WorldWideScience

Sample records for mac desktop detailed

  1. Macs For Dummies, Pocket Edition

    CERN Document Server

    Baig, Edward C

    2011-01-01

    The fun and easy way to make the most of your wonderful Mac. Simply Mac-nificent — all the cool things your Mac can do! This handy guide helps you figure out the nuts and bolts of your Mac. Navigate the Mac desktop, use the Safari Web browser to surf the Internet, e-mail photos to friends and family, create and print documents, rip audio CDs, and more. The fun begins right here!. Open the book and find: How to set up and configure your Mac; Tips for getting around on the Mac desktop; Steps for setting up an e-mail account and browsing the Internet; Details about the free programs that come wit

  2. Windows for Intel Macs

    CERN Document Server

    Ogasawara, Todd

    2008-01-01

    Even the most devoted Mac OS X user may need to use Windows XP, or may just be curious about XP and its applications. This Short Cut is a concise guide for OS X users who need to quickly get comfortable and become productive with Windows XP basics on their Macs. It covers: Security Networking ApplicationsMac users can easily install and use Windows thanks to Boot Camp and Parallels Desktop for Mac. Boot Camp lets an Intel-based Mac install and boot Windows XP on its own hard drive partition. Parallels Desktop for Mac uses virtualization technology to run Windows XP (or other operating systems

  3. Linux Desktop Pocket Guide

    CERN Document Server

    Brickner, David

    2005-01-01

    While Mac OS X garners all the praise from pundits, and Windows XP attracts all the viruses, Linux is quietly being installed on millions of desktops every year. For programmers and system administrators, business users, and educators, desktop Linux is a breath of fresh air and a needed alternative to other operating systems. The Linux Desktop Pocket Guide is your introduction to using Linux on five of the most popular distributions: Fedora, Gentoo, Mandriva, SUSE, and Ubuntu. Despite what you may have heard, using Linux is not all that hard. Firefox and Konqueror can handle all your web bro

  4. Semantic Desktop

    Science.gov (United States)

    Sauermann, Leo; Kiesel, Malte; Schumacher, Kinga; Bernardi, Ansgar

    In diesem Beitrag wird gezeigt, wie der Arbeitsplatz der Zukunft aussehen könnte und wo das Semantic Web neue Möglichkeiten eröffnet. Dazu werden Ansätze aus dem Bereich Semantic Web, Knowledge Representation, Desktop-Anwendungen und Visualisierung vorgestellt, die es uns ermöglichen, die bestehenden Daten eines Benutzers neu zu interpretieren und zu verwenden. Dabei bringt die Kombination von Semantic Web und Desktop Computern besondere Vorteile - ein Paradigma, das unter dem Titel Semantic Desktop bekannt ist. Die beschriebenen Möglichkeiten der Applikationsintegration sind aber nicht auf den Desktop beschränkt, sondern können genauso in Web-Anwendungen Verwendung finden.

  5. Detailed and Highly Accurate 3d Models of High Mountain Areas by the Macs-Himalaya Aerial Camera Platform

    Science.gov (United States)

    Brauchle, J.; Hein, D.; Berger, R.

    2015-04-01

    Remote sensing in areas with extreme altitude differences is particularly challenging. In high mountain areas specifically, steep slopes result in reduced ground pixel resolution and degraded quality in the DEM. Exceptionally high brightness differences can in part no longer be imaged by the sensors. Nevertheless, detailed information about mountainous regions is highly relevant: time and again glacier lake outburst floods (GLOFs) and debris avalanches claim dozens of victims. Glaciers are sensitive to climate change and must be carefully monitored. Very detailed and accurate 3D maps provide a basic tool for the analysis of natural hazards and the monitoring of glacier surfaces in high mountain areas. There is a gap here, because the desired accuracies are often not achieved. It is for this reason that the DLR Institute of Optical Sensor Systems has developed a new aerial camera, the MACS-Himalaya. The measuring unit comprises four camera modules with an overall aperture angle of 116° perpendicular to the direction of flight. A High Dynamic Range (HDR) mode was introduced so that within a scene, bright areas such as sun-flooded snow and dark areas such as shaded stone can be imaged. In 2014, a measuring survey was performed on the Nepalese side of the Himalayas. The remote sensing system was carried by a Stemme S10 motor glider. Amongst other targets, the Seti Valley, Kali-Gandaki Valley and the Mt. Everest/Khumbu Region were imaged at heights up to 9,200 m. Products such as dense point clouds, DSMs and true orthomosaics with a ground pixel resolution of up to 15 cm were produced. Special challenges and gaps in the investigation of high mountain areas, approaches for resolution of these problems, the camera system and the state of evaluation are presented with examples.

  6. Macs For Seniors For Dummies

    CERN Document Server

    Chambers, Mark L

    2012-01-01

    You're never too old to fall in love—with your Mac! You took a while, but you are now the proud owner of your first Mac computer. Macs For Seniors For Dummies is just for you. This friendly, accessible guide walks you through choosing a Mac and learning how to use it. You'll find yourself falling head over heels for your Mac in no time. Macs For Seniors For Dummies introduces you to all the basics that you need to know: turning the Mac on and getting connected; using the keyboard and mouse; working with files and folders; navigate around the Mac desktop and OS X Lion; setting up an Inter

  7. MacBook Teach Yourself VISUALLY

    CERN Document Server

    Miser, Brad

    2010-01-01

    Like the MacBook itself, Teach Yourself VISUALLY MacBook, Second Edition is designed to be visually appealing, while providing excellent functionality at the same time. By using this book, MacBook users will be empowered to do everyday tasks quickly and easily. From such basic steps as powering on or shutting down the MacBook, working on the Mac desktop with the Dashboard and its widgets to running Windows applications, Teach Yourself VISUALLY MacBook, Second Edition covers all the vital information and provides the help and support a reader needs—in many ways it's like having a Mac Genius at

  8. MacBook for dummies

    CERN Document Server

    Chambers , Mark L

    2014-01-01

    Make friends with your MacBook the fun and easy way! Ultra-light, ultra-fast, and ultra-powerful, the MacBook is the coolest laptop in town, and longtime Mac guru Mark L. Chambers is just the guy to help you get to know your MacBook in no time. Take a closer look at the latest features, get the lowdown on OS X, unleash your creative forces with iLife, take care of business with the iWork applications, and sync it all with iCloud with the expert advice in this bestselling MacBook guide. Whether this is your first MacBook or your first laptop, period, you''ll learn to navigate the Mac desktop, c

  9. Enterprise Mac Security Mac OS X Snow Leopard Security

    CERN Document Server

    Edge, Stephen Charles; Hunter, Beau; Sullivan, Gene; LeBlanc, Dee-Ann

    2010-01-01

    A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing s

  10. Macs for seniors for dummies

    CERN Document Server

    Chambers, Mark L

    2009-01-01

    Over 50 and thinking about getting your first computer? A user-friendly Mac is a great choice, and Macs For Seniors For Dummies walks you through choosing one and learning to use it. You won't even need your grandchildren to help! Macs For Seniors For Dummies introduces you to all the basic things you may not have encountered before-how to use the keyboard and mouse, work with files and folders, navigate around the Mac OS X desktop, set up an Internet connection, and much more. You'll learn to:Choose the Mac that's right for you, set it up, run programs and manage files, and hook up a printerU

  11. Mac Bible

    CERN Document Server

    Spivey, Dwight

    2009-01-01

    This essential guide answers all your questions on using a Macintosh computer, whether you?re unpacking your very first Mac after switching from a PC or upgrading from an older Mac. You?ll walk through all pre-installed Mac applications, including using Mac OS X, browsing the Web using Safari, downloading music from the iTunes store, troubleshooting Mac-specific problems, organizing photos in iPhoto, organizing calendars in iCal, editing digital video in iMovie, and more.

  12. Desktop grid computing

    CERN Document Server

    Cerin, Christophe

    2012-01-01

    Desktop Grid Computing presents common techniques used in numerous models, algorithms, and tools developed during the last decade to implement desktop grid computing. These techniques enable the solution of many important sub-problems for middleware design, including scheduling, data management, security, load balancing, result certification, and fault tolerance. The book's first part covers the initial ideas and basic concepts of desktop grid computing. The second part explores challenging current and future problems. Each chapter presents the sub-problems, discusses theoretical and practical

  13. Desktop Manufacturing Technologies.

    Science.gov (United States)

    Snyder, Mark

    1991-01-01

    Desktop manufacturing is the use of data from a computer-assisted design system to construct actual models of an object. Emerging processes are stereolithography, laser sintering, ballistic particle manufacturing, laminated object manufacturing, and photochemical machining. (SK)

  14. Mac OS X Snow Leopard for dummies

    CERN Document Server

    LeVitus, Bob

    2010-01-01

    Get to know Snow Leopard and make the most of your Mac Snow Leopard has a few new tricks up its sleeve, so whether you're new to Mac or a longtime Mac-thusiast, Mac expert Bob LeVitus has tips you'll appreciate. Learn how to start up your Mac, get to know the Dock and Finder, work your way through windows and dialogs, and organize and manage files and folders. Open the book and find: How to navigate around the Finder, Dock, and desktop Tips for opening, closing, resizing, and moving windows Steps for keeping Snow Leopard organized How to back up your system with Time Machine® Troubleshooting a

  15. Desktop Computing Integration Project

    Science.gov (United States)

    Tureman, Robert L., Jr.

    1992-01-01

    The Desktop Computing Integration Project for the Human Resources Management Division (HRMD) of LaRC was designed to help division personnel use personal computing resources to perform job tasks. The three goals of the project were to involve HRMD personnel in desktop computing, link mainframe data to desktop capabilities, and to estimate training needs for the division. The project resulted in increased usage of personal computers by Awards specialists, an increased awareness of LaRC resources to help perform tasks, and personal computer output that was used in presentation of information to center personnel. In addition, the necessary skills for HRMD personal computer users were identified. The Awards Office was chosen for the project because of the consistency of their data requests and the desire of employees in that area to use the personal computer.

  16. Learn Excel 2011 for Mac

    CERN Document Server

    Hart-Davis, Guy

    2011-01-01

    Microsoft Excel 2011 for Mac OS X is a powerful application, but many of its most impressive features can be difficult to find. Learn Excel 2011 for Mac by Guy Hart-Davis is a practical, hands-on approach to learning all of the details of Excel 2011 in order to get work done efficiently on Mac OS X. From using formulas and functions to creating databases, from analyzing data to automating tasks, you'll learn everything you need to know to put this powerful application to use for a variety of tasks. What you'll learn * The secrets of the Excel for Mac interface! * How to create effective workbo

  17. MacBook Pro Portable Genius

    CERN Document Server

    Miser, Brad

    2012-01-01

    Discover loads of tips and techniques for the newest MacBook Pro You're already ahead of the game with a MacBook Pro. Now you can get even more out the popular Apple notebook with the new edition of this handy, compact book. Crammed with savvy insights and tips on key tools and shortcuts, this book will help you increase your productivity and keep your Apple digital lifestyle on track. From desktop sharing and wireless networking to running Windows applications, this book avoids fluff, doesn't skimp on the essentials, saves you time and hassle, and shows you what you most want to know. Include

  18. Desk Congest Desktop Congesting Software for Desktop Clutter Congestion

    Directory of Open Access Journals (Sweden)

    Solomon A. Adepoju

    2015-06-01

    Full Text Available Abstract The computer desktop environment is a working environment which can be likened unto a users desk in homes and offices. Often times the computer desktop get cluttered with files either as shortcuts used for quick links files stored temporarily to be accessed later or just being dumped there for no vivid reasons. However previous researches have shown that cluttered desktop affects users productivity and getting these files organized is a laborious task for most users. To be able to conveniently alleviate the effect clutters have on users performances and productivity there is need for third party software that will help get the desktop environment organized in a logical and efficient manner. It is to this end that desktop decongesting software is being designed and implemented to help curb clutter problems which existing tools have only partially addressed. The system is designed using Visual Basic .Net and it proves to be effective in tackling desktop congestion problem.

  19. LCCP Desktop Application v1.0 Engineering Reference

    Energy Technology Data Exchange (ETDEWEB)

    Beshr, Mohamed [University of Maryland, College Park; Aute, Vikrant [University of Maryland, College Park

    2014-04-01

    This Life Cycle Climate Performance (LCCP) Desktop Application Engineering Reference is divided into three parts. The first part of the guide, consisting of the LCCP objective, literature review, and mathematical background, is presented in Sections 2-4. The second part of the guide (given in Sections 5-10) provides a description of the input data required by the LCCP desktop application, including each of the input pages (Application Information, Load Information, and Simulation Information) and details for interfacing the LCCP Desktop Application with the VapCyc and EnergyPlus simulation programs. The third part of the guide (given in Section 11) describes the various interfaces of the LCCP code.

  20. MacSelfService online tutorial

    CERN Document Server

    CERN. Geneva

    2016-01-01

    Mac Self-Service is a functionality within the Mac Desktop Service built and maintained to empower CERN users by giving them easy access to applications and configurations through the Self-Service application. This tutorial (text attached to the event page) explains how to install Mac Self-Service and how to use it to install applications and printers. Content owner: Vincent Nicolas Bippus Presenter: Pedro Augusto de Freitas Batista Tell us what you think via e-learning.support at cern.ch More tutorials in the e-learning collection of the CERN Document Server (CDS) https://cds.cern.ch/collection/E-learning%20modules?ln=en All info about the CERN rapid e-learning project is linked from http://twiki.cern.ch/ELearning  

  1. Macs for dummies

    CERN Document Server

    Baig, Edward C

    2014-01-01

    Get the most out of your Mac with this comprehensive guide Macs For Dummies, 13th Edition is the ultimate guide to your Mac, fully updated to include information about the latest updates. The book walks you through troubleshooting, syncing mobile devices, integrating Windows, and more, so you can take advantage of everything Macs have to offer. Whether you're a new user, a recent convert, or you just want to get the most out of your Mac, this book puts all the information you need in one place. Discover what makes Macs superior computing machines. Learn the basics, from mastering the Dock and

  2. MacBook Pro portable genius

    CERN Document Server

    Gruman, Galen

    2013-01-01

    Learn the skills, tools and shortcuts you need in order to make the most of your MacBook Pro This easy-to-use, compact guide skips the fluff and gets right to the essentials so that you can maximize all the latest features of the MacBook Pro. Packed with savvy insights and tips on key tools and shortcuts, this handy book aims to help you increase your productivity and save you time and hassle. From desktop sharing and wireless networking to running Windows applications and more, this book shows you what you want to know. Includes the latest version of OS X, iCloud, FaceTime, and moreCovers al

  3. Enterprise Mac administrators guide

    CERN Document Server

    Smith, William

    2015-01-01

    IT departments everywhere will be integrating Macs and Mac OS X into their IT infrastructure and this book will tell them how to do it. It will serve as an authoritative, useful and frequently referenced book on Mac OS X administration.

  4. Desktop Virtualization: Applications and Considerations

    Science.gov (United States)

    Hodgman, Matthew R.

    2013-01-01

    As educational technology continues to rapidly become a vital part of a school district's infrastructure, desktop virtualization promises to provide cost-effective and education-enhancing solutions to school-based computer technology problems in school systems locally and abroad. This article outlines the history of and basic concepts behind…

  5. Desktop Computing - Distributed Cognition in a Tax Office

    Directory of Open Access Journals (Sweden)

    Martin Nielsen

    2004-05-01

    Full Text Available Based on a detailed study of the use of representations in a tax assessment process, this paper presents an analysis of the use of the physical desktop and of paper documents, files and electronic information. This analysis challenges the ways in which the computer desktop is designed and used normally, and we present a number of challenges to user interface design. Taking these seriously, means to revisit several taken-for-granted elements of the current WIMP regime: the randomly overlapping windows on a non-structured background; the lack of traces of time and past location; and the individualised and non-activity-oriented set-up of the desktop.

