includes 8 small satellites in the same LEO orbit, so that the mission provides wind speed products having unprecedented coverage both in time and space to study multi-temporal behaviors of oceanic winds. The nature of CYGNSS coverage results in some locations on Earth experiencing multiple wind speed measurements within a short period of time (a "clump" of observations in time resulting in a "rapid revisit" series of measurements). Such observations could seemingly provide indications of regions experiencing rapid changes in wind speeds, and therefore be of scientific utility. Temporally "clumped" properties of CYGNSS measurements are investigated using early CYGNSS L1/L2 measurements, and the results show that clump durations and spacing vary with latitude. For example, the duration of a clump can extend as long as a few hours at higher latitudes, with gaps between clumps ranging from 6 to as high as 12 hours depending on latitude. Examples are provided to indicate the potential of changes within a clump to produce a "rapid revisit" product for detecting convective activity. Also, we investigate detector design for identifying convective activities. Results from analyses using recent CYGNSS L2 winds will be provided in the presentation.

  8. The influence of peers and other significant persons on sexuality ...

    African Journals Online (AJOL)

    use among young adults in northern Tanzania. Bernard Njau, Sabina Mtweve, Longin Barongo, Rachel Manongi, Juliet Chugulu, Marcelina Msuya, Stella Mwampeta, Bertha Kiwale, Joseph Lekule, Hector Jalipa ...

  9. 77 FR 61755 - Performance Review Board Members

    Science.gov (United States)

    2012-10-11

    ... JULIET COHEN GARY CONNOR SUZI COX VIRGINIA DANIEL KATHERINE DEL VECCHIO PAOLO DELPHIN-RITTMON MIRIAM DEVOSS ELIZABETH DICKINSON ELIZABETH ERNEY JOAN GABRIEL EDWARD GOLDHABER BEN GOTTLICH VICKI HENDERSON...

  10. Re-visiting RHIC snakes: OPERA fields, n0 dance

    Energy Technology Data Exchange (ETDEWEB)

    Meot, F. [Brookhaven National Lab. (BNL), Upton, NY (United States); Gupta, R. [Brookhaven National Lab. (BNL), Upton, NY (United States); Huang, H. [Brookhaven National Lab. (BNL), Upton, NY (United States); Ranjbar, V. [Brookhaven National Lab. (BNL), Upton, NY (United States); Robert-Demolaize, G. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2017-09-22

    In this Tech. Note RHIC snakes and stable spin direction $\\vector{n}$0(s) are re-visited, based on OPERA-computed field maps of the former. The numerical simulations so undertaken provide various outcomes regarding RHIC optics and spin dynamics, in relation with orbital and focusing effects resulting from the use of this realistic 3-D representation of the snakes.

  11. Embedding JIT into MRP

    NARCIS (Netherlands)

    Flapper, S.D.P.; Miltenburg, G.J.; Wijngaard, J.

    1991-01-01

    Today many companies who are using MRP production control systems are investigating how they can produce some or all of their products using just-in time (JIT) principles. They wonder to what extent MRP can provide support for JIT production. This paper describes how JIT can be embedded into MRP. A

  12. Embedding methods of solidified waste in metal matrices

    International Nuclear Information System (INIS)

    Neumann, W.

    1979-01-01

    The embedding of simulated waste calcines by three different methods (vacuum-pressure casting, centrifugal casting, and metal stirred with the calcines) was investigated. The experimental performance is described and advantages and disadvantages noted. The feasibility of embedding fines by stirring in metal was shown. In addition, an estimation of the influence of porosity on the properties of composites was carried out

  13. Real-Time Operating Systems for Multicore Embedded Systems

    OpenAIRE

    Tomiyama, Hiroyuki; Honda, Shinya; Takada, Hiroaki

    2008-01-01

    Multicore systems-on-chip have become popular inthe design of embedded systems in order to simultaneously achieve high performance and low power consumption. On the software side, real-time operating systems are necessary in orderto handle growing complexity of embedded software. This paper describes requirements, design principles and implementation techniques for real-time operating systems to be used inasymmetric multicore systems.

  14. Embedded control system for high power RF amplifiers

    International Nuclear Information System (INIS)

    Sharma, Deepak Kumar; Gupta, Alok Kumar; Jain, Akhilesh; Hannurkar, P.R.

    2011-01-01

    RF power devices are usually very sensitive to overheat and reflected RF power; hence a protective interlock system is required to be embedded with high power solid state RF amplifiers. The solid state RF amplifiers have salient features of graceful degradation and very low mean time to repair (MTTR). In order to exploit these features in favour of lowest system downtime, a real-time control system is embedded with high power RF amplifiers. The control system is developed with the features of monitoring, measurement and network publishing of various parameters, historical data logging, alarm generation, displaying data to the operator and tripping the system in case of any interlock failure. This paper discusses the design philosophy, features, functions and implementation details of the embedded control system. (author)

  15. Serotype-specific mortality from invasive Streptococcus pneumoniae disease revisited

    DEFF Research Database (Denmark)

    Martens, Pernille; Worm, Signe Westring; Lundgren, Bettina

    2004-01-01

    Serotype-specific mortality from invasive Streptococcus pneumoniae disease revisited.Martens P, Worm SW, Lundgren B, Konradsen HB, Benfield T. Department of Infectious Diseases 144, Hvidovre University Hospital, DK-2650 Hvidovre, Denmark. pernillemartens@yahoo.com BACKGROUND: Invasive infection...... with Streptococcus pneumoniae (pneumococci) causes significant morbidity and mortality. Case series and experimental data have shown that the capsular serotype is involved in the pathogenesis and a determinant of disease outcome. METHODS: Retrospective review of 464 cases of invasive disease among adults diagnosed...

  16. Applying Distributed Object Technology to Distributed Embedded Control Systems

    DEFF Research Database (Denmark)

    Jørgensen, Bo Nørregaard; Dalgaard, Lars

    2012-01-01

    In this paper, we describe our Java RMI inspired Object Request Broker architecture MicroRMI for use with networked embedded devices. MicroRMI relieves the software developer from the tedious and error-prone job of writing communication protocols for interacting with such embedded devices. MicroR...... in developing control systems for distributed embedded platforms possessing severe resource restrictions.......RMI supports easy integration of high-level application specific control logic with low-level device specific control logic. Our experience from applying MicroRMI in the context of a distributed robotics control application, clearly demonstrates that it is feasible to use distributed object technology...

  17. Minimizing embedding impact in steganography using trellis-coded quantization

    Science.gov (United States)

    Filler, Tomáš; Judas, Jan; Fridrich, Jessica

    2010-01-01

    In this paper, we propose a practical approach to minimizing embedding impact in steganography based on syndrome coding and trellis-coded quantization and contrast its performance with bounds derived from appropriate rate-distortion bounds. We assume that each cover element can be assigned a positive scalar expressing the impact of making an embedding change at that element (single-letter distortion). The problem is to embed a given payload with minimal possible average embedding impact. This task, which can be viewed as a generalization of matrix embedding or writing on wet paper, has been approached using heuristic and suboptimal tools in the past. Here, we propose a fast and very versatile solution to this problem that can theoretically achieve performance arbitrarily close to the bound. It is based on syndrome coding using linear convolutional codes with the optimal binary quantizer implemented using the Viterbi algorithm run in the dual domain. The complexity and memory requirements of the embedding algorithm are linear w.r.t. the number of cover elements. For practitioners, we include detailed algorithms for finding good codes and their implementation. Finally, we report extensive experimental results for a large set of relative payloads and for different distortion profiles, including the wet paper channel.

  18. The biokinetics of uranium migrating from embedded DU fragments

    International Nuclear Information System (INIS)

    Leggett, R.W.; Pellmar, T.C.

    2003-01-01

    Military uses of depleted uranium (DU) munitions have resulted in casualties with embedded DU fragments. Assessment of radiological or chemical health risks from these fragments requires a model relating urinary U to the rate of migration of U from the fragments, and its accumulation in systemic tissues. A detailed biokinetic model for U has been published by the International Commission on Radiological Protection (ICRP), but its applicability to U migrating from embedded DU fragments is uncertain. Recently, ) conducted a study at the Armed Forces Radiobiology Research Institute (AFRRI) on the redistribution and toxicology of U in rats with implanted DU pellets, simulating embedded fragments. This paper compares the biokinetic data from that study with the behavior of commonly studied forms of U in rats (e.g., intravenously injected U nitrate). The comparisons indicate that the biokinetics of U migrating from embedded DU is similar to that of commonly studied forms of U with regard to long-term accumulation in kidneys, bone, and liver. The results provide limited support for the application of the ICRP's model to persons with embedded DU fragments. Additional information is needed with regard to the short-term behavior of migrating U and its accumulation in lymph nodes, brain, testicles, and other infrequently studied U repositories

  19. Embedded Systems Development Tools: A MODUS-oriented Market Overview

    Directory of Open Access Journals (Sweden)

    Loupis Michalis

    2014-03-01

    Full Text Available Background: The embedded systems technology has perhaps been the most dominating technology in high-tech industries, in the past decade. The industry has correctly identified the potential of this technology and has put its efforts into exploring its full potential. Objectives: The goal of the paper is to explore the versatility of the application in the embedded system development based on one FP7-SME project. Methods/Approach: Embedded applications normally demand high resilience and quality, as well as conformity to quality standards and rigid performance. As a result embedded system developers have adopted software methods that yield high quality. The qualitative approach to examining embedded systems development tools has been applied in this work. Results: This paper presents a MODUS-oriented market analysis in the domains of Formal Verification tools, HW/SW co-simulation tools, Software Performance Optimization tools and Code Generation tools. Conclusions: The versatility of applications this technology serves is amazing. With all this performance potential, the technology has carried with itself a large number of issues which the industry essentially needs to resolve to be able to harness the full potential contained. The MODUS project toolset addressed four discrete domains of the ESD Software Market, in which corresponding open tools were developed

  20. Groundwater connectivity of upland-embedded wetlands in the Prairie Pothole Region

    Science.gov (United States)

    Neff, Brian; Rosenberry, Donald O.

    2018-01-01

    Groundwater connections from upland-embedded wetlands to downstream waterbodies remain poorly understood. In principle, water from upland-embedded wetlands situated high in a landscape should flow via groundwater to waterbodies situated lower in the landscape. However, the degree of groundwater connectivity varies across systems due to factors such as geologic setting, hydrologic conditions, and topography. We use numerical models to evaluate the conditions suitable for groundwater connectivity between upland-embedded wetlands and downstream waterbodies in the prairie pothole region of North Dakota (USA). Results show groundwater connectivity between upland-embedded wetlands and other waterbodies is restricted when these wetlands are surrounded by a mounding water table. However, connectivity exists among adjacent upland-embedded wetlands where water–table mounds do not form. In addition, the presence of sand layers greatly facilitates groundwater connectivity of upland-embedded wetlands. Anisotropy can facilitate connectivity via groundwater flow, but only if it becomes unrealistically large. These findings help consolidate previously divergent views on the significance of local and regional groundwater flow in the prairie pothole region.

  1. The emergence of embedded structure: insights from Kafr Qasem Sign Language

    Science.gov (United States)

    Kastner, Itamar; Meir, Irit; Sandler, Wendy; Dachkovsky, Svetlana

    2014-01-01

    This paper introduces data from Kafr Qasem Sign Language (KQSL), an as-yet undescribed sign language, and identifies the earliest indications of embedding in this young language. Using semantic and prosodic criteria, we identify predicates that form a constituent with a noun, functionally modifying it. We analyze these structures as instances of embedded predicates, exhibiting what can be regarded as very early stages in the development of subordinate constructions, and argue that these structures may bear directly on questions about the development of embedding and subordination in language in general. Deutscher (2009) argues persuasively that nominalization of a verb is the first step—and the crucial step—toward syntactic embedding. It has also been suggested that prosodic marking may precede syntactic marking of embedding (Mithun, 2009). However, the relevant data from the stage at which embedding first emerges have not previously been available. KQSL might be the missing piece of the puzzle: a language in which a noun can be modified by an additional predicate, forming a proposition within a proposition, sustained entirely by prosodic means. PMID:24917837

  2. Model-based design of adaptive embedded systems

    CERN Document Server

    Hamberg, Roelof; Reckers, Frans; Verriet, Jacques

    2013-01-01

    Today’s embedded systems have to operate in a wide variety of dynamically changing environmental circumstances. Adaptivity, the ability of a system to autonomously adapt itself, is a means to optimise a system’s behaviour to accommodate changes in its environment. It involves making in-product trade-offs between system qualities at system level. The main challenge in the development of adaptive systems is keeping control of the intrinsic complexity of such systems while working with multi-disciplinary teams to create different parts of the system. Model-Based Development of Adaptive Embedded Systems focuses on the development of adaptive embedded systems both from an architectural and methodological point of view. It describes architectural solution patterns for adaptive systems and state-of-the-art model-based methods and techniques to support adaptive system development. In particular, the book describes the outcome of the Octopus project, a cooperation of a multi-disciplinary team of academic and indus...

  3. Embedded enzymes catalyse capture

    Science.gov (United States)

    Kentish, Sandra

    2018-05-01

    Membrane technologies for carbon capture can offer economic and environmental advantages over conventional amine-based absorption, but can suffer from limited gas flux and selectivity to CO2. Now, a membrane based on enzymes embedded in hydrophilic pores is shown to exhibit combined flux and selectivity that challenges the state of the art.

  4. Embedded System for Biometric Identification

    OpenAIRE

    Rosli, Ahmad Nasir Che

    2010-01-01

    This chapter describes the design and implementation of an Embedded System for Biometric Identification from hardware and software perspectives. The first part of the chapter describes the idea of biometric identification. This includes the definition of

  5. Fluorescence in situ hybridization on formalin-fixed and paraffin-embedded tissue

    DEFF Research Database (Denmark)

    Laub Petersen, Bodil; Zeuthen, Mette Christa; Pedersen, Sanni

    2004-01-01

    , such as quantitation of signals as in triploidy, it is possible to isolate nuclei from paraffin-embedded tissue. However, using formalin-fixed paraffin-embedded tissue, either in thin sections or as isolated nuclei, one encounters a range of technical problems, paralleling those met in immunohistochemistry. Variations...... nuclei and tissue sections from formalin-fixed, paraffin-embedded tissue....

  6. A real-time photogrammetry system based on embedded architecture

    Directory of Open Access Journals (Sweden)

    S. Y. Zheng

    2014-06-01

    Full Text Available In order to meet the demand of real-time spatial data processing and improve the online processing capability of photogrammetric system, a kind of real-time photogrammetry method is proposed in this paper. According to the proposed method, system based on embedded architecture is then designed: using FPGA, ARM+DSP and other embedded computing technology to build specialized hardware operating environment, transplanting and optimizing the existing photogrammetric algorithm to the embedded system, and finally real-time photogrammetric data processing is realized. At last, aerial photogrammetric experiment shows that the method can achieve high-speed and stable on-line processing of photogrammetric data. And the experiment also verifies the feasibility of the proposed real-time photogrammetric system based on embedded architecture. It is the first time to realize real-time aerial photogrammetric system, which can improve the online processing efficiency of photogrammetry to a higher level and broaden the application field of photogrammetry.

  7. An integrated compact airborne multispectral imaging system using embedded computer

    Science.gov (United States)

    Zhang, Yuedong; Wang, Li; Zhang, Xuguo

    2015-08-01

    An integrated compact airborne multispectral imaging system using embedded computer based control system was developed for small aircraft multispectral imaging application. The multispectral imaging system integrates CMOS camera, filter wheel with eight filters, two-axis stabilized platform, miniature POS (position and orientation system) and embedded computer. The embedded computer has excellent universality and expansibility, and has advantages in volume and weight for airborne platform, so it can meet the requirements of control system of the integrated airborne multispectral imaging system. The embedded computer controls the camera parameters setting, filter wheel and stabilized platform working, image and POS data acquisition, and stores the image and data. The airborne multispectral imaging system can connect peripheral device use the ports of the embedded computer, so the system operation and the stored image data management are easy. This airborne multispectral imaging system has advantages of small volume, multi-function, and good expansibility. The imaging experiment results show that this system has potential for multispectral remote sensing in applications such as resource investigation and environmental monitoring.

  8. Open-ended response theory with polarizable embedding

    DEFF Research Database (Denmark)

    Steindal, Arnfinn Hykkerud; Beerepoot, Maarten T P; Ringholm, Magnus

    2016-01-01

    We present the theory and implementation of an open-ended framework for electric response properties at the level of Hartree-Fock and Kohn-Sham density functional theory that includes effects from the molecular environment modeled by the polarizable embedding (PE) model. With this new state......-of-the-art multiscale functionality, electric response properties to any order can be calculated for molecules embedded in polarizable atomistic molecular environments ranging from solvents to complex heterogeneous macromolecules such as proteins. In addition, environmental effects on multiphoton absorption (MPA...

  9. The Assassination of John F. Kennedy: Revisiting the Medical Data

    OpenAIRE

    Rohrich, Rod J.; Nagarkar, Purushottam; Stokes, Mike; Weinstein, Aaron; Mantik, David W.; Jensen, J. Arthur

    2014-01-01

    Thank you for publishing "The Assassination of John F. Kennedy: Revisiting the Medical Data."1 The central conclusion of this study is that the assassination remains controversial and that some of the controversy must be attributable to the "reporting and handling of the medical evidence." With the greatest respect for you and Dr. Robert McClelland, let me argue that your text and on-line interviews perpetuate the central misunderstanding of the assassination and there...

  10. Dispute Resolution and Technology: Revisiting the Justification of Conflict Management

    OpenAIRE

    Koulu, Riikka

    2016-01-01

    This study, Dispute Resolution and Technology: Revisiting the Justification of Conflict Management, belongs to the fields of procedural law, legal theory and law and technology studies. In this study the changes in dispute resolution caused by technology are evaluated. The overarching research question of this study is how does implementing technology to dispute resolution challenge the justification of law as a legitimised mode of violence? Before answering such an abstract research question...

  11. Deja vu: The Unified Command Plan of the Future Revisited

    Science.gov (United States)

    2011-05-19

    Approved for Public Release; Distribution is Unlimited Déjà vu : The Unified Command Plan of the Future Revisited A Monograph by Lieutenant...DD-MM-YYYY) 19-05-2011 2. REPORT TYPE Monograph 3. DATES COVERED (From - To) JUL 2010 – MAY 2011 4. TITLE AND SUBTITLE Déjà vu : The Unified...i SCHOOL OF ADVANCED MILITARY STUDIES MONOGRAPH APPROVAL Lieutenant Colonel Edward Francis Martignetti Title of Monograph: Déjà vu : The Unified

  12. Interpretation of transport barriers and of subneoclassical transport in the framework of the revisited neoclassical theory

    International Nuclear Information System (INIS)

    Rogister, A.L.

    1999-01-01

    'Subneoclassical' heat fluxes are predicted in the high collisionality regime by the revisited neoclassical theory, which includes the roles of Finite Larmor Radius effects and Inertia, that we published earlier. Unlike conventional neoclassical theory, the revisited theory further provides a non degenerate ambipolarity constraint which defines unambiguously the radial electric field. Together with the parallel momentum equation, the ambipolarity constraint leads, under some conditions, to radial electric field profiles with high negative shear akin to those observed in spontaneous edge transport barriers. The predictions of the theory are outlined, with emphasis laid on the interpretation of experimental results such as magnitude of the jumps, width of the shear layer, local scaling laws. Extension of the theory to triggered transitions and cold pulse propagation studies is suggested. (author)

  13. How does the Ambience of Cafe Affect the Revisit Intention Among its Patrons? A S on the Cafes in Ipoh, Perak

    Directory of Open Access Journals (Sweden)

    AbuThahir Sharmeela-Banu Syed

    2018-01-01

    Full Text Available Food service industry is growing rapidly as a result of the changing consumer lifestyle. The food service industry is highly competitive due to the increasing number of new entrants offering inventive food products and services. In order to be outstanding in such competitive industry, retailers nowadays opt to emphasize on their store environment. Past studies discovered that store environment stimulates emotions that significantly boost customer revisit intention. As a result, retailers attempt to differentiate their store by combining various environmental stimuli to create an attractive ambience that will in turn draw in the customers. Hence, this study attempts to investigate the impact of various café ambience factors on the patrons’ revisit intention. The patrons of cafes in Ipoh, Perak were selected using purposive sampling technique to be the respondents of this study. 250 questionnaires were collected and Partial Least Square technique was used to analyse the data collected. Findings show that all the five factors of café ambience namely lighting, music, decoration, cleanliness and layouts were significantly influencing the patrons’ revisit intention. Of these five factors, lighting was most influential while music was the least influential in affecting the patrons’ revisit intention. Accordingly, this study lists several recommendations for practitioners and academics with regards to the store environment and its impact on the repurchase intention.

  14. Using scenario based programming to develop embedded control software

    NARCIS (Netherlands)

    Bettiol, F.

    2015-01-01

    A new paradigm to develop embedded software is waking up the interest of companies. Its name is Scenario Based Programming and it claims to be a good approach to develop embedded software. Live Sequence Charts (LSC), a visual language supporting the paradigm, enables the developers to specify a

  15. Learning optimal embedded cascades.

    Science.gov (United States)

    Saberian, Mohammad Javad; Vasconcelos, Nuno

    2012-10-01

    The problem of automatic and optimal design of embedded object detector cascades is considered. Two main challenges are identified: optimization of the cascade configuration and optimization of individual cascade stages, so as to achieve the best tradeoff between classification accuracy and speed, under a detection rate constraint. Two novel boosting algorithms are proposed to address these problems. The first, RCBoost, formulates boosting as a constrained optimization problem which is solved with a barrier penalty method. The constraint is the target detection rate, which is met at all iterations of the boosting process. This enables the design of embedded cascades of known configuration without extensive cross validation or heuristics. The second, ECBoost, searches over cascade configurations to achieve the optimal tradeoff between classification risk and speed. The two algorithms are combined into an overall boosting procedure, RCECBoost, which optimizes both the cascade configuration and its stages under a detection rate constraint, in a fully automated manner. Extensive experiments in face, car, pedestrian, and panda detection show that the resulting detectors achieve an accuracy versus speed tradeoff superior to those of previous methods.