  6. Mac at Work

    CERN Document Server

    Sparks, David

    2011-01-01

    Bridge the gap between using a Mac at home and at the office. Now that you love your Mac at home, you want to use one at the office without missing a beat of productivity or professionalism. This unique guide shows you how.  You'll find best Mac business practices for handling word processing, spreadsheet and presentation creation, task and project management, and graphics. The book also explores topics such as hardware maintenance, how to synchronize with multiple computers, data backup, and communication with Windows networks.: Covers the nuts and bolts of using a Mac at work, including sync

  7. Digital video for the desktop

    CERN Document Server

    Pender, Ken

    1999-01-01

    Practical introduction to creating and editing high quality video on the desktop. Using examples from a variety of video applications, benefit from a professional's experience, step-by-step, through a series of workshops demonstrating a wide variety of techniques. These include producing short films, multimedia and internet presentations, animated graphics and special effects.The opportunities for the independent videomaker have never been greater - make sure you bring your understanding fully up to date with this invaluable guide.No prior knowledge of the technology is assumed, with explanati

  8. SR-MAC: A Low Latency MAC Protocol for Multi-Packet Transmissions in Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Hong-Wei Tang; Jian-Nong Cao; Xue-Feng Liu; Cai-Xia Sun

    2013-01-01

    Event detection is one of the major applications of wireless sensor networks (WSNs).Most of existing medium access control (MAC) protocols are mainly optimized for the situation under which an event only generates one packet on a single sensor node.When an event generates multiple packets on a single node,the performance of these MAC protocols degrades rapidly.In this paper,we present a new synchronous duty-cycle MAC protocol called SR-MAC for the event detection applications in which multiple packets are generated on a single node.SR-MAC introduces a new scheduling mechanism that reserves few time slots during the SLEEP period for the nodes to transmit multiple packets.By this approach,SR-MAC can schedule multiple packets generated by an event on a single node to be forwarded over multiple hops in one operational cycle without collision.We use event delivery latency (EDL) and event delivery ratio (EDR) to measure the event detection capability of the SR-MAC protocol.Through detailed ns-2 simulation,the results show that SR-MAC can achieve lower EDL,higher EDR and higher network throughput with guaranteed energy efficiency compared with R-MAC,DW-MAC and PR-MAC.

  9. System Testing of Desktop and Web Applications

    Science.gov (United States)

    Slack, James M.

    2011-01-01

    We want our students to experience system testing of both desktop and web applications, but the cost of professional system-testing tools is far too high. We evaluate several free tools and find that AutoIt makes an ideal educational system-testing tool. We show several examples of desktop and web testing with AutoIt, starting with simple…

  10. Instant Citrix XenDesktop 5 starter

    CERN Document Server

    Magdy, Mahmoud

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. This easy-to-follow, hands-on guide shows you how to implement desktop virtualization with real life cases and step-by-step instructions. It is a tutorial with step-by-step instructions and adequate screenshots for the installation and administration of Citrix XenDesktop.If you are new to XenDesktop or are looking to build your skills in desktop virtualization, this is your step-by-step guide to learning Citrix XenDesktop. For those architects a

  11. Feasibility of Bioprinting with a Modified Desktop 3D Printer.

    Science.gov (United States)

    Goldstein, Todd A; Epstein, Casey J; Schwartz, John; Krush, Alex; Lagalante, Dan J; Mercadante, Kevin P; Zeltsman, David; Smith, Lee P; Grande, Daniel A

    2016-12-01

    Numerous studies have shown the capabilities of three-dimensional (3D) printing for use in the medical industry. At the time of this publication, basic home desktop 3D printer kits can cost as little as $300, whereas medical-specific 3D bioprinters can cost more than $300,000. The purpose of this study is to show how a commercially available desktop 3D printer could be modified to bioprint an engineered poly-l-lactic acid scaffold containing viable chondrocytes in a bioink. Our bioprinter was used to create a living 3D functional tissue-engineered cartilage scaffold. In this article, we detail the design, production, and calibration of this bioprinter. In addition, the bioprinted cells were tested for viability, proliferation, biochemistry, and gene expression; these tests showed that the cells survived the printing process, were able to continue dividing, and produce the extracellular matrix expected of chondrocytes.

  12. Mac OS X Snow Leopard pocket guide

    CERN Document Server

    Seiblod, Chris

    2009-01-01

    Whether you're new to the Mac or a longtime user, this handy book is the quickest way to get up to speed on Snow Leopard. Packed with concise information in an easy-to-read format, Mac OS X Snow Leopard Pocket Guide covers what you need to know and is an ideal resource for problem-solving on the fly. This book goes right to the heart of Snow Leopard, with details on system preferences, built-in applications, and utilities. You'll also find configuration tips, keyboard shortcuts, guides for troubleshooting, lots of step-by-step instructions, and more. Learn about new features and changes s

  13. Desktop Virtualization Solutions-A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Vasuprada Vijayakumar

    2013-09-01

    Full Text Available Virtualization has become apparent in the 1960s as a practice to enhance the use of expensive computing hardware. Virtualization targets to reduce the complexity associated with deployment and maintenance of client devices, which eventually helps IT Companies to reduce system management costs. In this paper, we propose the virtualization concept expanding into many aspects of IT world. There are various virtualization technologies which include storage, desktop virtual platforms, server consolidation, virtual desktop infrastructure and application virtualization. This is the basic prerequisite for cloud computing and its applications. This paper highlights the benefits of virtualization and provides a comparative study on the various products that have been derived from it. This paper also describes how to create a virtualization strategy introducing comprehensive desktop-virtualization solutions, thereby providing a high-level guidance to help develop a desktop-virtualization strategy.

  14. Selecting the Right Camera for Your Desktop.

    Science.gov (United States)

    Rhodes, John

    1997-01-01

    Provides an overview of camera options and selection criteria for desktop videoconferencing. Key factors in image quality are discussed, including lighting, resolution, and signal-to-noise ratio; and steps to improve image quality are suggested. (LRW)

  15. VMware Horizon 6 desktop virtualization solutions

    CERN Document Server

    Cartwright, Ryan; Langone, Jason; Leibovici, Andre

    2014-01-01

    If you are a desktop architect, solution provider, end-user consultant, virtualization engineer, or anyone who wants to learn how to plan and design the implementation of a virtual desktop solution based on Horizon 6, then this book is for you. An understanding of VMware vSphere fundamentals coupled with experience in the installation or administration of a VMware environment would be a plus during reading.

  16. The MAC framework: redefining MAC protocols for wireless sensor networks

    NARCIS (Netherlands)

    Parker, T.; Halkes, G.; Bezemer, M.; Langendoen, K.

    2010-01-01

    Most current WSN MAC protocol implementations have multiple tasks to perform—deciding on correct timing, sending of packets, sending of acknowledgements, etc. However, as much of this is common to all MAC protocols, there is duplication of functionality, which leads to larger MAC protocol code size

  17. The MAC framework: redefining MAC protocols for wireless sensor networks

    NARCIS (Netherlands)

    Parker, T.; Halkes, G.; Bezemer, M.; Langendoen, K.

    2010-01-01

    Most current WSN MAC protocol implementations have multiple tasks to perform—deciding on correct timing, sending of packets, sending of acknowledgements, etc. However, as much of this is common to all MAC protocols, there is duplication of functionality, which leads to larger MAC protocol code size

  18. Recent results from MAC

    Energy Technology Data Exchange (ETDEWEB)

    MAC Collaboration

    1982-05-01

    Some preliminary results from the MAC detector at PEP are presented. These include measurements of the angular distribution of ..gamma gamma.., ..mu mu.. and tau tau final states, a determination of the tau lifetime, a measurement of R, and a presentation of the inclusive muon p/sub perpendicular/ distribution for hadronic events.

  19. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks

    Science.gov (United States)

    Song, W.-Z.; Huang, R.; Shirazi, B.; LaHusen, R.

    2009-01-01

    Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and each frame into slots. A parent node determines the children's frame assignment based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. First, given any node, at any time slot, there is at most one active sender in its neighborhood (including itself). Second, the packet scheduling with TreeMAC is bufferless, which therefore minimizes the probability of network congestion. Third, the data throughput to the gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24-node testbed show that TreeMAC protocol significantly improves network throughput, fairness, and energy efficiency compared to TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC. Partial results of this paper were published in Song, Huang, Shirazi and Lahusen [W.-Z. Song, R. Huang, B. Shirazi, and R. Lahusen, TreeMAC: Localized TDMA MAC protocol for high-throughput and fairness in sensor networks, in: The 7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom, March 2009]. Our new contributions include analyses of the performance of TreeMAC from various aspects. We also present more implementation detail and evaluate TreeMAC from other aspects. ?? 2009 Elsevier B.V.

  20. iMac pocket genius

    CERN Document Server

    Hart-Davis, Guy

    2010-01-01

    If you want to get the very most out of your iMac, put this savvy Portable Genius guide to work. Want to make the most of the new Magic Mouse and the latest iLife apps? Set up a wireless network using your iMac's AirPort card? Watch television on your iMac, or show iMac videos and movies on your television? You'll find cool and useful Genius tips, full-color screenshots, and pages of easy-to-access shortcuts and tools that will save you time and let you enjoy your iMac to the max.

  1. Monolithic MACS micro resonators

    Science.gov (United States)

    Lehmann-Horn, J. A.; Jacquinot, J.-F.; Ginefri, J. C.; Bonhomme, C.; Sakellariou, D.

    2016-10-01

    Magic Angle Coil Spinning (MACS) aids improving the intrinsically low NMR sensitivity of heterogeneous microscopic samples. We report on the design and testing of a new type of monolithic 2D MACS resonators to overcome known limitations of conventional micro coils. The resonators' conductors were printed on dielectric substrate and tuned without utilizing lumped element capacitors. Self-resonance conditions have been computed by a hybrid FEM-MoM technique. Preliminary results reported here indicate robust mechanical stability, reduced eddy currents heating and negligible susceptibility effects. The gain in B1 /√{ P } is in agreement with the NMR sensitivity enhancement according to the principle of reciprocity. A sensitivity enhancement larger than 3 has been achieved in a monolithic micro resonator inside a standard 4 mm rotor at 500 MHz. These 2D resonators could offer higher performance micro-detection and ease of use of heterogeneous microscopic substances such as biomedical samples, microscopic specimens and thin film materials.

  2. Blind Cognitive MAC Protocols

    CERN Document Server

    Mehanna, Omar; Gamal, Hesham El

    2008-01-01

    We consider the design of cognitive Medium Access Control (MAC) protocols enabling an unlicensed (secondary) transmitter-receiver pair to communicate over the idle periods of a set of licensed channels, i.e., the primary network. The objective is to maximize data throughput while maintaining the synchronization between secondary users and avoiding interference with licensed (primary) users. No statistical information about the primary traffic is assumed to be available a-priori to the secondary user. We investigate two distinct sensing scenarios. In the first, the secondary transmitter is capable of sensing all the primary channels, whereas it senses one channel only in the second scenario. In both cases, we propose MAC protocols that efficiently learn the statistics of the primary traffic online. Our simulation results demonstrate that the proposed blind protocols asymptotically achieve the throughput obtained when prior knowledge of primary traffic statistics is available.

  3. iMac portable genius

    CERN Document Server

    Hart-Davis, Guy

    2010-01-01

    The most up-to-date coverage on the latest iMac advice, tools, and shortcuts Cool and useful tips, full-color screenshots, and savvy advice show you how to get the most out of your iMac. Fully updated to cover the iMac's latest features and capabilities, this guide is packed with indispensible information on iLife '09 and Mac OS X Snow Leopard, and shows you how to customize your iMac in a way that it will work best for you.Explores all the bells and whistles of the iMac, including the new Magic Mouse, iLife apps such as iPhoto and iMovie, and Mac OS X Snow LeopardShows yo

  4. Architectural Desktop : release 3.3

    DEFF Research Database (Denmark)

    Skauge, Jørn

    2002-01-01

    Øvelser i ADT's mest grundlæggende dele på basis af modellering af et lille og simpelt hus. Der arbejdes primært med værktøjerne i designdelens menu. 1. udgave med titel: Architectural Desktop (Fiskers hus). 2002. 60 sider.......Øvelser i ADT's mest grundlæggende dele på basis af modellering af et lille og simpelt hus. Der arbejdes primært med værktøjerne i designdelens menu. 1. udgave med titel: Architectural Desktop (Fiskers hus). 2002. 60 sider....

  5. MacRuby Ruby and Cocoa on OS X

    CERN Document Server

    Aimonetti, Matt

    2011-01-01

    Want to build native Mac OS X applications with a sleek, developer-friendly alternative to Objective-C? MacRuby is an ideal choice. This in-depth guide shows you how Apple's implementation of Ruby gives you access to all the features available to Objective-C programmers. You'll get clear, detailed explanations of MacRuby, including quick programming techniques such as prototyping. Perfect for programmers at any level, this book is packed with code samples and complete project examples. If you use Ruby, you can tap your skills to take advantage of Interface Builder, Cocoa libraries, the Objec

  6. iMac for dummies

    CERN Document Server

    Chambers, Mark L

    2014-01-01

    Do it all with your iMac and this bestselling For Dummies guide! You're still a little giddy from finally scoring your new iMac, and you can't wait to get started. Even if you're already in love with your iMac, it helps to have a little guidance to really get the most out of this ultimate all-in-one computer. This updated edition of iMac For Dummies is the ideal way to learn the iMac fundamentals from setting up and personalizing your machine to importing files, making FaceTime video calls, surfing the web, using your favorite programs and apps, and everything in between. Trusted Mac guru Mark

  7. Desktop Virtualization in Action: Simplicity Is Power

    Science.gov (United States)

    Fennell, Dustin

    2010-01-01

    Discover how your institution can better manage and increase access to instructional applications and desktops while providing a blended learning environment. Receive practical insight into how academic computing virtualization can be leveraged to enhance education at your institution while lowering Total Cost of Ownership (TCO) and reducing the…

  8. Aquatic Habitats: Exploring Desktop Ponds. Teacher's Guide.

    Science.gov (United States)

    Barrett, Katharine; Willard, Carolyn

    This book, for grades 2-6, is designed to provide students with a highly motivating and unique opportunity to investigate an aquatic habitat. Students set up, observe, study, and reflect upon their own "desktop ponds." Accessible plants and small animals used in these activities include Elodea, Tubifex worms, snails, mosquito larvae, and fish.…

  9. Ellen MacArthur

    Institute of Scientific and Technical Information of China (English)

    Teodora; Lazarova

    2006-01-01

    Just over a year since breaking the round theworld solo record on board her 75 foot trimaranB&O,Ellen MacArthur embarked on a newventure:the Asian Record Circuit 2006,incorpo-rating the ‘Tour Of China’,and bringing a differ-ent set of challenges into new territories.Wespoke to Ellen and her team during their recent(April)stopover in Oingdao.When did you start sailing and what inspiredyou(you grew up in Derbyshire,in the UK,quite far away from the water)?I was introduced to sailing by my Aunt Thea ona small sailing boat called Cabaret.We wentsailing along the east coast of EngLand andbefore I knew it,I was hooked on sailing.I wasso inspired that when I was at school,I saved

  10. iMac for dummies

    CERN Document Server

    Chambers, Mark L

    2012-01-01

    The bestselling guide to the ultimate all-in-one computer—now updated and revised throughout! If you're looking for speed, performance, and power, the iMac is the ultimate all-in-one computer. From its superior performance, powerful operating system, and amazing applications, the iMac is one awesome machine, and the fun, friendly, and approachable style of iMac For Dummies is an ideal way to get started with the basics. You'll learn the fundamentals of the iMac including setting up and customizing your iMac and the software that comes with it, importing files from your old computer, send

  11. Mac OS X : Tiger edition the missing manual

    CERN Document Server

    Pogue, David

    2005-01-01

    You can set your watch to it: As soon as Apple comes out with another version of Mac OS X, David Pogue hits the streets with another meticulous Missing Manual to cover it with a wealth of detail. The new Mac OS X 10.4, better known as Tiger, is faster than its predecessors, but nothing's too fast for Pogue and Mac OS X: The Missing Manual. There are many reasons why this is the most popular computer book of all time. With its hallmark objectivity, the Tiger Edition thoroughly explores the latest features to grace the Mac OS. Which ones work well and which do not? What should you look for? Th

  12. Gotcha! Macs lose their innocence

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Still believe your Mac is secure because Microsoft PCs fall prey to viruses and worms but Macs don’t? Time to wake up! This year has seen the first major compromise of Macs worldwide*. How is yours doing?   The “Flashback” Trojan is affecting Apple’s own variant of Java and compromises Macs via so-called drive-by infections, i.e. when you visit an appropriately prepared (infected!) website - and this might not necessarily be a site with questionable contents, but could well be a popular, reputable one. Security Companies worldwide have been monitoring this particular Trojan for a while and have estimated that more than half a million Macs were compromised. Connected to a few central command and control servers, the compromised Macs were then supporting the malicious activity of the bad guys! Fortunately, the security companies have now been able to take over those command and control servers and stop their destructive drive. So, Mac users, face the f...

  13. Java and Mac OS X

    CERN Document Server

    Davis, T Gene

    2010-01-01

    Learn the guidelines of integrating Java with native Mac OS X applications with this Devloper Reference book. Java is used to create nearly every type of application that exists and is one of the most required skills of employers seeking computer programmers. Java code and its libraries can be integrated with Mac OS X features, and this book shows you how to do just that. You'll learn to write Java programs on OS X and you'll even discover how to integrate them with the Cocoa APIs.: Shows how Java programs can be integrated with any Mac OS X feature, such as NSView widgets or screen savers; Re

  14. Mac Programming for Absolute Beginners

    CERN Document Server

    Wang, Wallace

    2011-01-01

    Want to learn how to program on your Mac? Not sure where to begin? Best-selling author Wallace Wang will explain how to get started with Cocoa, Objective-C, and Xcode. Whether you are an experienced Windows coder moving to the Mac, or you are completely new to programming, you'll see how the basic design of a Mac OS X program works, how Objective-C differs from other languages you may have used, and how to use the Xcode development environment. Most importantly, you'll learn how to use elements of the Cocoa framework to create windows, store data, and respond to users in your own Mac programs.

  15. MacBook portable genius

    CERN Document Server

    Miser, Brad

    2008-01-01

    The Genius is in. You don't have to be a genius to use a MacBook. But if you want to get the very most out of yours, put this savvy Portable Genius guide to work. Want to connect your MacBook to other Macs? Use Expose to its fullest potential? Troubleshoot? You'll find cool and useful Genius tips, insider secrets, full-color screenshots, and pages of easy-to-access shortcuts and tools that will save you loads of time and make your MacBook IQ soar. Portable GENIUS Fun, hip, and straightforward, the new Portable Genius series gives forward-thinking Apple users useful informat

  16. Mac mini真体验

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    2005年,Mac mini首次登场,众所周知,苹果的模具更换的并不频繁,在外貌没有大幅改变的情况下,迄今为止,Mac mini实际上已经更新了7代。最新的Mac mini的工业设计实际上延续了2008年开始的Unibody一体成型铝合金机身设计与其他Mac在外观上保持了一致的元素。更小的Mac mini看起来更加性感诱人,那么,你需要它么?

  17. A Mac Protocol Implementation for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jamila Bhar

    2015-01-01

    Full Text Available IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN. The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.

  18. Fiverr MacGyver

    Science.gov (United States)

    Hut, Rolf; van de Giesen, Nick; Larson, Martha

    2014-05-01

    Crowdsourcing has become popular over the past years, also for scientific endeavors. There are many Citizen Science projects and crowdfunding platforms, such as Kickstarter, that are make helpful contributions to moving environmental science forward. An interesting underused source of useful crowd-derived contributions to research is the website Fiverr.com. On this platform, thousands of people, acting as small-scale freelance contractors, offer their skills in the form of services. The platform offers a chance for people to take a hobby, skill, or pastime and make it something more by reaching out to a wider audience and by receiving a payment in return for services. As is typical of other crowdsourcing platforms, the tasks are small and usually self contained. As the name Fiverr suggests, offers start at US5 to provide a particular service. Services offered range from graphic design, to messages sung or spoken with various styles or accents, to complete apps for Android or iPhone. Skill providers on the platform can accept a range of variation of definition in the tasks, some can be described in general terms, for others it is more appropriate to provide examples. Fiverr provides a central location for those offering skills and those needing services to find each other, it makes it possible to communicate and exchange files, to make payments, and it provides support for resolving disputes. In all cases, it is important to keep expectations aligned with the nature of the platform: quality can and will vary. Ultimately, the critical contribution of Fiverr is not to replace professional services or otherwise save money, but rather to provide access to a large group of people with specialized skills who are able to make a contribution on short notice. In the context of this session, it can be considered a pool of people with MacGyver skills lying in wait of a MacGyyer task to attack. There are many ways in which Fiverr tasks, which are called 'gigs', can be useful in

  19. Switching to a Mac portable genius

    CERN Document Server

    McFedries, Paul

    2011-01-01

    Switching from a PC to a Mac is a breeze with this book Anyone considering making the move to Mac from the Windows world will find this book smoothes the way. While Macs are famous for ease of use, there are fundamental differences in Mac and PC ways of thinking, plus there?s the hassle of moving files, calendars, and other essential data from one platform to another. This guide lays out all the information, explains basic Mac procedures for the newcomer, offers great tips on data-sharing (including running Windows applications on a Mac), and provides everything the new Mac user needs to move

  20. Switching to a Mac For Dummies

    CERN Document Server

    Reinhold, Arnold

    2011-01-01

    Learn how to make the switch from PC to Mac a completely smooth transition The number of Mac users continues to increase significantly each year. If you are one of those people and are eager but also anxious about making the switch, then fear not! This friendly guide skips the jargon to deliver you an easy-to-read, understandable introduction to the Macintosh computer. Computer guru Arnold Reinhold walks you through the Mac OS, user interface, and icons. You'll learn how to set up your Mac, move your files from your PC to your Mac, switch applications, get your Mac online, network your Mac, se

  1. Cloud Policy Model in the Desktop Management System

    Directory of Open Access Journals (Sweden)

    Fang Zhao

    2010-11-01

    Full Text Available By studying the policy and desktop management systems theories, referencing the Internet Engineering Task Force (IETF policy model and theories of cloud computing, this paper proposed a cloud policy model that can be applied in specific desktop management system. It mainly explains the whole system framework and its implementation mechanisms, and it discusses the problems and solutions that the cloud policy model uses in the desktop management system.

  2. Dynamic Resource Allocation in Desktop Grids

    Directory of Open Access Journals (Sweden)

    Bismi A S,

    2010-08-01

    Full Text Available Grid computing (or the use of computational grids is the application of several computers to a single problem at the same time. In grid computing ,the computing becomes pervasive and individual users(or client applicationgain access to computing resources (processors ,storage ,data,applications,and so onas needed with little or noknowledge of where those resources are located or what the underlying technologies, hardware ,operating system and so on. This paper address the problem of resource scheduling ,and there are so many resource scheduling algorithms .Resource scheduling algorithm may be centralized one and distributed one. One of the latest one is the multi-variable best fit algorithm, which deals with storage systems, and it enhanced in this work. and this algorithm is dealing withdata grids for blade servers. so, this algorithm is modified for computational grids, especially with desktop systems with minimum spanning algorithm for node selection and it is giving good results. In desktop grid environment, dynamic scheduling becomes very important and globus like toolkits are not having the scheduler as its own, and it needs other schedulers are not specially for computational grids.

  3. Mac OS X Lion在Mac App Store上线

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    2011年7月20日,Apple宣布具有超过250种新功能的世界最先进操作系统的第八个重要版本Mac OS X Lion今天在Mac App StoreTM推出并可进行下载,价格为29.99美元。Lion的诸多超强功能包括:全新Multi-Touch手势;全系统支持全屏应用程序;

  4. 36 CFR 1194.26 - Desktop and portable computers.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Desktop and portable computers. 1194.26 Section 1194.26 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION... § 1194.26 Desktop and portable computers. (a) All mechanically operated controls and keys shall comply...

  5. Citrix XenApp 7.5 desktop virtualization solutions

    CERN Document Server

    Paul, Andy

    2014-01-01

    If you are a Citrix® engineer, a virtualization consultant, or an IT project manager with prior experience of using Citrix XenApp® and related technologies for desktop virtualization and want to further explore the power of XenApp® for flawless desktop virtualization, then this book is for you.

  6. Exploring Graphic Design. A Short Course in Desktop Publishing.

    Science.gov (United States)

    Stanley, MLG

    This course in desktop publishing contains seven illustrated modules designed to meet the following objectives: (1) use a desktop publishing program to explore advanced topics in graphic design; (2) learn about typography and how to make design decisions on the use of typestyles; (3) learn basic principles in graphic communications and apply them…

  7. Office 2011 for Mac For Dummies

    CERN Document Server

    LeVitus, Bob

    2011-01-01

    Get started with Office 2011 for Mac and discover the creative possibilitiesThe leading suite of productivity software for the Mac, Microsoft Office helps users complete common business tasks, including word processing, e-mail, presentations, financial analysis, and much more. Office 2011 for Mac For Dummies is the perfect companion for Microsoft Office for Mac users upgrading to the newest version, new computer users, and those who may have switched from the Windows version of Office. Written by one of the most popular gurus in the Mac community, Bob "Dr. Mac" LeVitus, the book explains every

  8. Additive Manufacturing by selective laser melting the realizer desktop machine and its application for the dental industry

    Science.gov (United States)

    Gebhardt, Andreas; Schmidt, Frank-Michael; Hötter, Jan-Steffen; Sokalla, Wolfgang; Sokalla, Patrick

    Additive Manufacturing of metal parts by Selective Laser Melting has become a powerful tool for the direct manufacturing of complex parts mainly for the aerospace and medical industry. With the introduction of its desktop machine, Realizer targeted the dental market. The contribution describes the special features of the machine, discusses details of the process and shows manufacturing results focused on metal dental devices.

  9. GREEN SUPERCOMPUTING IN A DESKTOP BOX

    Energy Technology Data Exchange (ETDEWEB)

    HSU, CHUNG-HSING [Los Alamos National Laboratory; FENG, WU-CHUN [NON LANL; CHING, AVERY [NON LANL

    2007-01-17

    The computer workstation, introduced by Sun Microsystems in 1982, was the tool of choice for scientists and engineers as an interactive computing environment for the development of scientific codes. However, by the mid-1990s, the performance of workstations began to lag behind high-end commodity PCs. This, coupled with the disappearance of BSD-based operating systems in workstations and the emergence of Linux as an open-source operating system for PCs, arguably led to the demise of the workstation as we knew it. Around the same time, computational scientists started to leverage PCs running Linux to create a commodity-based (Beowulf) cluster that provided dedicated computer cycles, i.e., supercomputing for the rest of us, as a cost-effective alternative to large supercomputers, i.e., supercomputing for the few. However, as the cluster movement has matured, with respect to cluster hardware and open-source software, these clusters have become much more like their large-scale supercomputing brethren - a shared (and power-hungry) datacenter resource that must reside in a machine-cooled room in order to operate properly. Consequently, the above observations, when coupled with the ever-increasing performance gap between the PC and cluster supercomputer, provide the motivation for a 'green' desktop supercomputer - a turnkey solution that provides an interactive and parallel computing environment with the approximate form factor of a Sun SPARCstation 1 'pizza box' workstation. In this paper, they present the hardware and software architecture of such a solution as well as its prowess as a developmental platform for parallel codes. In short, imagine a 12-node personal desktop supercomputer that achieves 14 Gflops on Linpack but sips only 185 watts of power at load, resulting in a performance-power ratio that is over 300% better than their reference SMP platform.

  10. The many faces of Mac-1 in autoimmune disease.

    Science.gov (United States)

    Rosetti, Florencia; Mayadas, Tanya N

    2016-01-01

    Mac-1 (CD11b/CD18) is a β2 integrin classically regarded as a pro-inflammatory molecule because of its ability to promote phagocyte cytotoxic functions and enhance the function of several effector molecules such as FcγR, uPAR, and CD14. Nevertheless, recent reports have revealed that Mac-1 also plays significant immunoregulatory roles, and genetic variants in ITGAM, the gene that encodes CD11b, confer risk for the autoimmune disease systemic lupus erythematosus (SLE). This has renewed interest in the physiological roles of this integrin and raised new questions on how its seemingly opposing biological functions may be regulated. Here, we provide an overview of the CD18 integrins and how their activation may be regulated as this may shed light on how the opposing roles of Mac-1 may be elicited. We then discuss studies that exemplify Mac-1's pro-inflammatory versus regulatory roles particularly in the context of IgG immune complex-mediated inflammation. This includes a detailed examination of molecular mechanisms that could explain the risk-conferring effect of rs1143679, a single nucleotide non-synonymous Mac-1 polymorphism associated with SLE.

  11. A desktop extreme ultraviolet microscope based on a compact laser-plasma light source

    Science.gov (United States)

    Wachulak, P. W.; Torrisi, A.; Bartnik, A.; Węgrzyński, Ł.; Fok, T.; Fiedorowicz, H.

    2017-01-01

    A compact, desktop size microscope, based on laser-plasma source and equipped with reflective condenser and diffractive Fresnel zone plate objective, operating in the extreme ultraviolet (EUV) region at the wavelength of 13.8 nm, was developed. The microscope is capable of capturing magnified images of objects with 95-nm full-pitch spatial resolution (48 nm 25-75% KE) and exposure time as low as a few seconds, combining reasonable acquisition conditions with stand-alone desktop footprint. Such EUV microscope can be regarded as a complementary imaging tool to already existing, well-established ones. Details about the microscope, characterization, resolution estimation and real sample images are presented and discussed.

  12. Mac OS X Lion Server For Dummies

    CERN Document Server

    Rizzo, John

    2011-01-01

    The perfect guide to help administrators set up Apple's Mac OS X Lion Server With the overwhelming popularity of the iPhone and iPad, more Macs are appearing in corporate settings. The newest version of Mac Server is the ideal way to administer a Mac network. This friendly guide explains to both Windows and Mac administrators how to set up and configure the server, including services such as iCal Server, Podcast Producer, Wiki Server, Spotlight Server, iChat Server, File Sharing, Mail Services, and support for iPhone and iPad. It explains how to secure, administer, and troubleshoot the networ

  13. Take Control of Maintaining Your Mac

    CERN Document Server

    Kissell, Joe

    2009-01-01

    Keep your Mac running smoothly with our easy maintenance program! Regular maintenance is necessary to avoid problems and to ensure your Mac runs at peak performance, but it's hard to know what to do and when to do it. Best-selling author Joe Kissell has now applied his commonsense approach to the task of maintaining your Mac, whether you use Tiger or Leopard! Learn how to start on the right foot; what you should do daily, weekly, monthly, and yearly; and how to prepare for Mac OS X updates. Joe even explains how to monitor your Mac's health and debunks common panaceas. Read this book to lea

  14. Switching to a Mac For Dummies

    CERN Document Server

    Reinhold, Arnold

    2007-01-01

    Thinking of making the switch from your PC to a Mac? Congratulations! You're in for a great, virus-free ride. And Switching to Mac For Dummies makes it smoother than you ever imagined. From buying the Mac that's right for you to transferring your files to breaking your old Windows habits and learning to do things the (much easier) Mac way, it makes the whole process practically effortless. Whether you've been using Windows XP, Vista, or even Linux, you'll find simple, straightforward ways to make your transition go smoothly. That will leave you plenty of time to get familiar with Mac'

  15. Switching to the Mac The Missing Manual

    CERN Document Server

    Pogue, David

    2010-01-01

    Is Windows giving you pause? Ready to make the leap to the Mac instead? There has never been a better time to switch from Windows to Mac, and this incomparable guide will help you make a smooth transition. New York Times columnist and Missing Manuals creator David Pogue gets you past three challenges: transferring your stuff, assembling Mac programs so you can do what you did with Windows, and learning your way around Mac OS X. Learning to use a Mac is not a piece of cake, but once you do, the rewards are oh-so-much better. No viruses, worms, or spyware. No questionable firewalls, inefficien

  16. Cognitive MAC designs for OSA networks

    CERN Document Server

    Derakhshani, Mahsa

    2014-01-01

    This SpringerBrief presents recent advances in the cognitive MAC designs for opportunistic spectrum access (OSA) networks. It covers the basic MAC functionalities and MAC enhancements of IEEE 802.11. Later chapters discuss the existing MAC protocols for OSA and classify them based on characteristic features. The authors provide new research in adaptive carrier sensing-based MAC designs tailored for OSA, which optimize spectrum utilization and ensure a peaceful coexistence of licensed and unlicensed systems. Analytically devised via optimization and game-theoretic approaches, these adaptive M

  17. Scalable desktop visualisation of very large radio astronomy data cubes

    Science.gov (United States)

    Perkins, Simon; Questiaux, Jacques; Finniss, Stephen; Tyler, Robin; Blyth, Sarah; Kuttel, Michelle M.