  16. Embedded Multimaterial Extrusion Bioprinting.

    Science.gov (United States)

    Rocca, Marco; Fragasso, Alessio; Liu, Wanjun; Heinrich, Marcel A; Zhang, Yu Shrike

    2018-04-01

    Embedded extrusion bioprinting allows for the generation of complex structures that otherwise cannot be achieved with conventional layer-by-layer deposition from the bottom, by overcoming the limits imposed by gravitational force. By taking advantage of a hydrogel bath, serving as a sacrificial printing environment, it is feasible to extrude a bioink in freeform until the entire structure is deposited and crosslinked. The bioprinted structure can be subsequently released from the supporting hydrogel and used for further applications. Combining this advanced three-dimensional (3D) bioprinting technique with a multimaterial extrusion printhead setup enables the fabrication of complex volumetric structures built from multiple bioinks. The work described in this paper focuses on the optimization of the experimental setup and proposes a workflow to automate the bioprinting process, resulting in a fast and efficient conversion of a virtual 3D model into a physical, extruded structure in freeform using the multimaterial embedded bioprinting system. It is anticipated that further development of this technology will likely lead to widespread applications in areas such as tissue engineering, pharmaceutical testing, and organs-on-chips.

  17. Embedded Systems for Smart Appliances and Energy Management

    CERN Document Server

    Neumann, Peter; Mahlknecht, Stefan

    2013-01-01

    This book provides a comprehensive introduction to embedded systems for smart appliances and energy management, bringing together for the first time a multidisciplinary blend of topics from embedded systems, information technology and power engineering.  Coverage includes challenges for future resource distribution grids, energy management in smart appliances, micro energy generation, demand response management, ultra-low power stand by, smart standby and communication networks in home and building automation.   Provides a comprehensive, multidisciplinary introduction to embedded systems for smart appliances and energy management; Equips researchers and engineers with information required to succeed in designing energy management for smart appliances; Includes coverage of resource distribution grids, energy management in smart appliances, micro energy generation, demand response management, ultra-low power stand by, smart standby and communication networks in home and building automation.  

  18. A embedded Linux system based on PowerPC

    International Nuclear Information System (INIS)

    Ye Mei; Zhao Jingwei; Chu Yuanping

    2006-01-01

    The authors will introduce a Embedded Linux System based on PowerPC as well as the base method on how to establish the system. The goal of the system is to build a test system of VMEbus device. It also can be used to setup the small data acquisition and control system. Two types of compiler are provided by the developer system according to the features of the system and the Power PC. At the top of the article some typical embedded Operation system will be introduced and the features of different system will be provided. And then the method on how to build a embedded Linux system as well as the key technique will be discussed in detail. Finally a successful read-write example will be given based on the test system. (authors)

  19. An Investigation into the Cost of Unit Testing on an Embedded System

    OpenAIRE

    Qiu, Wensi

    2011-01-01

    The quality of embedded software is important, especially for life-critical and mission-critical embedded systems. And software testing is a key activity to ensure the quality of embedded software. Both system testing and unit testing are vital to test embedded software. Unit testing is probably more important to ensure there are no latent faults. System testing is almost invariably done on a target system, but unit testing is normally done on a host system, as standard test frame...

  20. Heartbeat-based error diagnosis framework for distributed embedded systems

    Science.gov (United States)

    Mishra, Swagat; Khilar, Pabitra Mohan

    2012-01-01

    Distributed Embedded Systems have significant applications in automobile industry as steer-by-wire, fly-by-wire and brake-by-wire systems. In this paper, we provide a general framework for fault detection in a distributed embedded real time system. We use heartbeat monitoring, check pointing and model based redundancy to design a scalable framework that takes care of task scheduling, temperature control and diagnosis of faulty nodes in a distributed embedded system. This helps in diagnosis and shutting down of faulty actuators before the system becomes unsafe. The framework is designed and tested using a new simulation model consisting of virtual nodes working on a message passing system.

  1. Revisiting reflexology: Concept, evidence, current practice, and practitioner training

    OpenAIRE

    Embong, Nurul Haswani; Soh, Yee Chang; Ming, Long Chiau; Wong, Tin Wui

    2015-01-01

    Reflexology is basically a study of how one part of the human body relates to another part of the body. Reflexology practitioners rely on the reflexes map of the feet and hands to all the internal organs and other human body parts. They believe that by applying the appropriate pressure and massage certain spots on the feet and hands, all other body parts could be energized and rejuvenated. This review aimed to revisit the concept of reflexology and examine its effectiveness, practices, and th...

  2. The Impact of Physically Embedded Librarianship on Academic Departments

    Science.gov (United States)

    O'Toole, Erin; Barham, Rebecca; Monahan, Jo

    2016-01-01

    Academic librarians have been engaged in embedded librarianship for nearly 15 years, yet there are few published research studies on the impact of physically embedded librarians, who work alongside departmental faculty. This study leveraged a change in reference service to analyze what happened when subject librarians moved from the library…

  3. Global embedding of the Kerr black hole event horizon into hyperbolic 3-space

    International Nuclear Information System (INIS)

    Gibbons, G. W.; Herdeiro, C. A. R.; Rebelo, C.

    2009-01-01

    An explicit global and unique isometric embedding into hyperbolic 3-space, H 3 , of an axi-symmetric 2-surface with Gaussian curvature bounded below is given. In particular, this allows the embedding into H 3 of surfaces of revolution having negative, but finite, Gaussian curvature at smooth fixed points of the U(1) isometry. As an example, we exhibit the global embedding of the Kerr-Newman event horizon into H 3 , for arbitrary values of the angular momentum. For this example, considering a quotient of H 3 by the Picard group, we show that the hyperbolic embedding fits in a fundamental domain of the group up to a slightly larger value of the angular momentum than the limit for which a global embedding into Euclidean 3-space is possible. An embedding of the double-Kerr event horizon is also presented, as an example of an embedding that cannot be made global.

  4. Roll-to-roll embedded conductive structures integrated into organic photovoltaic devices

    International Nuclear Information System (INIS)

    Van de Wiel, H J; Galagan, Y; Van Lammeren, T J; De Riet, J F J; Gilot, J; Nagelkerke, M G M; Lelieveld, R H C A T; Shanmugam, S; Pagudala, A; Groen, W A; Hui, D

    2013-01-01

    Highly conductive screen printed metallic (silver) structures (current collecting grids) combined with poly(3,4-ethylenedioxythiophene):poly(styrene sulfonate) (PEDOT:PSS) are a viable replacement for indium tin oxide (ITO) and inkjet printed silver as transparent electrode materials. To provide successful integration into organic photovoltaic (OPV) devices, screen printed silver current collecting grids should be embedded into a substrate to avoid topology issues. In this study micron-thick conductive structures are embedded and integrated into OPV devices. The embedded structures are produced roll-to-roll with optimized process settings and materials. Topology measurements show that the embedded grids are well suited for integration into OPV devices since the surface is almost without spikes and has low surface roughness. JV measurements of OPV devices with embedded structures on a polyethylene terephthalate/silicon nitride (PET/SiN) substrate show an efficiency of 2.15%, which is significantly higher than identical flexible devices with ITO (1.02%) and inkjet printed silver (1.48%). The use of embedded screen printed silver instead of ITO and inkjet printed silver in OPV devices will allow for higher efficiency devices which can be produced with larger design and process freedom. (paper)

  5. Dynamic soil-structure interactions on embedded buildings

    International Nuclear Information System (INIS)

    Kobarg, J.; Werkle, H.; Henseleit, O.

    1983-01-01

    The dynamic soil-structure interaction on the horizontal seismic excitation is investigated on two typical embedded auxiliary buildings of a nuclear power plant. The structure and the soil are modelled by various analytical and numerical methods. Under the condition of the linear viscoelastic theory, i.e. soil characteristic constant in time and independent of strain, the interaction influences between a homogenous soil layer and a structure are analysied for the following parameters: 4) mathematical soil modells; 4) mathematical structure modells; 4) shear wave velocities; 3) embedment conditions; 4) earthquake time histories. (orig.) [de

  6. Microwave de-embedding from theory to applications

    CERN Document Server

    Crupi, Giovanni

    2013-01-01

    This groundbreaking book is the first to give an introduction to microwave de-embedding, showing how it is the cornerstone for waveform engineering. The authors of each chapter clearly explain the theoretical concepts, providing a foundation that supports linear and non-linear measurements, modelling and circuit design. Recent developments and future trends in the field are covered throughout, including successful strategies for low-noise and power amplifier design. This book is a must-have for those wishing to understand the full potential of the microwave de-embedding concept to achieve suc

  7. EVE: Explainable Vector Based Embedding Technique Using Wikipedia

    OpenAIRE

    Qureshi, M. Atif; Greene, Derek

    2017-01-01

    We present an unsupervised explainable word embedding technique, called EVE, which is built upon the structure of Wikipedia. The proposed model defines the dimensions of a semantic vector representing a word using human-readable labels, thereby it readily interpretable. Specifically, each vector is constructed using the Wikipedia category graph structure together with the Wikipedia article link structure. To test the effectiveness of the proposed word embedding model, we consider its usefulne...

  8. Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.

    Science.gov (United States)

    Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong

    2015-01-01

    Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

  9. Energy efficient HPC on embedded SoCs : optimization techniques for mali GPU

    OpenAIRE

    Grasso, Ivan; Radojkovic, Petar; Rajovic, Nikola; Gelado Fernandez, Isaac; Ramírez Bellido, Alejandro

    2014-01-01

    A lot of effort from academia and industry has been invested in exploring the suitability of low-power embedded technologies for HPC. Although state-of-the-art embedded systems-on-chip (SoCs) inherently contain GPUs that could be used for HPC, their performance and energy capabilities have never been evaluated. Two reasons contribute to the above. Primarily, embedded GPUs until now, have not supported 64-bit floating point arithmetic - a requirement for HPC. Secondly, embedded GPUs did not pr...

  10. Constraint Embedding for Multibody System Dynamics

    Science.gov (United States)

    Jain, Abhinandan

    2009-01-01

    This paper describes a constraint embedding approach for the handling of local closure constraints in multibody system dynamics. The approach uses spatial operator techniques to eliminate local-loop constraints from the system and effectively convert the system into tree-topology systems. This approach allows the direct derivation of recursive O(N) techniques for solving the system dynamics and avoiding the expensive steps that would otherwise be required for handling the closedchain dynamics. The approach is very effective for systems where the constraints are confined to small-subgraphs within the system topology. The paper provides background on the spatial operator O(N) algorithms, the extensions for handling embedded constraints, and concludes with some examples of such constraints.

  11. Revisiting the Metaphor of the Island: Challenging "World Culture" from an Island Misunderstood

    Science.gov (United States)

    Rappleye, Jeremy

    2015-01-01

    This article revisits the newly "discovered" island that world culture theorists have repeatedly utilised to explain their theoretical stance, conceptual preferences and methodological approach. Yet, it seeks to (re)connect world culture with the real world by replacing their imagined atoll with a real one--the island-nation of Japan. In…

  12. Intrinsic embedded sensors for polymeric mechatronics: flexure and force sensing.

    Science.gov (United States)

    Jentoft, Leif P; Dollar, Aaron M; Wagner, Christopher R; Howe, Robert D

    2014-02-25

    While polymeric fabrication processes, including recent advances in additive manufacturing, have revolutionized manufacturing, little work has been done on effective sensing elements compatible with and embedded within polymeric structures. In this paper, we describe the development and evaluation of two important sensing modalities for embedding in polymeric mechatronic and robotic mechanisms: multi-axis flexure joint angle sensing utilizing IR phototransistors, and a small (12 mm), three-axis force sensing via embedded silicon strain gages with similar performance characteristics as an equally sized metal element based sensor.