    2014-07-01

    Observation data from radio telescopes is typically stored in three (or higher) dimensional data cubes, the resolution, coverage and size of which continues to grow as ever larger radio telescopes come online. The Square Kilometre Array, tabled to be the largest radio telescope in the world, will generate multi-terabyte data cubes - several orders of magnitude larger than the current norm. Despite this imminent data deluge, scalable approaches to file access in Astronomical visualisation software are rare: most current software packages cannot read astronomical data cubes that do not fit into computer system memory, or else provide access only at a serious performance cost. In addition, there is little support for interactive exploration of 3D data. We describe a scalable, hierarchical approach to 3D visualisation of very large spectral data cubes to enable rapid visualisation of large data files on standard desktop hardware. Our hierarchical approach, embodied in the AstroVis prototype, aims to provide a means of viewing large datasets that do not fit into system memory. The focus is on rapid initial response: our system initially rapidly presents a reduced, coarse-grained 3D view of the data cube selected, which is gradually refined. The user may select sub-regions of the cube to be explored in more detail, or extracted for use in applications that do not support large files. We thus shift the focus from data analysis informed by narrow slices of detailed information, to analysis informed by overview information, with details on demand. Our hierarchical solution to the rendering of large data cubes reduces the overall time to complete file reading, provides user feedback during file processing and is memory efficient. This solution does not require high performance computing hardware and can be implemented on any platform supporting the OpenGL rendering library.

  18. Microsoft Virtualization Master Microsoft Server, Desktop, Application, and Presentation Virtualization

    CERN Document Server

    Olzak, Thomas; Boomer, Jason; Keefer, Robert M

    2010-01-01

    Microsoft Virtualization helps you understand and implement the latest virtualization strategies available with Microsoft products. This book focuses on: Server Virtualization, Desktop Virtualization, Application Virtualization, and Presentation Virtualization. Whether you are managing Hyper-V, implementing desktop virtualization, or even migrating virtual machines, this book is packed with coverage on all aspects of these processes. Written by a talented team of Microsoft MVPs, Microsoft Virtualization is the leading resource for a full installation, migration, or integration of virtual syste

  19. LHC@home online tutorial for Mac users - recording

    CERN Document Server

    CERN. Geneva

    2016-01-01

    A step-by-step online tutorial about LHC@home for Mac users by Alexandre Racine. It contains detailed instructions on how-to-join this volunteer computing project.  There are 3 screen capture videos with the real installation process accelerated attached to the event page. This 5' video is linked from http://lhcathome.web.cern.ch/join-us Also from the CDS e-learning category.

  20. Mac OS X Tiger for Unix Geeks

    CERN Document Server

    Jepson, Brian

    2005-01-01

    If you're one of the many Unix developers drawn to Mac OS X for its Unix core, you'll find yourself in surprisingly unfamiliar territory. Unix and Mac OS X are kissing cousins, but there are enough pitfalls and minefields in going from one to another that even a Unix guru can stumble, and most guides to Mac OS X are written for Mac aficionados. For a Unix developer, approaching Tiger from the Mac side is a bit like learning Russian by reading the Russian side of a Russian-English dictionary. Fortunately, O'Reilly has been the Unix authority for over 25 years, and in Mac OS X Tiger for Unix Gee

  1. Teach yourself visually Mac Mini

    CERN Document Server

    Hart-Davis, Guy

    2012-01-01

    The perfect how-to guide for visual learners Apple?s Mac Mini packs a powerful punch is in a small package, including both HDMI and Thunderbolt ports plus the acclaimed OS X. But if you want to get the very most from all this power and versatility, be sure to get this practical visual guide. With full-color, step-by-step instructions as well as screenshots and illustrations on every page, it clearly shows you how to accomplish tasks rather than burying you in pages of text. Discover helpful visuals and how-tos on the OS, hardware specs, Launchpad, the App Store, multimedia capabilities (such

  2. Web Development with the Mac

    CERN Document Server

    Vegh, Aaron

    2010-01-01

    Learn Web development the Apple way and build a business. With a focus on both coding and creative development, this in-depth guide thoroughly covers what you need to know to build winning websites for clients — from what it takes to bring a business online to how to make your site interactive to how to run a freelance web business. In between, you'll master the technical tools of the trade — such as HTML, CSS, JavaScript, PHP, and Ruby on Rails — and learn how to create beautiful interfaces using Photoshop . This book covers everything a fledgling web developer working on a Mac needs to launc

  3. Analysis of 3gpp-MAC and two-key 3gpp-MAC

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Mitchell, C.J.

    2003-01-01

    Forgery and key-recovery attacks are described on the 3gpp-MAC scheme, proposed for inclusion in the 3gpp specification. Three main classes of attack are given, all of which operate whether or not truncation is applied to the MAC value. Attacks in the first class use a large number of 'chosen MACs......', those in the second class use a large number of 'known MACs', and those in the third class require a large number of MAC verifications, but very few known MACS and no chosen MACS. The first class yields both forgery and key-recovery attacks, whereas the second and third classes are key-recovery attacks...... only. Both single-key and two-key variants of 3gpp-MAC are considered; the forgery attacks are relevant to both variants, whereas the key-recovery attacks are only relevant to the two-key variant....

  4. Analysis of 3gpp-MAC and two-key 3gpp-MAC

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Mitchell, C.J.

    2003-01-01

    Forgery and key-recovery attacks are described on the 3gpp-MAC scheme, proposed for inclusion in the 3gpp specification. Three main classes of attack are given, all of which operate whether or not truncation is applied to the MAC value. Attacks in the first class use a large number of 'chosen MACs......', those in the second class use a large number of 'known MACs', and those in the third class require a large number of MAC verifications, but very few known MACS and no chosen MACS. The first class yields both forgery and key-recovery attacks, whereas the second and third classes are key-recovery attacks...... only. Both single-key and two-key variants of 3gpp-MAC are considered; the forgery attacks are relevant to both variants, whereas the key-recovery attacks are only relevant to the two-key variant....

  5. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  6. Take control of troubleshooting your Mac

    CERN Document Server

    Kissell, Joe

    2009-01-01

    Learn how to solve any Mac problem with Joe Kissell's expert advice! We may love our Macs, but they can still suffer significant problems. In this essential guide from best-selling author Joe Kissell, you'll learn 17 basic troubleshooting procedures and how to solve 9 common problems, along with an easy-to-follow way to troubleshoot novel problems. Whether your Mac won't turn on, experiences kernel panics repeatedly, or is glacially slow, this book has the calm, friendly advice you need to find a solution. Following in the footsteps of his critically acclaimed books Take Control of Mac OS X

  7. Teach yourself visually MacBook Pro

    CERN Document Server

    Hart-Davis, Guy

    2014-01-01

    Clear instructions to help visual learners get started with their MacBook Pro Covering all the essential information you need to get up to speed with your MacBook Pro, this new edition provides you with the most up-to-date information on performing everyday tasks quickly and easily. From basics such as powering on or shutting down the MacBook Pro to more advanced tasks such as running Windows applications, this visual guide provides the help and support you need to confidently use your MacBook Pro to its full potential.Empowers you to perform everyday tasks quickly and easilyCovers new hardwa

  8. Take control the Mac OS X lexicon

    CERN Document Server

    Zardetto, Sharon

    2009-01-01

    This ebook explains a little bit of everything; in fact, it's The Mac OS X (and then some) Lexicon because it's never just you and your Mac. It's you and your Mac and the Web, and your email, and that article you just read that threw 17 new acronyms at you or assumed that you knew all sorts of networking terms. Or it's you and your Mac and Finder features you've never touched, such as burn folders, smart folders, or proxy icons, and that mysterious Services submenu. This book is a great guide for Macintosh users everywhere who have trouble keeping up with the latest jargon, fo

  9. Macs all-in-one for dummies

    CERN Document Server

    Hutsko, Joe

    2014-01-01

    Your all-in-one guide to unleashing your Mac's full potential It's a Mac world out there. But if you haven't read the instruction manual, you may be neglecting some of your computer's coolest features. Turn to Macs All-in-One For Dummies' jam-packed guide to access the incredible tools within your computer. With this fully updated reference, you will learn how to use Launchpad and Mission Control; protect your Mac; back up and restore data with Time Machine; sync across devices in iCloud; import, organize, and share photos; direct in iMovie; compose in GarageBand; and so much more. The possi

  10. Quicksilver Power Mac G4

    CERN Multimedia

    2001-01-01

    A new generation with a reworked motherboard is launched on 2001 with however the same Graphite box. It also included a processor speed-bump, and brought the DVD-R "SuperDrive" to the mid-level model. The Quicksilver PowerMac was available in three configurations: The 733 MHz model, with 128 MB of RAM, a 40 GB hard drive, and a CD-RW drive, was 1,699 dollars, the 867 MHz configuration, with 128 MB of RAM, a 60 GB hard drive and a DVD-R drive, was 2,499 dollars, and the high-end dual-800 MHz model, with 256 MB of RAM, an 80 GB hard drive and a DVD-R drive, was 3,499 dollars. The 733 MHz model is the first personal computer to have a DVD burner, named SuperDrive at Apple. The design was updated on 2002 with 800 MHz, 933 MHz and dual 1 GHz configurations, becoming the first Mac to reach 1 GHz.

  11. Life cycle assessment study of a Chinese desktop personal computer.

    Science.gov (United States)

    Duan, Huabo; Eugster, Martin; Hischier, Roland; Streicher-Porte, Martin; Li, Jinhui

    2009-02-15

    Associated with the tremendous prosperity in world electronic information and telecommunication industry, there continues to be an increasing awareness of the environmental impacts related to the accelerating mass production, electricity use, and waste management of electronic and electric products (e-products). China's importance as both a consumer and supplier of e-products has grown at an unprecedented pace in recent decade. Hence, this paper aims to describe the application of life cycle assessment (LCA) to investigate the environmental performance of Chinese e-products from a global level. A desktop personal computer system has been selected to carry out a detailed and modular LCA which follows the ISO 14040 series. The LCA is constructed by SimaPro software version 7.0 and expressed with the Eco-indicator'99 life cycle impact assessment method. For a sensitivity analysis of the overall LCA results, the so-called CML method is used in order to estimate the influence of the choice of the assessment method on the result. Life cycle inventory information is complied by ecoinvent 1.3 databases, combined with literature and field investigations on the present Chinese situation. The established LCA study shows that that the manufacturing and the use of such devices are of the highest environmental importance. In the manufacturing of such devices, the integrated circuits (ICs) and the Liquid Crystal Display (LCD) are those parts contributing most to the impact. As no other aspects are taken into account during the use phase, the impact is due to the way how the electricity is produced. The final process steps--i.e. the end of life phase--lead to a clear environmental benefit if a formal and modern, up-to-date technical system is assumed, like here in this study.

  12. Wound healing in Mac-1 deficient mice.

    Science.gov (United States)

    Chen, Lin; Nagaraja, Sridevi; Zhou, Jian; Zhao, Yan; Fine, David; Mitrophanov, Alexander Y; Reifman, Jaques; DiPietro, Luisa A

    2017-05-01

    Mac-1 (CD11b/CD18) is a macrophage receptor that plays several critical roles in macrophage recruitment and activation. Because macrophages are essential for proper wound healing, the impact of Mac-1 deficiency on wound healing is of significant interest. Prior studies have shown that Mac-1(-/-) mice exhibit deficits in healing, including delayed wound closure in scalp and ear wounds. This study examined whether Mac-1 deficiency influences wound healing in small excisional and incisional skin wounds. Three millimeter diameter full thickness excisional wounds and incisional wounds were prepared on the dorsal skin of Mac-1 deficient (Mac-1(-/-) ) and wild type (WT) mice, and wound healing outcomes were examined. Mac-1 deficient mice exhibited a normal rate of wound closure, generally normal levels of total collagen, and nearly normal synthesis and distribution of collagens I and III. In incisional wounds, wound breaking strength was similar for Mac-1(-/-) and WT mice. Wounds of Mac-1 deficient mice displayed normal total macrophage content, although macrophage phenotype markers were skewed as compared to WT. Interestingly, amounts of TGF-β1 and its downstream signaling molecules, SMAD2 and SMAD3, were significantly decreased in the wounds of Mac-1 deficient mice compared to WT. The results suggest that Mac-1 deficiency has little impact on the healing of small excisional and incisional wounds. Moreover, the findings demonstrate that the effect of single genetic deficiencies on wound healing may markedly differ among wound models. These conclusions have implications for the interpretation of the many prior studies that utilize a single model system to examine wound healing outcomes in genetically deficient mice. © 2017 by the Wound Healing Society.

  13. Scheduling in Desktop Grid Systems: Theoretical Evaluation of Policies & Frameworks

    Directory of Open Access Journals (Sweden)

    Muhammad Khalid Khan

    2017-01-01

    Full Text Available Desktop grid systems have already established their identity in the area of distributed systems. They are well suited for High Throughput Computing especially for Bag-of-Tasks applications. In desktop grid systems, idle processing cycles and memory of millions of users (connected through internet or through any other communication mechanism can be utilized but the workers / hosts machines not under any centralized administrative control that result in high volatility. This issue is countered by applying various types of scheduling policies that not only ensure task assignments to better workers but also takes care of fault tolerance through replication and other mechanism. In this paper, we discussed leading desktop grid systems framework and performed a comparative analysis of these frameworks. We also presented a theoretical evaluation of server and client based scheduling policies and identified key performance indicators to evaluate these policies.

  14. Perception Analysis of Desktop and Mobile Service Website

    Directory of Open Access Journals (Sweden)

    Rizqiyatul Khoiriyah

    2016-12-01

    Full Text Available The research was conducted as a qualitative study of the website to deeper explore and examine the analysis of user perception of desktop and mobile website services. This research reviewed about user perception of desktop and mobile service website used by using qualitative methods adapted to WebQual and User Experience approach. This qualitative research refered to the theoretical reference written by Creswell (2014. The expected outcome is to know the user perceptions of the available services and information in the website along with the possibility of desktop and mobile gap arising from differences in the two services. These results can be used as a service model on the website of the user experience.

  15. A Checkpoint Storage System for Desktop Grid Computing

    CERN Document Server

    Kiswany, Samer Al; Vazhkudai, Sudharshan S

    2007-01-01

    Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. In these environments, a checkpoint storage system can offer multiple benefits: reduce the load on a traditional file system, offer high-performance through specialization, and, finally, optimize checkpoint data management by taking into account application semantics. Such a storage system can present a unifying abstraction to checkpoint operations, while hiding the fact that there are no dedicated resources to store the checkpoint data. This paper presents a dedicated checkpoint storage system for desktop grid environments. Our solution uses scavenged disk space from participating desktops to build an inexpensive storage space, offering a traditional file system interface for easy integration with checkpointing applications. This paper presents the architecture of our checkpoint storage system, key write optimizations for high-speed I/O, support for increme...

  16. Bridging the Gap between Linked Data and the Semantic Desktop

    Science.gov (United States)

    Groza, Tudor; Drăgan, Laura; Handschuh, Siegfried; Decker, Stefan

    The exponential growth of the World Wide Web in the last decade brought an explosion in the information space, which has important consequences also in the area of scientific research. Finding relevant work in a particular field and exploring the links between publications is currently a cumbersome task. Similarly, on the desktop, managing the publications acquired over time can represent a real challenge. Extracting semantic metadata, exploring the linked data cloud and using the semantic desktop for managing personal information represent, in part, solutions for different aspects of the above mentioned issues. In this paper, we propose an innovative approach for bridging these three directions with the overall goal of alleviating the information overload problem burdening early stage researchers. Our application combines harmoniously document engineering-oriented automatic metadata extraction with information expansion and visualization based on linked data, while the resulting documents can be seamlessly integrated into the semantic desktop.

  17. A MAC Mode for Lightweight Block Ciphers

    DEFF Research Database (Denmark)

    Luykx, Atul; Preneel, Bart; Tischhauser, Elmar Wolfgang;

    2016-01-01

    , but also allows high-performance parallel implementations. We highlight this in a comprehensive implementation study, instantiating LightMAC with PRESENT and the AES. Moreover, LightMAC allows flexible trade-offs between rate and maximum message length. Unlike PMAC and its many derivatives, Light...