  13. The healthy ancestor: embodied inequality and the revitalization of native Hawaiian health

    National Research Council Canada - National Science Library

    McMullin, Juliet Marie

    2010-01-01

    ..." enjoyed by the "mainstream" population. Challenging this dominant approach to indigenous health, Juliet McMullin shows how it masks more fundamental inequalities that become literally embodied in Native Americans, shifting blame...

  14. CO oxidation catalyzed by Pt-embedded graphene: A first-principles investigation

    KAUST Repository

    Liu, Xin; Sui, Yanhui; Duan, Ting; Meng, Changong; Han, Yu

    2014-01-01

    We addressed the potential catalytic role of Pt-embedded graphene in CO oxidation by first-principles-based calculations. We showed that the combination of highly reactive Pt atoms and defects over graphene makes the Pt-embedded graphene a superior mono-dispersed atomic catalyst for CO oxidation. The binding energy of a single Pt atom onto monovacancy defects is up to -7.10 eV, which not only ensures the high stability of the embedded Pt atom, but also vigorously excludes the possibility of diffusion and aggregation of embedded Pt atoms. This strong interfacial interaction also tunes the energy level of Pt-d states for the activation of O2, and promotes the formation and dissociation of the peroxide-like intermediate. The catalytic cycle of CO oxidation is initiated through the Langmuir-Hinshelwood mechanism, with the formation of a peroxide-like intermediate by the coadsorbed CO and O2, by the dissociation of which the CO2 molecule and an adsorbed O atom are formed. Then, another gaseous CO will react with the remnant O atom and make the embedded Pt atom available for the subsequent reaction. The calculated energy barriers for the formation and dissociation of the peroxide-like intermediate are as low as 0.33 and 0.15 eV, respectively, while that for the regeneration of the embedded Pt atom is 0.46 eV, indicating the potential high catalytic performance of Pt-embedded graphene for low temperature CO oxidation.

  15. Revisiting R-invariant direct gauge mediation

    Energy Technology Data Exchange (ETDEWEB)

    Chiang, Cheng-Wei [Center for Mathematics and Theoretical Physics andDepartment of Physics, National Central University,Taoyuan, Taiwan 32001, R.O.C. (China); Institute of Physics, Academia Sinica,Taipei, Taiwan 11529, R.O.C. (China); Physics Division, National Center for Theoretical Sciences,Hsinchu, Taiwan 30013, R.O.C. (China); Kavli IPMU (WPI), UTIAS, University of Tokyo,Kashiwa, Chiba 277-8583 (Japan); Harigaya, Keisuke [Department of Physics, University of California,Berkeley, California 94720 (United States); Theoretical Physics Group, Lawrence Berkeley National Laboratory,Berkeley, California 94720 (United States); ICRR, University of Tokyo,Kashiwa, Chiba 277-8582 (Japan); Ibe, Masahiro [Kavli IPMU (WPI), UTIAS, University of Tokyo,Kashiwa, Chiba 277-8583 (Japan); ICRR, University of Tokyo,Kashiwa, Chiba 277-8582 (Japan); Yanagida, Tsutomu T. [Kavli IPMU (WPI), UTIAS, University of Tokyo,Kashiwa, Chiba 277-8583 (Japan)

    2016-03-21

    We revisit a special model of gauge mediated supersymmetry breaking, the “R-invariant direct gauge mediation.” We pay particular attention to whether the model is consistent with the minimal model of the μ-term, i.e., a simple mass term of the Higgs doublets in the superpotential. Although the incompatibility is highlighted in view of the current experimental constraints on the superparticle masses and the observed Higgs boson mass, the minimal μ-term can be consistent with the R-invariant gauge mediation model via a careful choice of model parameters. We derive an upper limit on the gluino mass from the observed Higgs boson mass. We also discuss whether the model can explain the 3σ excess of the Z+jets+E{sub T}{sup miss} events reported by the ATLAS collaboration.

  16. Revisiting kaon physics in general Z scenario

    Directory of Open Access Journals (Sweden)

    Motoi Endo

    2017-08-01

    Full Text Available New physics contributions to the Z penguin are revisited in the light of the recently-reported discrepancy of the direct CP violation in K→ππ. Interference effects between the standard model and new physics contributions to ΔS=2 observables are taken into account. Although the effects are overlooked in the literature, they make experimental bounds significantly severer. It is shown that the new physics contributions must be tuned to enhance B(KL→π0νν¯, if the discrepancy of the direct CP violation is explained with satisfying the experimental constraints. The branching ratio can be as large as 6×10−10 when the contributions are tuned at the 10% level.

  17. Way of Working for Embedded Control Software using Model-Driven Development Techniques

    NARCIS (Netherlands)

    Bezemer, M.M.; Groothuis, M.A.; Brugali, D.; Schlegel, C.; Broenink, Johannes F.

    2011-01-01

    Embedded targets normally do not have much resources to aid developing and debugging the software. So model-driven development (MDD) is used for designing embedded software with a `first time right' approach. For such an approach, a good way of working (WoW) is required for embedded software

  18. Embedded Hardware

    CERN Document Server

    Ganssle, Jack G; Eady, Fred; Edwards, Lewin; Katz, David J; Gentile, Rick

    2007-01-01

    The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!. Circuit design using microcontrollers is both a science and an art. This book covers it all. It details all of the essential theory and facts to help an engineer design a robust embedded system. Processors, memory, and the hot topic of interconnects (I/O) are completely covered. Our authors bring a wealth of experience and ideas; thi

  19. Research on Face Recognition Based on Embedded System

    Directory of Open Access Journals (Sweden)

    Hong Zhao

    2013-01-01

    Full Text Available Because a number of image feature data to store, complex calculation to execute during the face recognition, therefore the face recognition process was realized only by PCs with high performance. In this paper, the OpenCV facial Haar-like features were used to identify face region; the Principal Component Analysis (PCA was employed in quick extraction of face features and the Euclidean Distance was also adopted in face recognition; as thus, data amount and computational complexity would be reduced effectively in face recognition, and the face recognition could be carried out on embedded platform. Finally, based on Tiny6410 embedded platform, a set of embedded face recognition systems was constructed. The test results showed that the system has stable operation and high recognition rate can be used in portable and mobile identification and authentication.

  20. Revisiting the Decision of Death in Hurst v. Florida.

    Science.gov (United States)

    Cooke, Brian K; Ginory, Almari; Zedalis, Jennifer

    2016-12-01

    The United States Supreme Court has considered the question of whether a judge or a jury must make the findings necessary to support imposition of the death penalty in several notable cases, including Spaziano v. Florida (1984), Hildwin v. Florida (1989), and Ring v. Arizona (2002). In 2016, the U.S. Supreme Court revisited the subject in Hurst v. Florida Florida Statute § 921.141 allows the judge, after weighing aggravating and mitigating circumstances, to enter a sentence of life imprisonment or death. Before Hurst, Florida's bifurcated sentencing proceedings included an advisory sentence from jurors and a separate judicial hearing without juror involvement. In Hurst, the Court revisited the question of whether Florida's capital sentencing scheme violates the Sixth Amendment, which requires a jury, not a judge, to find each fact necessary to impose a sentence of death in light of Ring In an eight-to-one decision, the Court reversed the judgment of the Florida Supreme Court, holding that the Sixth Amendment requires a jury to find the aggravating factors necessary for imposing the death penalty. The role of Florida juries in capital sentencing proceedings was thereby elevated from advisory to determinative. We examine the Court's decision and offer commentary regarding this shift from judge to jury in the final imposition of the death penalty and the overall effect of this landmark case. © 2016 American Academy of Psychiatry and the Law.

  1. Testing methodology of embedded software in digital plant protection system

    International Nuclear Information System (INIS)

    Seong, Ah Young; Choi, Bong Joo; Lee, Na Young; Hwang, Il Soon

    2001-01-01

    It is necessary to assure the reliability of software in order to digitalize RPS(Reactor Protection System). Since RPS causes fatal damage on accidental cases, it is classified as Safety 1E class. Therefore we propose the effective testing methodology to assure the reliability of embedded software in the DPPS(Digital Plant Protection System). To test the embedded software effectively in DPPS, our methodology consists of two steps. The first is the re-engineering step that extracts classes from structural source program, and the second is the level of testing step which is composed of unit testing, Integration Testing and System Testing. On each testing step we test the embedded software with selected test cases after the test item identification step. If we use this testing methodology, we can test the embedded software effectively by reducing the cost and the time

  2. Revisiting the two formulations of Bianchi identities and their implications on moduli stabilization

    Energy Technology Data Exchange (ETDEWEB)

    Shukla, Pramod [ICTP - International Centre for Theoretical Physics,Strada Costiera 11, Trieste 34151 (Italy)

    2016-08-24

    In the context of non-geometric type II orientifold compactifications, there have been two formulations for representing the various NS-NS Bianchi-identities. In the first formulation, the standard three-form flux (H{sub 3}), the geometric flux (ω) and the non-geometric fluxes (Q and R) are expressed by using the real six-dimensional indices (e.g. H{sub ijk},ω{sub ij}{sup k},Q{sub i}{sup jk} and R{sup ijk}), and this formulation has been heavily utilized for simplifying the scalar potentials in toroidal-orientifolds. On the other hand, relevant for the studies beyond toroidal backgrounds, a second formulation is utilized in which all flux components are written in terms of various involutively even/odd (2,1)- and (1,1)-cohomologies of the complex threefold. In the lights of recent model building interests and some observations made in http://dx.doi.org/10.1088/1126-6708/2007/08/043, http://dx.doi.org/10.1088/1126-6708/2007/12/058, in this article, we revisit two most commonly studied toroidal examples in detail to illustrate that the present forms of these two formulations are not completely equivalent. To demonstrate the same, we translate all the identities of the first formulation into cohomology ingredients, and after a tedious reshuffling of the subsequent constraints, interestingly we find that all the identities of the second formulation are embedded into the first formulation which has some additional constraints. In addition, we look for the possible solutions of these Bianchi identities in a detailed analysis, and we find that some solutions can reduce the size of scalar potential very significantly, and in some cases are too strong to break the no-scale structure completely. Finally, we also comment on the influence of imposing some of the solutions of Bianchi identities in studying moduli stabilization.

  3. Intelligence for embedded systems a methodological approach

    CERN Document Server

    Alippi, Cesare

    2014-01-01

    Addressing current issues of which any engineer or computer scientist should be aware, this monograph is a response to the need to adopt a new computational paradigm as the methodological basis for designing pervasive embedded systems with sensor capabilities. The requirements of this paradigm are to control complexity, to limit cost and energy consumption, and to provide adaptation and cognition abilities allowing the embedded system to interact proactively with the real world. The quest for such intelligence requires the formalization of a new generation of intelligent systems able to exploit advances in digital architectures and in sensing technologies. The book sheds light on the theory behind intelligence for embedded systems with specific focus on: ·        robustness (the robustness of a computational flow and its evaluation); ·        intelligence (how to mimic the adaptation and cognition abilities of the human brain), ·        the capacity to learn in non-stationary and evolv...

  4. Data Error Detection and Recovery in Embedded Systems: a Literature Review

    Directory of Open Access Journals (Sweden)

    Venu Babu Thati

    2017-06-01

    Full Text Available This paper presents a literature review on data flow error detection and recovery techniques in embedded systems. In recent years, embedded systems are being used more and more in an enormous number of applications from small mobile device to big medical devices. At the same time, it is becoming important for embedded developers to make embedded systems fault-tolerant. To make embedded systems fault-tolerant, error detection and recovery mechanisms are effective techniques to take into consideration. Fault tolerance can be achieved by using both hardware and software techniques. This literature review focuses on software-based techniques since hardware-based techniques need extra hardware and are an extra investment in cost per product. Whereas, software-based techniques needed no or limited hardware. A review on various existing data flow error detection and error recovery techniques is given along with their strengths and weaknesses. Such an information is useful to identify the better techniques among the others.

  5. A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis

    Science.gov (United States)

    2002-01-01

    itd.nrl.navy.mil Abstract. Steganography and steganalysis of digital images is a cat- and-mouse game. In recent work, Fridrich, Goljan and Du introduced a method...proposed embedding method. 1 Introduction Steganography and steganalysis of digital images is a cat-and-mouse game. Ever since Kurak and McHugh’s seminal...paper on LSB embeddings in images [10], various researchers have published work on either increasing the payload, im- proving the resistance to

  6. Research on application of VME based embedded linux

    International Nuclear Information System (INIS)

    Ji Xiaolu; Ye Mei; Zhu Kejun; Li Xiaonan; Wang Yifang

    2010-01-01

    It describes the feasibility and realization of using embedded Linux in DAQ readout system of high energy physics experiment. The first part, the hardware and software framework is introduced. And then emphasis is placed on the key technologies during the system realization. The development is based on the VME bus and vme u niverse driver. Finally, the test result is presented: the readout system can work well in Embedded Linux OS. (authors)

  7. Intrinsic Embedded Sensors for Polymeric Mechatronics: Flexure and Force Sensing

    Directory of Open Access Journals (Sweden)

    Leif P. Jentoft

    2014-02-01

    Full Text Available While polymeric fabrication processes, including recent advances in additive manufacturing, have revolutionized manufacturing, little work has been done on effective sensing elements compatible with and embedded within polymeric structures. In this paper, we describe the development and evaluation of two important sensing modalities for embedding in polymeric mechatronic and robotic mechanisms: multi-axis flexure joint angle sensing utilizing IR phototransistors, and a small (12 mm, three-axis force sensing via embedded silicon strain gages with similar performance characteristics as an equally sized metal element based sensor.

  8. The Modified Embedded Atom Method

    Energy Technology Data Exchange (ETDEWEB)

    Baskes, M.I.

    1994-08-01

    Recent modifications have been made to generalize the Embedded Atom Method (EAM) to describe bonding in diverse materials. By including angular dependence of the electron density in an empirical way, the Modified Embedded Atom Method (MEAM) has been able to reproduce the basic energetic and structural properties of 45 elements. This method is ideal for examining interfacial behavior of dissimilar materials. This paper explains in detail the derivation of the method, shows how parameters of MEAM are determined directly from experiment or first principles calculations, and examine the quality of the reproduction of the database. Materials with fcc, bcc, hcp, and diamond cubic crystal structure are discussed. A few simple examples of the application of the MEAM to surfaces and interfaces are presented. Calculations of pullout of a SiC fiber in a diamond matrix as a function of applied stress show nonuniform deformation of the fiber.

  9. Embedded system of image storage based on fiber channel

    Science.gov (United States)

    Chen, Xiaodong; Su, Wanxin; Xing, Zhongbao; Wang, Hualong

    2008-03-01

    In domains of aerospace, aviation, aiming, and optic measure etc., the embedded system of imaging, processing and recording is absolutely necessary, which has small volume, high processing speed and high resolution. But the embedded storage technology becomes system bottleneck because of developing slowly. It is used to use RAID to promote storage speed, but it is unsuitable for the embedded system because of its big volume. Fiber channel (FC) technology offers a new method to develop the high-speed, portable storage system. In order to make storage subsystem meet the needs of high storage rate, make use of powerful Virtex-4 FPGA and high speed fiber channel, advance a project of embedded system of digital image storage based on Xilinx Fiber Channel Arbitrated Loop LogiCORE. This project utilizes Virtex- 4 RocketIO MGT transceivers to transmit the data serially, and connects many Fiber Channel hard drivers by using of Arbitrated Loop optionally. It can achieve 400MBps storage rate, breaks through the bottleneck of PCI interface, and has excellences of high-speed, real-time, portable and massive capacity.

  10. ETHERNET BASED EMBEDDED SYSTEM FOR FEL DIAGNOSTICS AND CONTROLS

    International Nuclear Information System (INIS)

    Jianxun Yan; Daniel Sexton; Steven Moore; Albert Grippo; Kevin Jordan

    2006-01-01

    An Ethernet based embedded system has been developed to upgrade the Beam Viewer and Beam Position Monitor (BPM) systems within the free-electron laser (FEL) project at Jefferson Lab. The embedded microcontroller was mounted on the front-end I/O cards with software packages such as Experimental Physics and Industrial Control System (EPICS) and Real Time Executive for Multiprocessor System (RTEMS) running as an Input/Output Controller (IOC). By cross compiling with the EPICS, the RTEMS kernel, IOC device supports, and databases all of these can be downloaded into the microcontroller. The first version of the BPM electronics based on the embedded controller was built and is currently running in our FEL system. The new version of BPM that will use a Single Board IOC (SBIOC), which integrates with an Field Programming Gate Array (FPGA) and a ColdFire embedded microcontroller, is presently under development. The new system has the features of a low cost IOC, an open source real-time operating system, plug and play-like ease of installation and flexibility, and provides a much more localized solution

  11. Cepstral domain modification of audio signals for data embedding: preliminary results

    Science.gov (United States)

    Gopalan, Kaliappan

    2004-06-01

    A method of embedding data in an audio signal using cepstral domain modification is described. Based on successful embedding in the spectral points of perceptually masked regions in each frame of speech, first the technique was extended to embedding in the log spectral domain. This extension resulted at approximately 62 bits /s of embedding with less than 2 percent of bit error rate (BER) for a clean cover speech (from the TIMIT database), and about 2.5 percent for a noisy speech (from an air traffic controller database), when all frames - including silence and transition between voiced and unvoiced segments - were used. Bit error rate increased significantly when the log spectrum in the vicinity of a formant was modified. In the next procedure, embedding by altering the mean cepstral values of two ranges of indices was studied. Tests on both a noisy utterance and a clean utterance indicated barely noticeable perceptual change in speech quality when lower range of cepstral indices - corresponding to vocal tract region - was modified in accordance with data. With an embedding capacity of approximately 62 bits/s - using one bit per each frame regardless of frame energy or type of speech - initial results showed a BER of less than 1.5 percent for a payload capacity of 208 embedded bits using the clean cover speech. BER of less than 1.3 percent resulted for the noisy host with a capacity was 316 bits. When the cepstrum was modified in the region of excitation, BER increased to over 10 percent. With quantization causing no significant problem, the technique warrants further studies with different cepstral ranges and sizes. Pitch-synchronous cepstrum modification, for example, may be more robust to attacks. In addition, cepstrum modification in regions of speech that are perceptually masked - analogous to embedding in frequency masked regions - may yield imperceptible stego audio with low BER.

  12. Adaptive GDDA-BLAST: fast and efficient algorithm for protein sequence embedding.

    Directory of Open Access Journals (Sweden)

    Yoojin Hong

    2010-10-01

    Full Text Available A major computational challenge in the genomic era is annotating structure/function to the vast quantities of sequence information that is now available. This problem is illustrated by the fact that most proteins lack comprehensive annotations, even when experimental evidence exists. We previously theorized that embedded-alignment profiles (simply "alignment profiles" hereafter provide a quantitative method that is capable of relating the structural and functional properties of proteins, as well as their evolutionary relationships. A key feature of alignment profiles lies in the interoperability of data format (e.g., alignment information, physio-chemical information, genomic information, etc.. Indeed, we have demonstrated that the Position Specific Scoring Matrices (PSSMs are an informative M-dimension that is scored by quantitatively measuring the embedded or unmodified sequence alignments. Moreover, the information obtained from these alignments is informative, and remains so even in the "twilight zone" of sequence similarity (<25% identity. Although our previous embedding strategy was powerful, it suffered from contaminating alignments (embedded AND unmodified and high computational costs. Herein, we describe the logic and algorithmic process for a heuristic embedding strategy named "Adaptive GDDA-BLAST." Adaptive GDDA-BLAST is, on average, up to 19 times faster than, but has similar sensitivity to our previous method. Further, data are provided to demonstrate the benefits of embedded-alignment measurements in terms of detecting structural homology in highly divergent protein sequences and isolating secondary structural elements of transmembrane and ankyrin-repeat domains. Together, these advances allow further exploration of the embedded alignment data space within sufficiently large data sets to eventually induce relevant statistical inferences. We show that sequence embedding could serve as one of the vehicles for measurement of low

  13. Embedded Librarians: Just-in-Time or Just-in-Case? A Research Study

    Science.gov (United States)

    Heathcock, Kristin

    2015-01-01

    Embedded librarians in online courses provide a wealth of service and information to students. Though students indicate that these services are valuable, the librarians providing embedded services frequently note that these projects are very time consuming. This study examines the provision of a less time-intensive model of embedded librarianship…

  14. Modeling Electronic Circular Dichroism within the Polarizable Embedding Approach

    DEFF Research Database (Denmark)

    Nørby, Morten S; Olsen, Jógvan Magnus Haugaard; Steinmann, Casper

    2017-01-01

    We present a systematic investigation of the key components needed to model single chromophore electronic circular dichroism (ECD) within the polarizable embedding (PE) approach. By relying on accurate forms of the embedding potential, where especially the inclusion of local field effects...... are in focus, we show that qualitative agreement between rotatory strength parameters calculated by full quantum mechanical calculations and the more efficient embedding calculations can be obtained. An important aspect in the computation of reliable absorption parameters is the need for conformational...... sampling. We show that a significant number of snapshots are needed to avoid artifacts in the calculated electronic circular dichroism parameters due to insufficient configurational sampling, thus highlighting the efficiency of the PE model....

  15. Magnetic moments revisited

    International Nuclear Information System (INIS)

    Towner, I.S.; Khanna, F.C.

    1984-01-01

    Consideration of core polarization, isobar currents and meson-exchange processes gives a satisfactory understanding of the ground-state magnetic moments in closed-shell-plus (or minus)-one nuclei, A = 3, 15, 17, 39 and 41. Ever since the earliest days of the nuclear shell model the understanding of magnetic moments of nuclear states of supposedly simple configurations, such as doubly closed LS shells +-1 nucleon, has been a challenge for theorists. The experimental moments, which in most cases are known with extraordinary precision, show a small yet significant departure from the single-particle Schmidt values. The departure, however, is difficult to evaluate precisely since, as will be seen, it results from a sensitive cancellation between several competing corrections each of which can be as large as the observed discrepancy. This, then, is the continuing fascination of magnetic moments. In this contribution, we revisit the subjet principally to identify the role played by isobar currents, which are of much concern at this conference. But in so doing we warn quite strongly of the dangers of considering just isobar currents in isolation; equal consideration must be given to competing processes which in this context are the mundane nuclear structure effects, such as core polarization, and the more popular meson-exchange currents

  16. EFFECT OF EMBEDDING METHODS VERSUS FIXATIVE TYPE ON KARYOMETRIC MEASURES

    NARCIS (Netherlands)

    BOON, ME; VANDERPOEL, HG; TAN, CJA; KOK, LP

    The influence of fixation and embedding methods in seven urologic tumor samples was studied karyometrically for 12 preparatory techniques. Routine histologic formalin fixation was compared with Carbowax and Kryofix fixatives. Also, histologic material was studied embedded in paraffin and plastic

  17. Growth of the firm and foreign trade: Adrian Wood's theory revisited

    OpenAIRE

    Catermol, Fabrício

    2006-01-01

    This paper analyzes the growth of the firm by foreign trade. The theory of Adrian Wood is revisited for the analysis of growth and profit trade-off and improved to cope with growth by exports. The main outcome of this paper is that low domestic demand can be a very important factor to firm choices growth by foreign market. However, the growth of domestic demand does not necessarily reduce exports.