  18. MAC-awake of sevoflurane in children.

    Science.gov (United States)

    Davidson, Andrew J; Wong, Aaron; Knottenbelt, Graham; Sheppard, Suzette; Donath, Susan; Frawley, Geoff

    2008-08-01

    Age influences the potency of anesthetic agents, but there is little information on how age influences MAC-awake. MAC-awake may be an important aspect of anesthesia potency for the prevention of awareness during anesthesia. The aim of this study was to measure MAC-awake in a range of ages in children. After institutional ethics approval and informed parental consent 60 children were enrolled; 20 in each of three age groups (2 to awake. The Dixon up-down method was used to determine progression of subsequent concentrations and MAC-awake (ED50) for the three age groups were obtained using the probit model. This study found evidence for a difference in ED50 between age groups (P = 0.008). The MAC-awake was highest in the youngest group (0.66%) and similar in the older groups (0.45% and 0.43%). Although MAC-awake changes with age, in the ages where awareness has been reported, MAC-awake was found to be relatively low, and therefore it seems unlikely that age-specific changes to MAC-awake are a cause for awareness in children aged 5-12 years.

  19. Nomogram to estimate age-related MAC.

    NARCIS (Netherlands)

    Lerou, J.G.C.

    2004-01-01

    BACKGROUND: In clinical practice it is difficult to estimate rapidly two important values: (i) the total age-corrected MAC multiple from measured end-expired concentrations of volatile agent and nitrous oxide; (ii) the end-expired concentration of volatile agent needed to obtain a given total MAC

  20. VLA-MAC: A Variable Load Adaptive MAC Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Yao, Guoliang; Liu, Hao; Chen, Hao; Shi, Longxin

    This letter presents VLA-MAC, a novel adaptive MAC protocol for wireless sensor networks that can achieve high energy efficiency and low latency in variable load conditions. In VLA-MAC, traffic load is measured online and utilized for adaptive adjustment. VLA-MAC transmits packets via a burst style to alleviate packets accumulation problem and achieve low latency in high load condition. Furthermore, it also saves obvious energy by removing unnecessary listen period in low load condition. Unlike current approach, VLA-MAC does not need to adjust duty-cycle according to load online. Simulation results based on ns-2 show the performance improvements of our protocol.

  1. Design of All Digital Flight Program Training Desktop Application System

    Directory of Open Access Journals (Sweden)

    Li Yu

    2017-01-01

    Full Text Available All digital flight program training desktop application system operating conditions are simple. Can make the aircraft aircrew learning theory and operation training closely. Improve the training efficiency and effectiveness. This paper studies the application field and design requirements of flight program training system. Based on the WINDOWS operating system desktop application, the design idea and system architecture of the all digital flight program training system are put forward. Flight characteristics, key airborne systems and aircraft cockpit are simulated. Finally, By comparing flight training simulator and the specific script program training system, The characteristics and advantages of the training system are analyzed in this paper.

  2. Simulation of scanning transmission electron microscope images on desktop computers

    Energy Technology Data Exchange (ETDEWEB)

    Dwyer, C., E-mail: christian.dwyer@mcem.monash.edu.au [Monash Centre for Electron Microscopy, Department of Materials Engineering, Monash University, Victoria 3800 (Australia)

    2010-02-15

    Two independent strategies are presented for reducing the computation time of multislice simulations of scanning transmission electron microscope (STEM) images: (1) optimal probe sampling, and (2) the use of desktop graphics processing units. The first strategy is applicable to STEM images generated by elastic and/or inelastic scattering, and requires minimal effort for its implementation. Used together, these two strategies can reduce typical computation times from days to hours, allowing practical simulation of STEM images of general atomic structures on a desktop computer.

  3. An Introduction to Version Control Using GitHub Desktop

    Directory of Open Access Journals (Sweden)

    Daniel van Strien

    2016-06-01

    Full Text Available In this lesson you will be introduced to the basics of version control, understand why it is useful and implement basic version control for a plain text document using GitHub Desktop. By the end of this lesson you should understand: * what version control is and why it can be useful * the differences between Git and GitHub * how to implement version control using ‘GitHub Desktop,’ a Graphical User Interface for GitHub * be aware of other resources that will help you implement version control in your academic writing

  4. Desktop calibration of automatic transmission for passenger vehicle

    Institute of Scientific and Technical Information of China (English)

    FANG Chi; SHI Jian-peng; WANG Jun

    2014-01-01

    Desktop calibration of automatic transmission (AT) is a method which can reduce cost, enhance efficiency and shorten the development periods of a vehicle effectively. We primary introduced the principle and approach of desktop calibration of AT based on the condition of coupling characteristics between engine and torque converter and obtained right point exactly. It is shown to agree with experimental measurements reasonably well. It was used in different applications abroad based on AT technology and achieved a good performance of the vehicle compared with traditional AT technology which primary focuses on the drivability, performance and fuel consumption.

  5. An Introduction to Version Control Using GitHub Desktop

    OpenAIRE

    Daniel van Strien

    2016-01-01

    In this lesson you will be introduced to the basics of version control, understand why it is useful and implement basic version control for a plain text document using GitHub Desktop. By the end of this lesson you should understand: * what version control is and why it can be useful * the differences between Git and GitHub * how to implement version control using ‘GitHub Desktop,’ a Graphical User Interface for GitHub * be aware of other resources that will help you imple...

  6. AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Ge Ma

    2009-07-01

    Full Text Available Designing low energy consumption, high efficiency Media Access Control (MAC protocols are one ofthe most important directions in wireless sensor networks (WSN. In this paper, we proposed a newcontention reserve MAC protocol, named CRMAC, under the inspiration of IEEE 802.15.4’s superframestructure. CRMAC is a MAC protocol suitable for intra-cluster WSN that combines the advantages ofcontention and schedule-based MAC protocols. We introduce the mechanism and superframe structure ofCRMAC in detail and verified the performance of this protocol through simulations. Our results showthat CRMAC performs better than IEEE 802.15.4 in energy consumption, system delay and networkthroughput. CRMAC is especially suitable for short packet transmission under low load networks, whichis the main situation in WSN.

  7. MedlinePlus® Everywhere: Access from Your Phone, Tablet or Desktop

    Science.gov (United States)

    ... gov/responsivefull.html MedlinePlus® Everywhere: Access from Your Phone, Tablet or Desktop To use the sharing features ... consistent user experience from a desktop, tablet, or phone. All users, regardless of how they access MedlinePlus, ...

  8. Versatile Desktop Experiment Module (DEMo) on Heat Transfer

    Science.gov (United States)

    Minerick, Adrienne R.

    2010-01-01

    This paper outlines a new Desktop Experiment Module (DEMo) engineered for a chemical engineering junior-level Heat Transfer course. This new DEMo learning tool is versatile, fairly inexpensive, and portable such that it can be positioned on student desks throughout a classroom. The DEMo system can illustrate conduction of various materials,…

  9. Using Desktop Virtual Environments To Investigate the Role of Landmarks.

    Science.gov (United States)

    Jansen-Osmann, Petra

    2002-01-01

    Discusses research in spatial cognition that uses computer-simulated three dimensional environments and evaluates the use of virtual desktop environments by replicating an experiment which was formerly done in a laboratory or real world setting. Investigates the role of landmarks when acquiring route knowledge in a system of paths. (Author/LRW)

  10. Advances in parallel computer technology for desktop atmospheric dispersion models

    Energy Technology Data Exchange (ETDEWEB)

    Bian, X.; Ionescu-Niscov, S.; Fast, J.D. [Pacific Northwest National Lab., Richland, WA (United States); Allwine, K.J. [Allwine Enviornmental Serv., Richland, WA (United States)

    1996-12-31

    Desktop models are those models used by analysts with varied backgrounds, for performing, for example, air quality assessment and emergency response activities. These models must be robust, well documented, have minimal and well controlled user inputs, and have clear outputs. Existing coarse-grained parallel computers can provide significant increases in computation speed in desktop atmospheric dispersion modeling without considerable increases in hardware cost. This increased speed will allow for significant improvements to be made in the scientific foundations of these applied models, in the form of more advanced diffusion schemes and better representation of the wind and turbulence fields. This is especially attractive for emergency response applications where speed and accuracy are of utmost importance. This paper describes one particular application of coarse-grained parallel computer technology to a desktop complex terrain atmospheric dispersion modeling system. By comparing performance characteristics of the coarse-grained parallel version of the model with the single-processor version, we will demonstrate that applying coarse-grained parallel computer technology to desktop atmospheric dispersion modeling systems will allow us to address critical issues facing future requirements of this class of dispersion models.

  11. Perancangan Sistem Otomatis Update Pada Aplikasi Desktop Abios

    Directory of Open Access Journals (Sweden)

    Karto Iskandar

    2010-12-01

    Full Text Available Unlike web applications easier to update the latest version, desktop applications more difficult and must involve the user in doing so. It is caused by a desktop application is an application that is installed in the computer user. The purpose of this research is to design an automatic system updates on a desktop application, an example case: Application Binus International Operational Support (ABIOS. This research used literature study and system design. In desktop applications, often there is update the latest applications that are not known to the user who sometimes fatal and disrupt business operations. Generally, developer will inform the changes version to user that they can update the application. In an update of applications, should be done by the system automatically, not manually by users. Once in a while, the user background is not from computer base. After doing the research, it can be concluded that the system automatically updates the application has benefits to users in obtaining information regarding the latest version, and can assist in automatically update the latest application is based on computerization. For further development of this system is expected to operate on multi platforms and or mobile applications. 

  12. Evaluation and Customization of Different Open Source Desktop GIS Software

    Institute of Scientific and Technical Information of China (English)

    QIU Ruqiong; LI Bing

    2012-01-01

    This paper gave a general evaluation on existing three popular free and open source desktop GIS projects,according to the selected evaluation criteria.To further the understanding of the open source software,this paper also presented a customization example of QGIS with python and PyQT.

  13. Creative Computer Detective: The Basics of Teaching Desktop Publishing.

    Science.gov (United States)

    Slothower, Jodie

    Teaching desktop publishing (dtp) in college journalism classes is most effective when the instructor integrates into specific courses four types of software--a word processor, a draw program, a paint program and a layout program. In a course on design and layout, the instructor can demonstrate with the computer how good design can be created and…

  14. A Desktop Virtual Reality Earth Motion System in Astronomy Education

    Science.gov (United States)

    Chen, Chih Hung; Yang, Jie Chi; Shen, Sarah; Jeng, Ming Chang

    2007-01-01

    In this study, a desktop virtual reality earth motion system (DVREMS) is designed and developed to be applied in the classroom. The system is implemented to assist elementary school students to clarify earth motion concepts using virtual reality principles. A study was conducted to observe the influences of the proposed system in learning.…

  15. Designing for Communication: The Key to Successful Desktop Publishing.

    Science.gov (United States)

    McCain, Ted D. E.

    Written for those who are new to design and page layout, this book focuses on providing novice desktop publishers with an understanding of communication, graphic design, typography, page layout, and page layout techniques. The book also discusses how people read, design as a consequence of understanding, and the principles of page layout. Chapters…

  16. Author Details

    African Journals Online (AJOL)

    Journal Home > Advanced Search > Author Details ... Intra‑Operative Airway Management in Patients with Maxillofacial Trauma having Reduction and ... Clinical Parameters and Challenges of Managing Cervicofacial Necrotizing Fasciitis in a ...

  17. Author Details

    African Journals Online (AJOL)

    Journal Home > Advanced Search > Author Details. Log in or ... Difficult airway management in a patient with giant malignant goitre scheduled for thyroidectomy - case report ... Airway Management Dilemma in a Patient with Maxillofacial Injury

  18. Author Details

    African Journals Online (AJOL)

    Journal Home > Advanced Search > Author Details ... Sequencing for Batch Production in a Group Flowline Machine Shop ... Sampling Plans for Monitoring Quality Control Process at a Plastic Manufacturing Firm in Nigeria: A Case Study

  19. VMware Horizon View 6 desktop virtualization cookbook

    CERN Document Server

    Ventresco, Jason

    2014-01-01

    If you want a more detailed explanation concerning the implementation of several different core features of VMware Horizon View, this is the book for you. Whether you are new to VMware Horizon View or an existing user, this book will provide you with the knowledge you need to successfully deploy several core features and get introduced to the latest features of version 6.0 as well.

  20. Comparison of CSMA based MAC protocols of wireless sensor networks

    CERN Document Server

    singh, Himanshu

    2012-01-01

    Energy conservation has been an important area of interest in Wireless Sensor networks (WSNs). Medium Access Control (MAC) protocols play an important role in energy conservation. In this paper, we describe CSMA based MAC protocols for WSN and analyze the simulation results of these protocols. We implemented S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator which unlike other simulators simulates the same code running on real hardware. Previous surveys mainly focused on the classification of MAC protocols according to the techniques being used or problem dealt with and presented a theoretical evaluation of protocols. This paper presents the comparative study of CSMA based protocols for WSNs, showing which MAC protocol is suitable in a particular environment and supports the arguments with the simulation results. The comparative study can be used to find the best suited MAC protocol for wireless sensor networks in different environments.

  1. Mac OS X for Unix Geeks (Leopard)

    CERN Document Server

    Rothman, Ernest E; Rosen, Rich

    2009-01-01

    If you've been lured to Mac OS X because of its Unix roots, this invaluable book serves as a bridge between Apple's Darwin OS and the more traditional Unix systems. The new edition offers a complete tour of Mac OS X's Unix shell for Leopard and Tiger, and helps you find the facilities that replace or correspond to standard Unix utilities. Learn how to compile code, link to libraries, and port Unix software to Mac OS X and much more with this concise guide.

  2. Mac OS X Lion portable genius

    CERN Document Server

    Spivey, Dwight

    2012-01-01

    Two e-books, Mac OS X Lion Portable Genius and MacBook Pro Portable Genius, Third Edition, bundled in one package Books in the Portable Genius series provide readers with the most accessible, useful information possible, including plenty of tips and techniques for the most-used features in a product or software. These e-books will show you what you may not find out by just working with your MacBook Pro and OS X Lion. Genius icons present smart or innovative ways to do something, saving time and hassle. Easy-to-find information gives you the essentials plus insightful tips on how to navigate

  3. Office 2008 for Mac for dummies

    CERN Document Server

    LeVitus, Bob

    2013-01-01

    Office 2008 for Mac is here, with great new enhancements to all your favorite office productivity tools. Who better than "Dr. Mac, "Bob LeVitus, to show you how to load and use them all? From choosing the best version for your needs to managing your life with your online calendar, Office 2008 For Mac For Dummies covers what you need to know. It compares the Student/Teacher Edition, Standard Edition, and Professional Edition, then walks you through installing your preferred version and keeping it up to date. You'll find out all the things you can do with Word, Excel, PowerPoint, and Entourage,

  4. Wireless sensors networks MAC protocols analysis

    CERN Document Server

    Chaari, Lamia

    2010-01-01

    Wireless sensors networks performance are strictly related to the medium access mechanism. An effective one, require non-conventional paradigms for protocol design due to several constraints. An adequate equilibrium between communication improvement and data processing capabilities must be accomplished. To achieve low power operation, several MAC protocols already proposed for WSN. The aim of this paper is to survey and to analyze the most energy efficient MAC protocol in order to categorize them and to compare their performances. Furthermore we have implemented some of WSN MAC protocol under OMNET++ with the purpose to evaluate their performances.

  5. Beginning Mac OS X Snow Leopard programming

    CERN Document Server

    Trent, Michael

    2010-01-01

    Michael Trent is a technical reviewer for numerous books and magazine articles and the coauthor of Beginning Mac OS X Programming with Drew McCormack. Drew McCormack is an experienced computational scientist, founder of the ""The Mental Faculty""-an independent company developing software for the Mac and iPhone-and the coauthor of Beginning Mac OS X Programming with Michael Trent. Wrox Beginning guides are crafted to make learning programming languages and technologies easier than you think, providing a structured, tutorial format that will guide you through all the techniques involved.