  18. Revisiting the description of Protein-Protein interfaces. Part II: Experimental study

    OpenAIRE

    Cazals , Frédéric; Proust , Flavien

    2006-01-01

    This paper provides a detailed experimental study of an interface model developed in the companion article F. Cazals and F. Proust, Revisiting the description of Protein-Protein interfaces. Part I: algorithms. Our experimental study is concerned with the usual database of protein-protein complexes, split into five families (Proteases, Immune system, Enzyme Complexes, Signal transduction, Misc.) Our findings, which bear some contradictions with usual statements are the following: (i)Connectivi...

  19. Small-angle scattering theory revisited: Photocurrent and spatial localization

    DEFF Research Database (Denmark)

    Basse, N.P.; Zoletnik, S.; Michelsen, Poul

    2005-01-01

    In this paper theory on collective scattering measurements of electron density fluctuations in fusion plasmas is revisited. We present the first full derivation of the expression for the photocurrent beginning at the basic scattering concepts. Thereafter we derive detailed expressions for the auto......- and crosspower spectra obtained from measurements. These are discussed and simple simulations made to elucidate the physical meaning of the findings. In this context, the known methods of obtaining spatial localization are discussed and appraised. Where actual numbers are applied, we utilize quantities from two...

  20. Article Review: Advanced Change Theory Revisited: An Article Critique

    Directory of Open Access Journals (Sweden)

    R. Scott Pochron

    2008-12-01

    Full Text Available The complexity of life in 21st century society requires new models for leadingand managing change. With that in mind, this paper revisits the model for AdvancedChange Theory (ACT as presented by Quinn, Spreitzer, and Brown in their article,“Changing Others Through Changing Ourselves: The Transformation of HumanSystems” (2000. The authors present ACT as a potential model for facilitating change incomplex organizations. This paper presents a critique of the article and summarizesopportunities for further exploring the model in the light of current trends indevelopmental and integral theory.

  1. Creative Experience and Revisit Intention of Handmade Oriental Parasol Umbrella in Kaohsiung

    OpenAIRE

    Yi-Ju Lee

    2015-01-01

    This study identified the hypothesised relationship between creative experience, and revisit intention of handmade oriental parasol umbrella in Kaohsiung, Taiwan. A face-to-face questionnaire survey was administered in Meinong town, Kaohsiung. The components of creative experience were found as "sense of achievement", "unique learning" and "interaction with instructors" in creative tourism. The result also revealed significant positive relationships between creative exper...

  2. Characteristics of revisits of children at risk for serious infections in pediatric emergency care

    NARCIS (Netherlands)

    E. De Vos-Kerkhof (Evelien); D.H.F. Geurts (Dorien); E.W. Steyerberg (Ewout); M. Lakhanpaul (Monica); H.A. Moll (Henriëtte); R. Oostenbrink (Rianne)

    2018-01-01

    textabstractIn this study, we aimed to identify characteristics of (unscheduled) revisits and its optimal time frame after Emergency Department (ED) discharge. Children with fever, dyspnea, or vomiting/diarrhea (1 month–16 years) who attended the ED of Erasmus MC-Sophia, Rotterdam (2010–2013), the

  3. Software for Embedded Control Systems

    NARCIS (Netherlands)

    Broenink, Johannes F.; Hilderink, G.H.; Jovanovic, D.S.

    2001-01-01

    The research of our team deals with the realization of control schemes on digital computers. As such the emphasis is on embedded control software implementation. Applications are in the field of mechatronic devices, using a mechatronic design approach (the integrated and optimal design of a

  4. Lossless Data Embedding—New Paradigm in Digital Watermarking

    Directory of Open Access Journals (Sweden)

    Jessica Fridrich

    2002-02-01

    Full Text Available One common drawback of virtually all current data embedding methods is the fact that the original image is inevitably distorted due to data embedding itself. This distortion typically cannot be removed completely due to quantization, bit-replacement, or truncation at the grayscales 0 and 255. Although the distortion is often quite small and perceptual models are used to minimize its visibility, the distortion may not be acceptable for medical imagery (for legal reasons or for military images inspected under nonstandard viewing conditions (after enhancement or extreme zoom. In this paper, we introduce a new paradigm for data embedding in images (lossless data embedding that has the property that the distortion due to embedding can be completely removed from the watermarked image after the embedded data has been extracted. We present lossless embedding methods for the uncompressed formats (BMP, TIFF and for the JPEG format. We also show how the concept of lossless data embedding can be used as a powerful tool to achieve a variety of nontrivial tasks, including lossless authentication using fragile watermarks, steganalysis of LSB embedding, and distortion-free robust watermarking.

  5. Hardware Synchronization for Embedded Multi-Core Processors

    DEFF Research Database (Denmark)

    Stoif, Christian; Schoeberl, Martin; Liccardi, Benito

    2011-01-01

    Multi-core processors are about to conquer embedded systems — it is not the question of whether they are coming but how the architectures of the microcontrollers should look with respect to the strict requirements in the field. We present the step from one to multiple cores in this paper, establi......Multi-core processors are about to conquer embedded systems — it is not the question of whether they are coming but how the architectures of the microcontrollers should look with respect to the strict requirements in the field. We present the step from one to multiple cores in this paper...

  6. Generalized and Resource-Efficient VNet Embeddings with Migrations

    OpenAIRE

    Schaffrath, Gregor; Schmid, Stefan; Feldmann, Anja

    2010-01-01

    This paper attends to the problem of embedding flexibly specified CloudNets, virtual networks connecting cloud resources (such as storage or computation). We attend to a scenario where customers can request CloudNets at short notice, and an infrastructure provider (or a potential itermediate broker or reseller) first embeds the CloudNet fast (e.g., using a simple heuristic). Later, however, long-lived CloudNets embeddings are optimized by migrating them to more suitable locations, whose preci...

  7. Orthodontic Elastic Embedded in Gingiva for 7 Years

    Directory of Open Access Journals (Sweden)

    Shruti Tandon

    2013-01-01

    Full Text Available Dental materials especially orthodontic elastics often get embedded in gingival tissues due to iatrogenic factors. If retained for a long time, inflammatory response starts as asymptomatic crestal bone loss and may progress to severe periodontal abscess. Unsupported orthodontic elastics used for diastema closure may result in exfoliation of teeth, while elastic separators may get embedded in interdental gingiva if banding is performed without removing it. These cases of negligence are detrimental for survival of affected teeth. This paper highlights a case of orthodontic elastic embedded in interproximal gingiva of a 23-year-old healthy female for 7 years after completion of fixed orthodontic treatment. Surprisingly, there was no clinical sign of inflammation around elastic band and it was removed easily without any local anaesthesia. However, mild crestal bone loss was observed on periapical radiograph. The gingiva healed completely after sub gingival debridement.

  8. The passive optical properties of a silicon nanoparticle-embedded benzocyclobutene polymer waveguide

    International Nuclear Information System (INIS)

    Chiu, J.-J.; Perng, Tsong P

    2008-01-01

    The passive optical properties of a silicon nanoparticle-embedded benzocyclobutene (BCB) waveguide were investigated. The silicon nanoparticles, of a size varying from 6 to 25 nm, were prepared by vapor condensation. The transmission modes and losses were examined by the prism coupler and cut-back methods. A He-Ne laser beam with a wavelength of 6328 A was used to measure the effective index and thickness of the waveguide. Laser light could be efficiently coupled into the BCB waveguide when the embedded Si nanoparticles were smaller than 6 nm. The film thickness and effective index of the Si-embedded BCB waveguide were measured to be 1.825 μm and 1.565, respectively. The optical transmission losses of the pure BCB and Si-embedded ridge waveguides measured by the cut-back method were 0.85 and 1.63 dB cm -1 , respectively. Although the optical loss was increased by the embedded Si, the disturbance of the output contour was quite small. This result demonstrates that the nanoparticle-embedded polymer waveguide may be used for optoelectronic integrated circuits

  9. Embedded High Performance Scalable Computing Systems

    National Research Council Canada - National Science Library

    Ngo, David

    2003-01-01

    The Embedded High Performance Scalable Computing Systems (EHPSCS) program is a cooperative agreement between Sanders, A Lockheed Martin Company and DARPA that ran for three years, from Apr 1995 - Apr 1998...

  10. Post-Inflationary Gravitino Production Revisited

    CERN Document Server

    Ellis, John; Nanopoulos, Dimitri V.; Olive, Keith A.; Peloso, Marco

    2016-01-01

    We revisit gravitino production following inflation. As a first step, we review the standard calculation of gravitino production in the thermal plasma formed at the end of post-inflationary reheating when the inflaton has completely decayed. Next we consider gravitino production prior to the completion of reheating, assuming that the inflaton decay products thermalize instantaneously while they are still dilute. We then argue that instantaneous thermalization is in general a good approximation, and also show that the contribution of non-thermal gravitino production via the collisions of inflaton decay products prior to thermalization is relatively small. Our final estimate of the gravitino-to-entropy ratio is approximated well by a standard calculation of gravitino production in the post-inflationary thermal plasma assuming total instantaneous decay and thermalization at a time $t \\simeq 1.2/\\Gamma_\\phi$. Finally, in light of our calculations, we consider potential implications of upper limits on the gravitin...

  11. Research on applications of ARM-LINUX embedded systems in manufacturing the nuclear equipment

    International Nuclear Information System (INIS)

    Nguyen Van Sy; Phan Luong Tuan; Nguyen Xuan Vinh; Dang Quang Bao

    2016-01-01

    A new microprocessor system that is ARM processor with open source Linux operating system is studied with the objective to apply ARM-Linux embedded systems in manufacturing the nuclear equipment. We use the development board of the company to learn and to build the workflow for an embedded system, then basing on the knowledge we design a motherboard embedded systems interface with the peripherals is buttons, LEDs through GPIO interface and connected with GM counting system via RS232 interface. The results of this study are: i) The procedures for working with embedded systems: process customization, installation embedded operating system and installation process, configure the development tools on the host computer; ii) ARM-Linux motherboard embedded systems interface with the peripherals and GM counting system, indicating the counts from GM counting system on the touch screen. (author)

  12. Stability analysis of embedded solitons in the generalized third-order nonlinear Schroedinger equation

    International Nuclear Information System (INIS)

    Pelinovsky, Dmitry E.; Yang Jianke

    2005-01-01

    We study the generalized third-order nonlinear Schroedinger (NLS) equation which admits a one-parameter family of single-hump embedded solitons. Analyzing the spectrum of the linearization operator near the embedded soliton, we show that there exists a resonance pole in the left half-plane of the spectral parameter, which explains linear stability, rather than nonlinear semistability, of embedded solitons. Using exponentially weighted spaces, we approximate the resonance pole both analytically and numerically. We confirm in a near-integrable asymptotic limit that the resonance pole gives precisely the linear decay rate of parameters of the embedded soliton. Using conserved quantities, we qualitatively characterize the stable dynamics of embedded solitons

  13. Use of Student Experiments for Teaching Embedded Software Development Including HW/SW Co-Design

    Science.gov (United States)

    Mitsui, H.; Kambe, H.; Koizumi, H.