  6. Learn Office 2011 for Mac OS X

    CERN Document Server

    Hart-Davis, Guy

    2011-01-01

    Office for Mac remains the leading productivity suite for Mac, with Apple's iWork and the free OpenOffice.org trailing far behind. And now it's being updated with a cleaner interface and more compatibility with Exchange and SharePoint. Learn Office 2011 for Mac OS X offers a practical, hands-on approach to using Office 2011 applications to create and edit documents and get work done efficiently. You'll learn how to customize Office, design, create, and share documents, manipulate data in a spreadsheet, and create lively presentations. You'll also discover how to organize your email, contacts,

  7. Desktop Publishing: Organizational Considerations for Adoption and Implementation. TDC Research Report No. 6.

    Science.gov (United States)

    Lee, Paul

    This report explores the implementation of desktop publishing in the Minnesota Extension Service (MES) and provides a framework for its implementation in other organizations. The document begins with historical background on the development of desktop publishing. Criteria for deciding whether to purchase a desktop publishing system, advantages and…

  8. MAC Layer Hurdles in BSNs

    CERN Document Server

    Ullah, Sana; Choi, Young-Woo; Lee, Hyung-Soo; Kwak, Kyung Sup

    2009-01-01

    The last few decades have seen considerable research progress in microelectronics and integrated circuits, system-on-chip design, wireless communication, and sensor technology. This progress has enabled the seamless integration of autonomous wireless sensor nodes around a human body to create a Body Sensor Network (BSN). The development of a proactive and ambulatory BSN induces a number of enormous issues and challenges. This paper presents the technical hurdles during the design and implementation of a low-power Medium Access Control (MAC) protocol for in-body and on-body sensor networks. We analyze the performance of IEEE 802.15.4 protocol for the on-body sensor network. We also provide a comprehensive insight into the heterogeneous characteristics of the in-body sensor network. A low-power technique called Pattern-Based Wake-up Table is proposed to handle the normal traffic in a BSN. The proposed technique provides a reliable solution towards low-power communication in the in-body sensor network.

  9. CR-MAC: A multichannel MAC protocol for cognitive radio ad hoc networks

    CERN Document Server

    Kamruzzaman, S M

    2010-01-01

    This paper proposes a cross-layer based cognitive radio multichannel medium access control (MAC) protocol with TDMA, which integrate the spectrum sensing at physical (PHY) layer and the packet scheduling at MAC layer, for the ad hoc wireless networks. The IEEE 802.11 standard allows for the use of multiple channels available at the PHY layer, but its MAC protocol is designed only for a single channel. A single channel MAC protocol does not work well in a multichannel environment, because of the multichannel hidden terminal problem. Our proposed protocol enables secondary users (SUs) to utilize multiple channels by switching channels dynamically, thus increasing network throughput. In our proposed protocol, each SU is equipped with only one spectrum agile transceiver, but solves the multichannel hidden terminal problem using temporal synchronization. The proposed cognitive radio MAC (CR-MAC) protocol allows SUs to identify and use the unused frequency spectrum in a way that constrains the level of interference...

  10. H-MAC: A Hybrid MAC Protocol for Wireless Sensor Networks

    CERN Document Server

    Mehta, S; 10.5121/ijcnc.2010.2208

    2010-01-01

    In this paper, we propose a hybrid medium access control protocol (H-MAC) for wireless sensor networks. It is based on the IEEE 802.11's power saving mechanism (PSM) and slotted aloha, and utilizes multiple slots dynamically to improve performance. Existing MAC protocols for sensor networks reduce energy consumptions by introducing variation in an active/sleep mechanism. But they may not provide energy efficiency in varying traffic conditions as well as they did not address Quality of Service (QoS) issues. H-MAC, the propose MAC protocol maintains energy efficiency as well as QoS issues like latency, throughput, and channel utilization. Our numerical results show that H-MAC has significant improvements in QoS parameters than the existing MAC protocols for sensor networks while consuming comparable amount of energy.

  11. Learn Mac OS X Snow Leopard

    CERN Document Server

    Meyers, Scott

    2009-01-01

    You're smart and savvy, but also busy. This comprehensive guide to Apple's Mac OS X 10.6, Snow Leopard, gives you everything you need to know to live a happy, productive Mac life. Learn Mac OS X Snow Leopard will have you up and connected lickity split. With a minimum of overhead and a maximum of useful information, you'll cover a lot of ground in the time it takes other books to get you plugged in. If this isn't your first experience with Mac OS X, skip right to the "What's New in Snow Leopard" sections. You may also find yourself using this book as a quick refresher course or a way

  12. Macintosh Troubleshooting Pocket Guide for Mac OS

    CERN Document Server

    Lerner, David; Corporation, Tekserve

    2009-01-01

    The Macintosh Troubleshooting Pocket Guide covers the most common user hardware and software trouble. It's not just a book for Mac OS X (although it includes tips for OS X and Jaguar), it's for anyone who owns a Mac of any type-- there are software tips going back as far as OS 6. This slim guide distills the answers to the urgent questions that Tekserve's employee's answer every week into a handy guide that fits in your back pocket or alongside your keyboard.

  13. Enhanced Sleep Mode MAC Control for EPON

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars

    2011-01-01

    This paper introduces sleep mode operations for EPON. New MAC control functions are proposed to schedule sleep periods. Traffic profiles are considered to optimize energy efficiency and network performances. Simulation results are analyzed in OPNET modeler.......This paper introduces sleep mode operations for EPON. New MAC control functions are proposed to schedule sleep periods. Traffic profiles are considered to optimize energy efficiency and network performances. Simulation results are analyzed in OPNET modeler....

  14. FEASIBILITY OF DESKTOP VIRTUALIZATION PER SOFTWARE SERVICES AND LOCAL HARDWARE BASED ON THE NETWORK THROUGHPUT

    Directory of Open Access Journals (Sweden)

    Vitor Chaves De Oliveira

    2013-01-01

    Full Text Available In recent years, virtualization computing has become a worldwide reality present in datacenters servers of most organizations. The motivations for the use of this solution are focused primarily on cost reduction and increases in availability, integrity and security of data. Based on these benefits, recently it was started the use of this technology for personal computers as well. That is, for desktops, giving birth to the so-called desktop virtualization. Given the technical advantages of the approach, its growth has been so significant that, before 2014, it is expected to be present in over 90% of organizations. However, this new method is completely based on a physical client-server architecture, which increases the importance of the communication network that makes this technique possible. Therefore, analyzing the network in order to investigate the effects according to the environment implemented becomes crucial. In this study it’s varied the local’s client hardware and the application, i.e., the service used. The purpose was to detail their effects on computer networks in a Quality of Service (QoS parameter, throughput. Secondarily are outlined perceptions regarding the Quality of Experience (QoE? This culminated in an assessment that traces the feasibility for applying this technology.

  15. 42 CFR 405.1120 - Filing briefs with the MAC.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Filing briefs with the MAC. 405.1120 Section 405....1120 Filing briefs with the MAC. Upon request, the MAC will give the party requesting review, as well... ending with the date the brief is received by the MAC will not be counted toward the adjudication...

  16. 42 CFR 423.1974 - Medicare Appeals Council (MAC) review.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Medicare Appeals Council (MAC) review. 423.1974..., MAC review, and Judicial Review § 423.1974 Medicare Appeals Council (MAC) review. An enrollee who is dissatisfied with an ALJ hearing decision may request that the MAC review the ALJ's decision or dismissal as...

  17. 42 CFR 423.2130 - Effect of the MAC's decision.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Effect of the MAC's decision. 423.2130 Section 423... (CONTINUED) MEDICARE PROGRAM VOLUNTARY MEDICARE PRESCRIPTION DRUG BENEFIT Reopening, ALJ Hearings, MAC review, and Judicial Review § 423.2130 Effect of the MAC's decision. The MAC's decision is final and binding...

  18. 42 CFR 405.1130 - Effect of the MAC's decision.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Effect of the MAC's decision. 405.1130 Section 405....1130 Effect of the MAC's decision. The MAC's decision is final and binding on all parties unless a Federal district court issues a decision modifying the MAC's decision or the decision is revised as the...

  19. 42 CFR 423.2118 - Obtaining evidence from the MAC.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Obtaining evidence from the MAC. 423.2118 Section..., MAC review, and Judicial Review § 423.2118 Obtaining evidence from the MAC. An enrollee may request... the costs of providing these items. If an enrollee requests evidence from the MAC and an opportunity...

  20. 42 CFR 423.2126 - Case remanded by the MAC.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Case remanded by the MAC. 423.2126 Section 423.2126... (CONTINUED) MEDICARE PROGRAM VOLUNTARY MEDICARE PRESCRIPTION DRUG BENEFIT Reopening, ALJ Hearings, MAC review, and Judicial Review § 423.2126 Case remanded by the MAC. (a) When the MAC may remand a case to the ALJ...

  1. 42 CFR 423.2120 - Filing briefs with the MAC.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Filing briefs with the MAC. 423.2120 Section 423... (CONTINUED) MEDICARE PROGRAM VOLUNTARY MEDICARE PRESCRIPTION DRUG BENEFIT Reopening, ALJ Hearings, MAC review, and Judicial Review § 423.2120 Filing briefs with the MAC. Upon request, the MAC will give the...

  2. Comparing Web Applications with Desktop Applications: An Empirical Study

    DEFF Research Database (Denmark)

    Pop, Paul

    2002-01-01

    In recent years, many desktop applications have been ported to the world wide web in order to reduce (multiplatform) development, distribution and maintenance costs. However, there is little data concerning the usability of web applications, and the impact of their usability on the total cost...... of developing and using such applications. In this paper we present a comparison of web and desktop applications from the usability point of view. The comparison is based on an empirical study that investigates the performance of a group of users on two calendaring applications: Yahoo!Calendar and Microsoft...... Calendar. The study shows that in the case of web applications the performance of the users is significantly reduced, mainly because of the restricted interaction mechanisms provided by current web browsers....

  3. Comparing Web Applications with Desktop Applications: An Empirical Study

    DEFF Research Database (Denmark)

    Pop, Paul

    2002-01-01

    of developing and using such applications. In this paper we present a comparison of web and desktop applications from the usability point of view. The comparison is based on an empirical study that investigates the performance of a group of users on two calendaring applications: Yahoo!Calendar and Microsoft...... Calendar. The study shows that in the case of web applications the performance of the users is significantly reduced, mainly because of the restricted interaction mechanisms provided by current web browsers.......In recent years, many desktop applications have been ported to the world wide web in order to reduce (multiplatform) development, distribution and maintenance costs. However, there is little data concerning the usability of web applications, and the impact of their usability on the total cost...

  4. Online behavior from desktop and mobile devices are connected

    OpenAIRE

    Nylander, Stina

    2010-01-01

    Cell phones and other mobile devices are used to access the Internet even at home and at work where computers are easily available. They are no longer a mere backup to the computer. This means that it makes little sense to study Internet access from mobile devices separate from other Internet access. We need new methods that encompass online behavior from desktop computers and mobile devices as well as stationary and mobile online behavior.

  5. Direct Desktop Printed-Circuits-on-Paper Flexible Electronics

    OpenAIRE

    Yi Zheng; Zhizhu He; Yunxia Gao; Jing Liu

    2013-01-01

    There currently lacks of a way to directly write out electronics, just like printing pictures on paper by an office printer. Here we show a desktop printing of flexible circuits on paper via developing liquid metal ink and related working mechanisms. Through modifying adhesion of the ink, overcoming its high surface tension by dispensing machine and designing a brush like porous pinhead for printing alloy and identifying matched substrate materials among different papers, the slightly oxidize...

  6. SA-MAC:Self-Stabilizing Adaptive MAC Protocol for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    波澄; 韩君泽; 李向阳; 王昱; 肖波

    2014-01-01

    A common method of prolonging the lifetime of wireless sensor networks is to use low power duty cycling protocol. Existing protocols consist of two categories: sender-initiated and receiver-initiated. In this paper, we present SA-MAC, a self-stabilizing adaptive MAC protocol for wireless sensor networks. SA-MAC dynamically adjusts the transmission time-slot, waking up time-slot, and packet detection pattern according to current network working condition, such as packet length and wake-up patterns of neighboring nodes. In the long run, every sensor node will find its own transmission phase so that the network will enter a stable stage when the network load and qualities are static. We conduct extensive experiments to evaluate the energy consumption, packet reception rate of SA-MAC in real sensor networking systems. Our results indicate that SA-MAC outperforms other existing protocols.

  7. Mac OS X Snow Leopard试用

    Institute of Scientific and Technical Information of China (English)

    大大

    2009-01-01

    苹果新一代操作系统Mac OS X 10.6 Snow Leopard(雪豹)于8月底上市。根据NPD集团的统计数据,该系统在美国市场前两周的销售非常喜人,是2007年Mac OS X 10.5 Leopard上市销量的2倍以上,是2005年的Mac OS X 10.4 Tiger操作系统的售量的4倍。假如你也对升级价格仅需88元雪豹系统感兴趣,就让我们从一起升级安装开始,体验它独特的魅力。

  8. MacBook Pro Portable Genius

    CERN Document Server

    Miser, Brad

    2011-01-01

    Tips and techniques for forward-thinking MacBook Pro users Now that you have a MacBook Pro, you need just one more accessory, your very own copy of MacBook Pro Portable Genius, Third Edition. This handy, compact book lets you in on a wealth of tips and tricks, so you get the very most out of Apple's very popular notebook. Discover the latest on the most recent release of iLife, get the skinny on the new Intel Core i7 and i5 processors in the Pro, see how to go wireless in a smart way, and much more. The book is easy to navigate, doesn't skimp on the essentials, and helps you save time and avoi

  9. MAC2: A Multi-Hop Adaptive MAC Protocol with Packet Concatenation for Wireless Sensor Networks

    Science.gov (United States)

    Nguyen, Kien; Meis, Ulrich; Ji, Yusheng

    Wireless sensor network MAC protocols switch radios off periodically, employing the so-called duty cycle mechanism, in order to conserve battery power that would otherwise be wasted by energy-costly idle listening. In order to minimize the various negative side-effects of the original scheme, especially on latency and throughput, various improvements have been proposed. In this paper, we introduce a new MAC protocol called MAC2(Multi-hop Adaptive with packet Concatenation-MAC) which combines three promising techniques into one protocol. Firstly, the idea to forward packets over multiple hops within one operational cycle as initially introduced in RMAC. Secondly, an adaptive method that adjusts the listening period according to traffic load minimizing idle listening. Thirdly, a packet concatenation scheme that not only increases throughput but also reduces power consumption that would otherwise be incurred by additional control packets. Furthermore, MAC2 incorporates the idea of scheduling data transmissions with minimum latency, thereby performing packet concatenation together with the multi-hop transmission mechanism in a most efficient way. We evaluated MAC2 using the prominent network simulator ns-2 and the results show that our protocol can outperform DW-MAC — a state of the art protocol both in terms of energy efficiency and throughput.

  10. Gigabits to the Desktop: Installing tomorrow`s networks today

    Energy Technology Data Exchange (ETDEWEB)

    Kuhfuss, T.C.; Phillips, P.T.

    1994-03-01

    Argonne is one of the US Department of Energy`s world class research institutions. Leading edge computing tools and networks allow Argonne to maintain and enhance this reputation. One current effort to deploy leading edge tools is the Argonne ``Gigabits to the Desktop`` project. While the delivering and using gigabits to the desktop is little more than a hope at this time, this paper will discuss the hurdles to achieving it and how to tear down as many hurdles as possible. Under this project, four distinct areas are being investigated and enhanced. This paper will discuss briefly the applications and tools that we see driving the requirement for gigabits to the desktop. It will touch on a functional description of our``ideal`` workstations, architectures and the candidates for the next generation network capable of delivering gigabits. Lastly, it will provide an in-depth analysis of physical layer options and attempt to prove that this area, while the least risky, must be done properly, with the proper media. This paper assumes one important point. It assumes that bandwidth is essentially free. We will discuss network architectures and physical installation recommendations which have a fixed cost. However on a campus, there is no marginal cost for additional packets on these networks once the network infrastructure is installed. This point is important when extrapolating our conclusions to the wide area. The marginal cost of a packet sent to a commercial network is usually non zero. This fact may prove to be a great hindrance in migrating the applications mentioned beyond the organizational boundaries.

  11. Desktop computer graphics for RMS/payload handling flight design

    Science.gov (United States)

    Homan, D. J.

    1984-01-01

    A computer program, the Multi-Adaptive Drawings, Renderings and Similitudes (MADRAS) program, is discussed. The modeling program, written for a desktop computer system (the Hewlett-Packard 9845/C), is written in BASIC and uses modular construction of objects while generating both wire-frame and hidden-line drawings from any viewpoint. The dimensions and placement of objects are user definable. Once the hidden-line calculations are made for a particular viewpoint, the viewpoint may be rotated in pan, tilt, and roll without further hidden-line calculations. The use and results of this program are discussed.

  12. Effective Web and Desktop Retrieval with Enhanced Semantic Spaces

    Science.gov (United States)

    Daoud, Amjad M.

    We describe the design and implementation of the NETBOOK prototype system for collecting, structuring and efficiently creating semantic vectors for concepts, noun phrases, and documents from a corpus of free full text ebooks available on the World Wide Web. Automatic generation of concept maps from correlated index terms and extracted noun phrases are used to build a powerful conceptual index of individual pages. To ensure scalabilty of our system, dimension reduction is performed using Random Projection [13]. Furthermore, we present a complete evaluation of the relative effectiveness of the NETBOOK system versus the Google Desktop [8].

  13. Efficient Sustainable Operation Mechanism of Distributed Desktop Integration Storage Based on Virtualization with Ubiquitous Computing

    Directory of Open Access Journals (Sweden)

    Hyun-Woo Kim

    2015-06-01

    Full Text Available Following the rapid growth of ubiquitous computing, many jobs that were previously manual have now been automated. This automation has increased the amount of time available for leisure; diverse services are now being developed for this leisure time. In addition, the development of small and portable devices like smartphones, diverse Internet services can be used regardless of time and place. Studies regarding diverse virtualization are currently in progress. These studies aim to determine ways to efficiently store and process the big data generated by the multitude of devices and services in use. One topic of such studies is desktop storage virtualization, which integrates distributed desktop resources and provides these resources to users to integrate into distributed legacy desktops via virtualization. In the case of desktop storage virtualization, high availability of virtualization is necessary and important for providing reliability to users. Studies regarding hierarchical structures and resource integration are currently in progress. These studies aim to create efficient data distribution and storage for distributed desktops based on resource integration environments. However, studies regarding efficient responses to server faults occurring in desktop-based resource integration environments have been insufficient. This paper proposes a mechanism for the sustainable operation of desktop storage (SODS for high operational availability. It allows for the easy addition and removal of desktops in desktop-based integration environments. It also activates alternative servers when a fault occurs within a system.

  14. Results from the MAC Vertex chamber

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, H.N.

    1987-05-01

    The design, construction, and performance characteristics of a high precision gaseous drift chamber made of thin walled proportional tubes are described. The device achieved an average spatial resolution of 45 ..mu..m in use for physics analysis with the MAC detector. The B-lifetime result obtained with this chamber is discussed.

  15. MacIntyre, Managerialism and Universities

    Science.gov (United States)

    Stolz, Steven A.

    2017-01-01

    MacIntyre's earlier work and concern with social science enquiry not only exposes its limits, but also provides an insight into how its knowledge claims have been put to ideological use. He maintains that the institutional embodiment of these ideological ideas is the bureaucratic manager who has had a negative role to play in social structures…

  16. The Virtual Desktop: Options and Challenges in Selecting a Secure Desktop Infrastructure Based on Virtualization

    Science.gov (United States)

    2011-10-01

    specific models of devices. Details of the policy restrictions that can be placed on virtual images are product specific. As an example, the policies...DRDC-VALCARTIER- ECR -2004-232, External Client Report, September 2004. [8] Wikipedia, Comparison of open source and closed source, http...required. Identifiers, such as equipment model designation, trade name, military project code name, geographic location may also be included. If possible

  17. AH-MAC: Adaptive Hierarchical MAC Protocol for Low-Rate Wireless Sensor Network Applications

    Directory of Open Access Journals (Sweden)

    Adnan Ismail Al-Sulaifanie

    2017-01-01

    Full Text Available This paper proposes an adaptive hierarchical MAC protocol (AH-MAC with cross-layer optimization for low-rate and large-scale wireless sensor networks. The main goal of the proposed protocol is to combine the strengths of LEACH and IEEE 802.15.4 while offsetting their weaknesses. The predetermined cluster heads are supported with an energy harvesting circuit, while the normal nodes are battery-operated. To prolong the network’s operational lifetime, the proposed protocol transfers most of the network’s activities to the cluster heads while minimizing the node’s activity. Some of the main features of this protocol include energy efficiency, self-configurability, scalability, and self-healing. The simulation results showed great improvement of the AH-MAC over LEACH protocol in terms of energy consumption and throughput. AH-MAC consumes eight times less energy while improving throughput via acknowledgment support.

  18. CA-MAC: A Novel MAC Protocol to Alleviate Congestion in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    WU, J.

    2013-11-01

    Full Text Available Even if the traffic pattern is known and the network topology is simple, a strong congestion can take place in wireless sensor networks (WSNs due to the data gathering effect and the duty-cycle operation. In this paper, we propose a novel medium access control (MAC protocol to alleviate the congestion, which is referred to as the congestion alleviation-MAC (CA-MAC. It adopts an adaptive contention window (ACW, which allows the nodes with more buffered packets to transmit with a higher probability, as well as an intelligent burst packet transmission when the congested nodes seize the channel. Simulations are performed in NS-2, and results show that the proposed CA-MAC protocol achieves a good performance in terms of the packet delivery ratio (PDR, power consumption, throughput, and average latency.

  19. Exposure histories of lunar meteorites: ALHA81005, MAC88104, MAC88105, and Y791197

    Energy Technology Data Exchange (ETDEWEB)

    Nishiizumi, K.; Arnold, J.R. (Univ. of California, San Diego, (United States)); Klein, J.; Fink, D.; Middleton, R. (Univ. of Pennsylvania, Philadelphia (United States)); Kubik, P.W.; Sharma, P.; Elmore, D. (Univ. of Rochester, NY (United States)); Reedy, R.C. (Los Alamos National Lab., NM (United States))

    1991-11-01

    The cosmogenic radionuclides {sup 41}Ca, {sup 36}Cl, {sup 26}Al, and {sup 10}Be in the Allan Hills 81005, MacAlpine Hills 88104, MacAlpine Hills 88105,and Yamato 791197 meteorites were measured by accelerator mass spectrometry (AMS). {sup 53}Mn in Allan Hills 81005 and Yamato 791197 was measured by activation. These four lunar meteorites experienced similar histories. They were ejected from near the surface of the Moon ranging in depth down to 400 g/cm{sup 2} and had very short transition times (less than 0.1 Ma) from the Moon to the Earth. A comparison of the cosmogenic nuclide concentrations in MacAlpine Hills 88104 and MacAlpine Hills 88105 clearly indicates that they are a pair from the same fall.

  20. 42 CFR 405.1126 - Case remanded by the MAC.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Case remanded by the MAC. 405.1126 Section 405.1126....1126 Case remanded by the MAC. (a) When the MAC may remand a case. Except as specified in § 405.1122(c), the MAC may remand a case in which additional evidence is needed or additional action by the ALJ is...

  1. The Nimrod computational workbench: a case study in desktop metacomputing

    Energy Technology Data Exchange (ETDEWEB)

    Abramson, D.; Sosic, R. [Griffith Univ., Brisbane, QLD (Australia); Foster, I. [Argonne National Lab., IL (United States); Giddy, J. [Queensland Univ., St. Lucia, QLD (Australia); Lewis, A. [Griffith Univ., Brisbane, QLD (Australia); White, N. [Queensland Univ., St. Lucia, QLD (Australia)

    1996-12-31

    The coordinated use of geographically distributed computers, or metacomputing, can in principle provide more accessible and cost- effective supercomputing than conventional high-performance systems. However, we lack evidence that metacomputing systems can be made easily usable, or that there exist large numbers of applications able to exploit metacomputing resources. In this paper, we present work that addresses both these concerns. The basis for this work is a system called Nimrod that provides a desktop problem-solving environment for parametric experiments. We describe how Nimrod has been extended to support the scheduling of computational resources located in a wide-area environment, and report on an experiment in which Nimrod was used to schedule a large parametric study across the Australian Internet. The experiment provided both new scientific results and insights into Nimrod capabilities. We relate the results of this experiment to lessons learned from the I-WAY distributed computing experiment, and draw conclusions as to how Nimrod and I-WAY- like computing environments should be developed to support desktop metacomputing.

  2. SERVICE HANDBOOK FOR THE DESKTOP SUPPORT CONTRACT WIH IT DIVISION

    CERN Multimedia

    2000-01-01

    A Desktop Support Contract has been running since January 1999 to offer help to all users at CERN with problems that occur with their desktop computers. The contract is run conjointly by the Swedish Company WM-data and the Swiss company DCS.The contract is comprised of the Computing Helpdesk, a General Service for all parts of CERN and also Local Service for those divisions and groups that want faster response times and additional help with their specific computer environment.In order to describe what services are being offered, and also to give a better understanding of the structure of the contract, a Service Handbook has been created. The intended audience for the Service Handbook is everyone that is using the contract, i.e. users, managers and also the service staff inside the contract. In the handbook you will find what help you can get from the contract, how to get in touch with the contract, and also what response times you can expect. Since the computer environment at CERN is a never-changing entity, ...

  3. Multimedia architectures: from desktop systems to portable appliances

    Science.gov (United States)

    Bhaskaran, Vasudev; Konstantinides, Konstantinos; Natarajan, Balas R.

    1997-01-01

    Future desktop and portable computing systems will have as their core an integrated multimedia system. Such a system will seamlessly combine digital video, digital audio, computer animation, text, and graphics. Furthermore, such a system will allow for mixed-media creation, dissemination, and interactive access in real time. Multimedia architectures that need to support these functions have traditionally required special display and processing units for the different media types. This approach tends to be expensive and is inefficient in its use of silicon. Furthermore, such media-specific processing units are unable to cope with the fluid nature of the multimedia market wherein the needs and standards are changing and system manufacturers may demand a single component media engine across a range of products. This constraint has led to a shift towards providing a single-component multimedia specific computing engine that can be integrated easily within desktop systems, tethered consumer appliances, or portable appliances. In this paper, we review some of the recent architectural efforts in developing integrated media systems. We primarily focus on two efforts, namely the evolution of multimedia-capable general purpose processors and a more recent effort in developing single component mixed media co-processors. Design considerations that could facilitate the migration of these technologies to a portable integrated media system also are presented.

  4. MICA: desktop software for comprehensive searching of DNA databases

    Directory of Open Access Journals (Sweden)

    Glick Benjamin S

    2006-10-01

    Full Text Available Abstract Background Molecular biologists work with DNA databases that often include entire genomes. A common requirement is to search a DNA database to find exact matches for a nondegenerate or partially degenerate query. The software programs available for such purposes are normally designed to run on remote servers, but an appealing alternative is to work with DNA databases stored on local computers. We describe a desktop software program termed MICA (K-Mer Indexing with Compact Arrays that allows large DNA databases to be searched efficiently using very little memory. Results MICA rapidly indexes a DNA database. On a Macintosh G5 computer, the complete human genome could be indexed in about 5 minutes. The indexing algorithm recognizes all 15 characters of the DNA alphabet and fully captures the information in any DNA sequence, yet for a typical sequence of length L, the index occupies only about 2L bytes. The index can be searched to return a complete list of exact matches for a nondegenerate or partially degenerate query of any length. A typical search of a long DNA sequence involves reading only a small fraction of the index into memory. As a result, searches are fast even when the available RAM is limited. Conclusion MICA is suitable as a search engine for desktop DNA analysis software.

  5. 3d visualization of atomistic simulations on every desktop

    Science.gov (United States)

    Peled, Dan; Silverman, Amihai; Adler, Joan

    2013-08-01

    Once upon a time, after making simulations, one had to go to a visualization center with fancy SGI machines to run a GL visualization and make a movie. More recently, OpenGL and its mesa clone have let us create 3D on simple desktops (or laptops), whether or not a Z-buffer card is present. Today, 3D a la Avatar is a commodity technique, presented in cinemas and sold for home TV. However, only a few special research centers have systems large enough for entire classes to view 3D, or special immersive facilities like visualization CAVEs or walls, and not everyone finds 3D immersion easy to view. For maximum physics with minimum effort a 3D system must come to each researcher and student. So how do we create 3D visualization cheaply on every desktop for atomistic simulations? After several months of attempts to select commodity equipment for a whole room system, we selected an approach that goes back a long time, even predating GL. The old concept of anaglyphic stereo relies on two images, slightly displaced, and viewed through colored glasses, or two squares of cellophane from a regular screen/projector or poster. We have added this capability to our AViz atomistic visualization code in its new, 6.1 version, which is RedHat, CentOS and Ubuntu compatible. Examples using data from our own research and that of other groups will be given.

  6. Reduction in standard MAC and MAC for intubation after clonidine premedication in children.

    Science.gov (United States)

    Inomata, S; Kihara, S; Yaguchi, Y; Baba, Y; Kohda, Y; Toyooka, H

    2000-11-01

    We examined the relative effects of different doses of oral clonidine on the MAC for endotracheal intubation (MACEI) and the MAC for skin incision (MAC) in children. We studied 90 children (15 in each group) (age range 2-8 yr, weight 10-27 kg, height 89-124 cm) who received one of three preanaesthetic medications: placebo (control), oral clonidine 2 micrograms kg-1, or oral clonidine 4 micrograms kg-1 100 min before anaesthesia. Anaesthesia was induced and maintained with sevoflurane in oxygen and air without i.v. anesthetics and neuromuscular relaxants. The end-tidal sevoflurane concentration was kept constant for > or = 15 min before tracheal intubation or skin incision. MACs were determined using Dixon's 'up-and-down method'. Mean (SD) MACEIs of sevoflurane were 2.9 (0.1)%, 2.5 (0.1)% and 1.9 (0.1)% (P clonidine 2 micrograms kg-1 and clonidine 4 micrograms kg-1 groups. The MACEIs and MACs decreased dose-dependently. The MACEI/MAC ratio (1.4) was not affected by clonidine.

  7. CR-MAC: A Multichannel MAC Protocol for Cognitive Radio AD HOC Networks

    Directory of Open Access Journals (Sweden)

    S. M. Kamruzzaman

    2010-09-01

    Full Text Available This paper proposes a cross-layer based cognitive radio multichannel medium access control (MACprotocol with TDMA, which integrate the spectrum sensing at physical (PHY layer and the packetscheduling at MAC layer, for the ad hoc wireless networks. The IEEE 802.11 standard allows for the useof multiple channels available at the PHY layer, but its MAC protocol is designed only for a singlechannel. A single channel MAC protocol does not work well in a multichannel environment, because ofthe multichannel hidden terminal problem. Our proposed protocol enables secondary users (SUs toutilize multiple channels by switching channels dynamically, thus increasing network throughput. In ourproposed protocol, each SU is equipped with only one spectrum agile transceiver, but solves themultichannel hidden terminal problem using temporal synchronization. The proposed cognitive radioMAC (CR-MAC protocol allows SUs to identify and use the unused frequency spectrum in a way thatconstrains the level of interference to the primary users (PUs. Our scheme improves network throughputsignificantly, especially when the network is highly congested. The simulation results show that ourproposed CR-MAC protocol successfully exploits multiple channels and significantly improves networkperformance by using the licensed spectrum band opportunistically and protects PUs from interference,even in hidden terminal situations.

  8. 42 CFR 423.2128 - Action of the MAC.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Action of the MAC. 423.2128 Section 423.2128 Public...) MEDICARE PROGRAM VOLUNTARY MEDICARE PRESCRIPTION DRUG BENEFIT Reopening, ALJ Hearings, MAC review, and Judicial Review § 423.2128 Action of the MAC. (a) After it has reviewed all the evidence in the...

  9. 42 CFR 405.1118 - Obtaining evidence from the MAC.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Obtaining evidence from the MAC. 405.1118 Section... Council Review § 405.1118 Obtaining evidence from the MAC. A party may request and receive a copy of all... these items. If a party requests evidence from the MAC and an opportunity to comment on that evidence...