    2009-01-01

    Embedded systems have been applied widely, not only to consumer products and industrial machines, but also to new applications such as ubiquitous or sensor networking. The increasing role of software (SW) in embedded system development has caused a great demand for embedded SW engineers, and university education for embedded SW engineering has…

  14. Embedded microcontroller interfacing

    CERN Document Server

    Gupta, Gourab Sen

    2010-01-01

    Mixed-Signal Embedded Microcontrollers are commonly used in integrating analog components needed to control non-digital electronic systems. They are used in automatically controlled devices and products, such as automobile engine control systems, wireless remote controllers, office machines, home appliances, power tools, and toys. Microcontrollers make it economical to digitally control even more devices and processes by reducing the size and cost, compared to a design that uses a separate microprocessor, memory, and input/output devices. In many undergraduate and post-graduate courses, teachi

  15. A Variable Thermal Conductivity Flow of A Micropolar Fluid Over A ...

    African Journals Online (AJOL)

    We revisited the paper of Mahmoud et al, on the hydromagnetic boundary layer micropolar fluid flow over a stretching surface embedded in a non-Darcian porous medium with radiation.We show that even when the thermal conductivity depends linearly or quadratically on temperature the problem still has a unique solution.

  16. Surface modes of two spheres embedded into a third medium

    International Nuclear Information System (INIS)

    Nkoma, J.S.

    1990-07-01

    Surface modes of two spheres embedded into a third medium are studied. We obtain a result which relates the dependence of frequency on the distance between the two spheres. The derived expression reproduces previous results in the limit where the separation between the spheres is very large. Two surface mode branches are shown to exist for each order n. We apply the theory to three cases of practical interest: first, two similar metallic spheres in vacuum; secondly, two similar metallic spheres embedded into a different metal; thirdly, two spherical voids embedded into a metal. (author). 19 refs, 6 figs

  17. Drilling azimuth gamma embedded design

    Directory of Open Access Journals (Sweden)

    Zhou Yi Ren

    2016-01-01

    Full Text Available Embedded drilling azimuth gamma design, the use of radioactive measuring principle embedded gamma measurement while drilling a short section analysis. Monte Carlo method, in response to the density of horizontal well logging numerical simulation of 16 orientation, the orientation of horizontal well analysed, calliper, bed boundary location, space, different formation density, formation thickness, and other factors inclined strata dip the impact by simulating 137Cs sources under different formation conditions of the gamma distribution, to determine the orientation of drilling density tool can detect window size and space, draw depth of the logging methods. The data 360° azimuth imaging, image processing method to obtain graph, display density of the formation, dip and strata thickness and other parameters, the logging methods obtain real-time geo-steering. To establish a theoretical basis for the orientation density logging while drilling method implementation and application of numerical simulation in-depth study of the MWD azimuth and density log response factors of horizontal wells.

  18. An Embedded Reconfigurable Logic Module

    Science.gov (United States)

    Tucker, Jerry H.; Klenke, Robert H.; Shams, Qamar A. (Technical Monitor)

    2002-01-01

    A Miniature Embedded Reconfigurable Computer and Logic (MERCAL) module has been developed and verified. MERCAL was designed to be a general-purpose, universal module that that can provide significant hardware and software resources to meet the requirements of many of today's complex embedded applications. This is accomplished in the MERCAL module by combining a sub credit card size PC in a DIMM form factor with a XILINX Spartan I1 FPGA. The PC has the ability to download program files to the FPGA to configure it for different hardware functions and to transfer data to and from the FPGA via the PC's ISA bus during run time. The MERCAL module combines, in a compact package, the computational power of a 133 MHz PC with up to 150,000 gate equivalents of digital logic that can be reconfigured by software. The general architecture and functionality of the MERCAL hardware and system software are described.

  19. TaPT: Temperature-Aware Dynamic Cache Optimization for Embedded Systems

    Directory of Open Access Journals (Sweden)

    Tosiron Adegbija

    2017-12-01

    Full Text Available Embedded systems have stringent design constraints, which has necessitated much prior research focus on optimizing energy consumption and/or performance. Since embedded systems typically have fewer cooling options, rising temperature, and thus temperature optimization, is an emergent concern. Most embedded systems only dissipate heat by passive convection, due to the absence of dedicated thermal management hardware mechanisms. The embedded system’s temperature not only affects the system’s reliability, but can also affect the performance, power, and cost. Thus, embedded systems require efficient thermal management techniques. However, thermal management can conflict with other optimization objectives, such as execution time and energy consumption. In this paper, we focus on managing the temperature using a synergy of cache optimization and dynamic frequency scaling, while also optimizing the execution time and energy consumption. This paper provides new insights on the impact of cache parameters on efficient temperature-aware cache tuning heuristics. In addition, we present temperature-aware phase-based tuning, TaPT, which determines Pareto optimal clock frequency and cache configurations for fine-grained execution time, energy, and temperature tradeoffs. TaPT enables autonomous system optimization and also allows designers to specify temperature constraints and optimization priorities. Experiments show that TaPT can effectively reduce execution time, energy, and temperature, while imposing minimal hardware overhead.

  20. Revisiting the Gun Ownership and Violence Link; a multi- level analysis of victimisation survey data.

    NARCIS (Netherlands)

    van Kesteren, J.N.

    2014-01-01

    The link between gun ownership victimisation by violent crime remains one of the most contested issues in criminology. Some authors claim that high gun availability facilitates serious violence. Others claim that gun ownership prevents crime. This article revisits these issues using individual and

  1. Graph embedding with rich information through heterogeneous graph

    KAUST Repository

    Sun, Guolei

    2017-11-12

    Graph embedding, aiming to learn low-dimensional representations for nodes in graphs, has attracted increasing attention due to its critical application including node classification, link prediction and clustering in social network analysis. Most existing algorithms for graph embedding only rely on the topology information and fail to use the copious information in nodes as well as edges. As a result, their performance for many tasks may not be satisfactory. In this thesis, we proposed a novel and general framework for graph embedding with rich text information (GERI) through constructing a heterogeneous network, in which we integrate node and edge content information with graph topology. Specially, we designed a novel biased random walk to explore the constructed heterogeneous network with the notion of flexible neighborhood. Our sampling strategy can compromise between BFS and DFS local search on heterogeneous graph. To further improve our algorithm, we proposed semi-supervised GERI (SGERI), which learns graph embedding in an discriminative manner through heterogeneous network with label information. The efficacy of our method is demonstrated by extensive comparison experiments with 9 baselines over multi-label and multi-class classification on various datasets including Citeseer, Cora, DBLP and Wiki. It shows that GERI improves the Micro-F1 and Macro-F1 of node classification up to 10%, and SGERI improves GERI by 5% in Wiki.

  2. Applying formal method to design of nuclear power plant embedded protection system

    International Nuclear Information System (INIS)

    Kim, Jin Hyun; Kim, Il Gon; Sung, Chang Hoon; Choi, Jin Young; Lee, Na Young

    2001-01-01

    Nuclear power embedded protection systems is a typical safety-critical system, which detects its failure and shutdowns its operation of nuclear reactor. These systems are very dangerous so that it absolutely requires safety and reliability. Therefore nuclear power embedded protection system should fulfill verification and validation completely from the design stage. To develop embedded system, various V and V method have been provided and especially its design using Formal Method is studied in other advanced country. In this paper, we introduce design method of nuclear power embedded protection systems using various Formal-Method in various respect following nuclear power plant software development guideline

  3. Societal embedding of climate-friendly innovations

    International Nuclear Information System (INIS)

    Vaeyrynen, E.; Kivisaari, Sirkku; Lovio, R.

    2002-01-01

    This project assesses the possibilities of constructing a market for climate-friendly energy technologies by applying the process of 'societal embedding of innovations'. The term refers to an interactive learning process amongst three groups of key actors: producers, users and societal actors. Their co-operation shapes the innovation to fit the needs of the market and contributes to creation of conditions in which the innovation can be adopted. The project consists of two case studies: (1) Shaping of the ESCO energy service concept in Finnish municipalities and (2) Increasing the use of wood pellets in single-family houses. The case studies have illustrated the possibilities and limitations concerning the application of societal embedding in the energy sector. The project indicates that societal embedding may promote the implementation of climate-friendly energy technologies in at least three ways. Firstly, the process mobilises key actors to cooperation. This generates interactive learning on the problem and its solving. Market construction is forged ahead by mutual adaptation of the innovation and its environment. Secondly, this approach offers a tool to examine the societal quality of the innovation, a question related vitally to climate change. Thirdly, by producing new knowledge of the needs on the market this approach supports the societal actors in choosing different instruments to induce the intended transition to sustainability. (orig.)

  4. NP-hardness of the cluster minimization problem revisited

    Science.gov (United States)

    Adib, Artur B.

    2005-10-01

    The computational complexity of the 'cluster minimization problem' is revisited (Wille and Vennik 1985 J. Phys. A: Math. Gen. 18 L419). It is argued that the original NP-hardness proof does not apply to pairwise potentials of physical interest, such as those that depend on the geometric distance between the particles. A geometric analogue of the original problem is formulated, and a new proof for such potentials is provided by polynomial time transformation from the independent set problem for unit disk graphs. Limitations of this formulation are pointed out, and new subproblems that bear more direct consequences to the numerical study of clusters are suggested.

  5. NP-hardness of the cluster minimization problem revisited

    International Nuclear Information System (INIS)

    Adib, Artur B

    2005-01-01

    The computational complexity of the 'cluster minimization problem' is revisited (Wille and Vennik 1985 J. Phys. A: Math. Gen. 18 L419). It is argued that the original NP-hardness proof does not apply to pairwise potentials of physical interest, such as those that depend on the geometric distance between the particles. A geometric analogue of the original problem is formulated, and a new proof for such potentials is provided by polynomial time transformation from the independent set problem for unit disk graphs. Limitations of this formulation are pointed out, and new subproblems that bear more direct consequences to the numerical study of clusters are suggested

  6. NP-hardness of the cluster minimization problem revisited

    Energy Technology Data Exchange (ETDEWEB)

    Adib, Artur B [Physics Department, Brown University, Providence, RI 02912 (United States)

    2005-10-07

    The computational complexity of the 'cluster minimization problem' is revisited (Wille and Vennik 1985 J. Phys. A: Math. Gen. 18 L419). It is argued that the original NP-hardness proof does not apply to pairwise potentials of physical interest, such as those that depend on the geometric distance between the particles. A geometric analogue of the original problem is formulated, and a new proof for such potentials is provided by polynomial time transformation from the independent set problem for unit disk graphs. Limitations of this formulation are pointed out, and new subproblems that bear more direct consequences to the numerical study of clusters are suggested.

  7. Rural-Nonrural Disparities in Postsecondary Educational Attainment Revisited

    Science.gov (United States)

    Byun, Soo-yong; Meece, Judith L.; Irvin, Matthew J.

    2013-01-01

    Using data from the National Educational Longitudinal Study, this study revisited rural-nonrural disparities in educational attainment by considering a comprehensive set of factors that constrain and support youth's college enrollment and degree completion. Results showed that rural students were more advantaged in community social resources compared to nonrural students, and these resources were associated with a significant increase in the likelihood of bachelor's degree attainment. Yet results confirmed that rural students lagged behind nonrural students in attaining a bachelor's degree largely due to their lower socioeconomic background. The findings present a more comprehensive picture of the complexity of geographic residence in shaping college enrollment and degree attainment. PMID:24285873

  8. Perbandingan Kemampuan Embedded Computer dengan General Purpose Computer untuk Pengolahan Citra

    Directory of Open Access Journals (Sweden)

    Herryawan Pujiharsono

    2017-08-01

    Full Text Available Perkembangan teknologi komputer membuat pengolahan citra saat ini banyak dikembangkan untuk dapat membantu manusia di berbagai bidang pekerjaan. Namun, tidak semua bidang pekerjaan dapat dikembangkan dengan pengolahan citra karena tidak mendukung penggunaan komputer sehingga mendorong pengembangan pengolahan citra dengan mikrokontroler atau mikroprosesor khusus. Perkembangan mikrokontroler dan mikroprosesor memungkinkan pengolahan citra saat ini dapat dikembangkan dengan embedded computer atau single board computer (SBC. Penelitian ini bertujuan untuk menguji kemampuan embedded computer dalam mengolah citra dan membandingkan hasilnya dengan komputer pada umumnya (general purpose computer. Pengujian dilakukan dengan mengukur waktu eksekusi dari empat operasi pengolahan citra yang diberikan pada sepuluh ukuran citra. Hasil yang diperoleh pada penelitian ini menunjukkan bahwa optimasi waktu eksekusi embedded computer lebih baik jika dibandingkan dengan general purpose computer dengan waktu eksekusi rata-rata embedded computer adalah 4-5 kali waktu eksekusi general purpose computer dan ukuran citra maksimal yang tidak membebani CPU terlalu besar untuk embedded computer adalah 256x256 piksel dan untuk general purpose computer adalah 400x300 piksel.

  9. Consensus embedding: theory, algorithms and application to segmentation and classification of biomedical data

    Directory of Open Access Journals (Sweden)

    Viswanath Satish

    2012-02-01

    Full Text Available Abstract Background Dimensionality reduction (DR enables the construction of a lower dimensional space (embedding from a higher dimensional feature space while preserving object-class discriminability. However several popular DR approaches suffer from sensitivity to choice of parameters and/or presence of noise in the data. In this paper, we present a novel DR technique known as consensus embedding that aims to overcome these problems by generating and combining multiple low-dimensional embeddings, hence exploiting the variance among them in a manner similar to ensemble classifier schemes such as Bagging. We demonstrate theoretical properties of consensus embedding which show that it will result in a single stable embedding solution that preserves information more accurately as compared to any individual embedding (generated via DR schemes such as Principal Component Analysis, Graph Embedding, or Locally Linear Embedding. Intelligent sub-sampling (via mean-shift and code parallelization are utilized to provide for an efficient implementation of the scheme. Results Applications of consensus embedding are shown in the context of classification and clustering as applied to: (1 image partitioning of white matter and gray matter on 10 different synthetic brain MRI images corrupted with 18 different combinations of noise and bias field inhomogeneity, (2 classification of 4 high-dimensional gene-expression datasets, (3 cancer detection (at a pixel-level on 16 image slices obtained from 2 different high-resolution prostate MRI datasets. In over 200 different experiments concerning classification and segmentation of biomedical data, consensus embedding was found to consistently outperform both linear and non-linear DR methods within all applications considered. Conclusions We have presented a novel framework termed consensus embedding which leverages ensemble classification theory within dimensionality reduction, allowing for application to a wide range

  10. SPECT detector system design based on embedded system

    International Nuclear Information System (INIS)

    Zhang Weizheng; Zhao Shujun; Zhang Lei; Sun Yuanling

    2007-01-01

    A single-photon emission computed tomography detector system based on embedded Linux designed. This system is composed of detector module, data acquisition module, ARM MPU module, network interface communication module and human machine interface module. Its software uses multithreading technology based on embedded Linux. It can achieve high speed data acquisition, real-time data correction and network data communication. It can accelerate the data acquisition and decrease the dead time. The accuracy and the stability of the system can be improved. (authors)

  11. Comparison of Pilot Symbol Embedded Channel Estimation Algorithms

    Directory of Open Access Journals (Sweden)

    P. Kadlec

    2009-12-01

    Full Text Available In the paper, algorithms of the pilot symbol embedded channel estimation are compared. Attention is turned to the Least Square (LS channel estimation and the Sliding Correlator (SC algorithm. Both algorithms are implemented in Matlab to estimate the Channel Impulse Response (CIR of a channel exhibiting multi-path propagation. Algorithms are compared from the viewpoint of computational demands, influence of the Additive White Gaussian Noise (AWGN, an embedded pilot symbol and a computed CIR over the estimation error.

  12. An Improvement on LSB Matching and LSB Matching Revisited Steganography Methods

    OpenAIRE

    Qazanfari, Kazem; Safabakhsh, Reza

    2017-01-01

    The aim of the steganography methods is to communicate securely in a completely undetectable manner. LSB Matching and LSB Matching Revisited steganography methods are two general and esiest methods to achieve this aim. Being secured against first order steganalysis methods is the most important feature of these methods. On the other hand, these methods don't consider inter pixel dependency. Therefore, recently, several steganalysis methods are proposed that by using co-occurrence matrix detec...

  13. Embedded systems design for high-speed data acquisition and control

    CERN Document Server

    Di Paolo Emilio, Maurizio

    2015-01-01

    This book serves as a practical guide for practicing engineers who need to design embedded systems for high-speed data acquisition and control systems. A minimum amount of theory is presented, along with a review of analog and digital electronics, followed by detailed explanations of essential topics in hardware design and software development. The discussion of hardware focuses on microcontroller design (ARM microcontrollers and FPGAs), techniques of embedded design, high speed data acquisition (DAQ) and control systems. Coverage of software development includes main programming techniques, culminating in the study of real-time operating systems. All concepts are introduced in a manner to be highly-accessible to practicing engineers and lead to the practical implementation of an embedded board that can be used in various industrial fields as a control system and high speed data acquisition system.   • Describes fundamentals of embedded systems design in an accessible manner; • Takes a problem-solving ...

  14. Topological Embedding Feature Based Resource Allocation in Network Virtualization

    Directory of Open Access Journals (Sweden)

    Hongyan Cui

    2014-01-01

    Full Text Available Virtualization provides a powerful way to run multiple virtual networks on a shared substrate network, which needs accurate and efficient mathematical models. Virtual network embedding is a challenge in network virtualization. In this paper, considering the degree of convergence when mapping a virtual network onto substrate network, we propose a new embedding algorithm based on topology mapping convergence-degree. Convergence-degree means the adjacent degree of virtual network’s nodes when they are mapped onto a substrate network. The contributions of our method are as below. Firstly, we map virtual nodes onto the substrate nodes with the maximum convergence-degree. The simulation results show that our proposed algorithm largely enhances the network utilization efficiency and decreases the complexity of the embedding problem. Secondly, we define the load balance rate to reflect the load balance of substrate links. The simulation results show our proposed algorithm achieves better load balance. Finally, based on the feature of star topology, we further improve our embedding algorithm and make it suitable for application in the star topology. The test result shows it gets better performance than previous works.

  15. Embedding Sensors During Additive Manufacturing

    Energy Technology Data Exchange (ETDEWEB)

    Sbriglia, Lexey Raylene [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-08-10

    This PowerPoint presentation had the following headings: Fused deposition modeling (FDM); Open source 3D printing; Objectives; Vibration analysis; Equipment; Design; Material choices; Failure causes, such as tension, bubbling; Potential solutions; Simulations; Embedding the sensors; LabView programming; Alternate data acquisition; Problem and proposed solution; and, Conclusions

  16. Embedded and real time system development a software engineering perspective concepts, methods and principles

    CERN Document Server

    Saeed, Saqib; Darwish, Ashraf; Abraham, Ajith

    2014-01-01

    Nowadays embedded and real-time systems contain complex software. The complexity of embedded systems is increasing, and the amount and variety of software in the embedded products are growing. This creates a big challenge for embedded and real-time software development processes and there is a need to develop separate metrics and benchmarks. “Embedded and Real Time System Development: A Software Engineering Perspective: Concepts, Methods and Principles” presents practical as well as conceptual knowledge of the latest tools, techniques and methodologies of embedded software engineering and real-time systems. Each chapter includes an in-depth investigation regarding the actual or potential role of software engineering tools in the context of the embedded system and real-time system. The book presents state-of-the art and future perspectives with industry experts, researchers, and academicians sharing ideas and experiences including surrounding frontier technologies, breakthroughs, innovative solutions and...

  17. Abareshi Maryam Non-isothermal crystallization kinetics of ...

    Indian Academy of Sciences (India)

    Administrator

    A new sonochemical method for preparation of different morphologies of CuInS2 .... aluminium- and gallium- doped zinc oxide transparent conducting sol–gel thin films ... heterojunction for optoresponse applications. 1509. Dalagan Juliet Q.

  18. Forecasting of Satisfaction and Revisit Intention of Indonesia Shoppers in Shopping Malls

    OpenAIRE

    Ayuni, Risca Fitri

    2017-01-01

    . Due to tight competition, changing value proposition of customer and shiftingof mall functions become center for leisure purposes, shopping mall developer mustfocus on create shopper satisfaction to influence their post-transaction behaviors. Thisstudy investigates the relationship between mall personality, self-congruity, perceivedquality, shopping value, shopper satisfaction and revisit intention. Two hundredrespondents participated in this study. In order to achieve the aim of this study...

  19. The extreme vulnerability of interdependent spatially embedded networks

    Science.gov (United States)

    Bashan, Amir; Berezin, Yehiel; Buldyrev, Sergey V.; Havlin, Shlomo

    2013-10-01

    Recent studies show that in interdependent networks a very small failure in one network may lead to catastrophic consequences. Above a critical fraction of interdependent nodes, even a single node failure can invoke cascading failures that may abruptly fragment the system, whereas below this critical dependency a failure of a few nodes leads only to a small amount of damage to the system. So far, research has focused on interdependent random networks without space limitations. However, many real systems, such as power grids and the Internet, are not random but are spatially embedded. Here we analytically and numerically study the stability of interdependent spatially embedded networks modelled as lattice networks. Surprisingly, we find that in lattice systems, in contrast to non-embedded systems, there is no critical dependency and any small fraction of interdependent nodes leads to an abrupt collapse. We show that this extreme vulnerability of very weakly coupled lattices is a consequence of the critical exponent describing the percolation transition of a single lattice.

  20. Java Dust: How Small Can Embedded Java Be?

    DEFF Research Database (Denmark)

    Caska, James; Schoeberl, Martin

    2011-01-01

    Java is slowly being accepted as a language and platform for embedded devices. However, the memory requirements of the Java library and runtime are still troublesome. A Java system is considered small when it requires less than 1 MB, and within the embedded domain small microcontollers with a few...... KB on-chip Flash memory and even less on-chip RAM are very common. For such small devices Java is a clearly challenging. In this paper we present the combination of the Java compiler Muvium for microcontrollers with the tiny soft-core Leros for an FPGA. To the best of our knowledge, the presented...... embedded Java system is the smallest Java system available. The Leros processor consumes less than 5% of the logic cells of the smallest FPGA from Altera and the Muvium compiler produces a JVM, including the Java application, that can execute in a few KB ROM and less than 1 KB RAM. The Leros processor...