  10. 42 CFR 405.1128 - Action of the MAC.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Action of the MAC. 405.1128 Section 405.1128 Public... the MAC. (a) After it has reviewed all the evidence in the administrative record and any additional evidence received, subject to the limitations on MAC consideration of additional evidence in § 405.1122...

  11. 42 CFR 422.608 - Medicare Appeals Council (MAC) review.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Medicare Appeals Council (MAC) review. 422.608... and Appeals § 422.608 Medicare Appeals Council (MAC) review. Any party to the hearing, including the MA organization, who is dissatisfied with the ALJ hearing decision, may request that the MAC review...

  12. MAC 700 Wash高亮度灯具

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    马田最新推出的MAC 700 Wash高亮度灯具继承了MAC系列的传统优点.具有与MAC 700 Profile相同的强大功能、模组桔构和出色设计,是MAC 700 Profile的“最佳搭档”。

  13. Isolation and characterisation of human gingival margin-derived STRO-1/MACS1 and MACS2 cell populations

    Institute of Scientific and Technical Information of China (English)

    Karim M Fawzy El-Sayed; Sebastian Paris; Christian Graetz; Neemat Kassem; Mohamed Mekhemar; Hendrick Ungefroren; Fred Fandrich; Christof Dorfer

    2015-01-01

    Recently, gingival margin-derived stem/progenitor cells isolated via STRO-1/magnetic activated cell sorting (MACS) showed remarkable periodontal regenerative potential in vivo. As a second-stage investigation, the present study’s aim was to perform in vitro characterisation and comparison of the stem/progenitor cell characteristics of sorted STRO-1-positive (MACS1) and STRO-1-negative (MACS2) cell populations from the human free gingival margin. Cells were isolated from the free gingiva using a minimally invasive technique and were magnetically sorted using anti-STRO-1 antibodies. Subsequently, the MACS1 and MACS2 cell fractions were characterized by flow cytometry for expression of CD14, CD34, CD45, CD73, CD90, CD105, CD146/MUC18 and STRO-1. Colony-forming unit (CFU) and multilineage differentiation potential were assayed for both cell fractions. Mineralisation marker expression was examined using real-time polymerase chain reaction (PCR). MACS1 and MACS2 cell fractions showed plastic adherence. MACS1 cells, in contrast to MACS2 cells, showed all of the predefined mesenchymal stem/progenitor cell characteristics and a significantly higher number of CFUs (P,0.01). More than 95%of MACS1 cells expressed CD105, CD90 and CD73;lacked the haematopoietic markers CD45, CD34 and CD14, and expressed STRO-1 and CD146/MUC18. MACS2 cells showed a different surface marker expression profile, with almost no expression of CD14 or STRO-1, and more than 95%of these cells expressed CD73, CD90 and CD146/MUC18, as well as the haematopoietic markers CD34 and CD45 and CD105. MACS1 cells could be differentiated along osteoblastic, adipocytic and chondroblastic lineages. In contrast, MACS2 cells demonstrated slight osteogenic potential. Unstimulated MACS1 cells showed significantly higher expression of collagen I (P,0.05) and collagen III (P,0.01), whereas MACS2 cells demonstrated higher expression of osteonectin (P,0.05;Mann–Whitney). The present study is the first to compare gingival

  14. MacBook All-in-One For Dummies

    CERN Document Server

    Chambers, Mark L

    2011-01-01

    Get comfortable and confident with your MacBook! Combining the fun-but-straightforward content of nine minibooks, this new edition of MacBook All-in-One For Dummies delivers helpful coverage of the rich features and essential tools you need to know to use the MacBook to its fullest potential. You'll learn an array of MacBook basics while veteran author Mark Chambers walks you through setting up your MacBook, running programs, finding files with Finder, searching with Spotlight, keeping track with Address Book, enjoying music with iTunes, creating cool multimedia projects with iLife, and more.

  15. A Framework for Examining Desktop Video Conferencing in the Organisational Context

    OpenAIRE

    Angelides, Marios C.

    1998-01-01

    This paper proposes, and applies, a framework for examining desktop video conferencing in the organisational context. The framework helps organisations both to uncover the relative benefits of, and problems in, the use of desktop video conferencing and to reconcile some of the problems that evolve from this use.

  16. Compositional Encounters: Evolvement of Secondary Students' Narratives While Making Historical Desktop Documentaries

    Science.gov (United States)

    Schul, James E.

    2012-01-01

    The increased popularity of desktop documentary making among both teachers and students in history classrooms warrants an examination of its integration into classroom instruction. This multiple case study focused on two secondary students in an AP European History course during a unit that featured desktop documentary making. Employing Cultural…

  17. Analysis and improvement of the MAC shaping mechanism in RPR

    Science.gov (United States)

    Li, Jing; Xu, Zhanqi; Yu, Shaohua

    2005-11-01

    Resilient Packet Ring (RPR) specified by IEEE 802.17 is a new standard for Metropolitan Area Networks (MANs). One of RPR's characteristics is that it can support three priorities traffic in a single datapath, i.e., class A, class B and class C, ranging from high priority to low priority, respectively. Different entities such as shaping, scheduling, fairness, topology and protection coordinate to guarantee the Quality of Service (QoS) for different services. Various pieces of the datapath in RPR are tied together through logical queues, thus we investigate the datapath from the view of logical queues in this paper. With a detailed analysis of the MAC shaping mechanism in RPR, we propose some improvement to achieve better transport performance for RPR's three priorities traffic. Simulation results show that our improvement is efficient.

  18. Modeling MAC layer for powerline communications networks

    Science.gov (United States)

    Hrasnica, Halid; Haidine, Abdelfatteh

    2001-02-01

    The usage of electrical power distribution networks for voice and data transmission, called Powerline Communications, becomes nowadays more and more attractive, particularly in the telecommunication access area. The most important reasons for that are the deregulation of the telecommunication market and a fact that the access networks are still property of former monopolistic companies. In this work, first we analyze a PLC network and system structure as well as a disturbance scenario in powerline networks. After that, we define a logical structure of the powerline MAC layer and propose the reservation MAC protocols for the usage in the PLC network which provides collision free data transmission. This makes possible better network utilization and realization of QoS guarantees which can make PLC networks competitive to other access technologies.

  19. Seán MacDiarmada

    Directory of Open Access Journals (Sweden)

    Madden

    2016-12-01

    Full Text Available Seán MacDiarmada: Signatory to Proclamation – Executed after the Rising of 1916 - Leitrim to Kilmainham was written by Tom Madden to coincide with the 1916/2016 centenary commemorations. The play was first performed at the Mullagh Arts Festival in Cavan during September 2016 and provides a lively account of the background and activism of one the seven leaders of the Easter Rising of 1916. The action plays out over twelve scenes taking in MacDiarmada's journey from teacher to revolutionary activist culminating in a deeply flawed court-martial and his subsequent execution by a British Army firing squad on May 12th, 1916.

  20. Earth tides in MacDonald's model

    CERN Document Server

    Ferraz-Mello, S

    2013-01-01

    We expand the equations used in MacDonald's 1964 theory and Fourier analyze the tidal variations of the height at one point on the Earth surface, and also the tidal potential at such point. It is shown that no intrinsic law is relating the lag of the tide components to their frequencies. In other words, no simple rheology is being intrinsically fixed by MacDonald's equations. The same is true of the modification proposed by Singer(1968). At variance with these two cases, the modification proposed by Williams and Efroimsky (2012) fix the standard Darwin rheology in which the lags are proportional to the frequencies and their model is, in this sense, equivalent to Mignard's 1979 formulation of Darwin's theory.

  1. Performance Analysis of MAC Layer Protocols in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Hameeza Ahmed

    2014-10-01

    Full Text Available Media Access Control (MAC layer protocols have a critical role in making a typical Wireless Sensor Network (WSN more reliable and efficient. Choice of MAC layer protocol and other factors including number of nodes, mobility, traffic rate and playground size dictates the performance of a particular WSN. In this paper, the performance of an experimental WSN is evaluated using different MAC layer protocols. In this experiment, a WSN is created using OMNeT++ MiXiM network simulator and its performance in terms of packet delivery ratio and mean latency is evaluated. The simulation results show that IEEE 802.11 MAC layer protocol performs better than CSMA, B-MAC and IEEE 802.15.4 MAC layer protocols. In the considered scenario, IEEE 802.15.4 is ranked second in performance, followed by CSMA and B-MAC.

  2. Laevo: A Temporal Desktop Interface for Integrated Knowledge Work

    DEFF Research Database (Denmark)

    Jeuris, Steven; Houben, Steven; Bardram, Jakob

    2014-01-01

    configuration work to integrate the different tools they use. In order to understand tool usage, we review literature on how users' activities are created and evolve over time as part of knowledge worker practices. From this we derive the activity life cycle, a conceptual framework describing the different......Prior studies show that knowledge work is characterized by highly interlinked practices, including task, file and window management. However, existing personal information management tools primarily focus on a limited subset of knowledge work, forcing users to perform additional manual...... states and transitions of an activity. The life cycle is used to inform the design of Laevo, a temporal activity-centric desktop interface for personal knowledge work. Laevo allows users to structure work within dedicated workspaces, managed on a timeline. Through a centralized notification system which...

  3. Parallelized Vlasov-Fokker-Planck solver for desktop personal computers

    Science.gov (United States)

    Schönfeldt, Patrik; Brosi, Miriam; Schwarz, Markus; Steinmann, Johannes L.; Müller, Anke-Susanne

    2017-03-01

    The numerical solution of the Vlasov-Fokker-Planck equation is a well established method to simulate the dynamics, including the self-interaction with its own wake field, of an electron bunch in a storage ring. In this paper we present Inovesa, a modularly extensible program that uses opencl to massively parallelize the computation. It allows a standard desktop PC to work with appropriate accuracy and yield reliable results within minutes. We provide numerical stability-studies over a wide parameter range and compare our numerical findings to known results. Simulation results for the case of coherent synchrotron radiation will be compared to measurements that probe the effects of the microbunching instability occurring in the short bunch operation at ANKA. It will be shown that the impedance model based on the shielding effect of two parallel plates can not only describe the instability threshold, but also the presence of multiple regimes that show differences in the emission of coherent synchrotron radiation.

  4. Laevo: A Temporal Desktop Interface for Integrated Knowledge Work

    DEFF Research Database (Denmark)

    Jeuris, Steven; Houben, Steven; Bardram, Jakob

    2014-01-01

    Prior studies show that knowledge work is characterized by highly interlinked practices, including task, file and window management. However, existing personal information management tools primarily focus on a limited subset of knowledge work, forcing users to perform additional manual...... states and transitions of an activity. The life cycle is used to inform the design of Laevo, a temporal activity-centric desktop interface for personal knowledge work. Laevo allows users to structure work within dedicated workspaces, managed on a timeline. Through a centralized notification system which...... configuration work to integrate the different tools they use. In order to understand tool usage, we review literature on how users' activities are created and evolve over time as part of knowledge worker practices. From this we derive the activity life cycle, a conceptual framework describing the different...

  5. GRID : unlimited computing power on your desktop Conference MT17

    CERN Document Server

    2001-01-01

    The Computational GRID is an analogy to the electrical power grid for computing resources. It decouples the provision of computing, data, and networking from its use, it allows large-scale pooling and sharing of resources distributed world-wide. Every computer, from a desktop to a mainframe or supercomputer, can provide computing power or data for the GRID. The final objective is to plug your computer into the wall and have direct access to huge computing resources immediately, just like plugging-in a lamp to get instant light. The GRID will facilitate world-wide scientific collaborations on an unprecedented scale. It will provide transparent access to major distributed resources of computer power, data, information, and collaborations.

  6. Direct-write scanning probe lithography: towards a desktop fab

    Science.gov (United States)

    Giam, Louise R.; Senesi, Andrew J.; Liao, Xing; Wong, Lu Shin; Chai, Jinan; Eichelsdoerfer, Daniel J.; Shim, Wooyoung; Rasin, Boris; He, Shu; Mirkin, Chad A.

    2011-06-01

    Massively parallel scanning-probe based methods have been used to address the challenges of nanometer to millimeter scale printing for a variety of materials and mark a step towards the realization of a "desktop fab." Such tools enable simple, flexible, high-throughput, and low-cost nano- and microscale patterning, which allow researchers to rapidly synthesize and study systems ranging from nanoparticle synthesis to biological processes. We have developed a novel scanning probe-based cantilever-free printing method termed polymer pen lithography (PPL), which uses an array of elastomeric tips to transfer materials (e.g. alkanethiols, proteins, polymers) in a direct-write manner onto a variety of surfaces. This technique takes the best attributes of dip-pen nanolithography (DPN) and eliminates many of the disadvantages of contact printing. Various related techniques such as beam pen lithography (BPL), scanning probe block copolymer lithography (SPBCL), and hard-tip, soft spring lithography (HSL) are also discussed.

  7. Direct Desktop Printed-Circuits-on-Paper Flexible Electronics

    Science.gov (United States)

    Zheng, Yi; He, Zhizhu; Gao, Yunxia; Liu, Jing

    2013-05-01

    There currently lacks of a way to directly write out electronics, just like printing pictures on paper by an office printer. Here we show a desktop printing of flexible circuits on paper via developing liquid metal ink and related working mechanisms. Through modifying adhesion of the ink, overcoming its high surface tension by dispensing machine and designing a brush like porous pinhead for printing alloy and identifying matched substrate materials among different papers, the slightly oxidized alloy ink was demonstrated to be flexibly printed on coated paper, which could compose various functional electronics and the concept of Printed-Circuits-on-Paper was thus presented. Further, RTV silicone rubber was adopted as isolating inks and packaging material to guarantee the functional stability of the circuit, which suggests an approach for printing 3D hybrid electro-mechanical device. The present work paved the way for a low cost and easygoing method in directly printing paper electronics.

  8. 关于Mac OS X Lion

    Institute of Scientific and Technical Information of China (English)

    饭桶

    2011-01-01

    Lion是Mac OS X操作系统的第七个版本,第一个版本是2001年发布的Cheetah(猎豹).或许很多Windows用户会认为,Lion不过是一次升级,主版本仍然是Mac OSX.那么我不介意稍微解释一下:Mac OS X对应的层次是Windows,Cheetah或者Lion相当于XP,或者7.因此即使从软件工程的角度看,Lion也是一个全新的操作系统.由于重新编译了核心,Lion的安装文件只有3.6GB大小,比上一代(Snow Leopard)减少了近一半的体积,这种比旧版本体积更小的新操作系统在历史上可不多见.

  9. Turbulence Visualization at the Terascale on Desktop PCs

    KAUST Repository

    Treib, M.

    2012-12-01

    Despite the ongoing efforts in turbulence research, the universal properties of the turbulence small-scale structure and the relationships between small-and large-scale turbulent motions are not yet fully understood. The visually guided exploration of turbulence features, including the interactive selection and simultaneous visualization of multiple features, can further progress our understanding of turbulence. Accomplishing this task for flow fields in which the full turbulence spectrum is well resolved is challenging on desktop computers. This is due to the extreme resolution of such fields, requiring memory and bandwidth capacities going beyond what is currently available. To overcome these limitations, we present a GPU system for feature-based turbulence visualization that works on a compressed flow field representation. We use a wavelet-based compression scheme including run-length and entropy encoding, which can be decoded on the GPU and embedded into brick-based volume ray-casting. This enables a drastic reduction of the data to be streamed from disk to GPU memory. Our system derives turbulence properties directly from the velocity gradient tensor, and it either renders these properties in turn or generates and renders scalar feature volumes. The quality and efficiency of the system is demonstrated in the visualization of two unsteady turbulence simulations, each comprising a spatio-temporal resolution of 10244. On a desktop computer, the system can visualize each time step in 5 seconds, and it achieves about three times this rate for the visualization of a scalar feature volume. © 1995-2012 IEEE.

  10. Visual attention for a desktop virtual environment with ambient scent.

    Science.gov (United States)

    Toet, Alexander; van Schaik, Martin G

    2013-01-01

    In the current study participants explored a desktop virtual environment (VE) representing a suburban neighborhood with signs of public disorder (neglect, vandalism, and crime), while being exposed to either room air (control group), or subliminal levels of tar (unpleasant; typically associated with burned or waste material) or freshly cut grass (pleasant; typically associated with natural or fresh material) ambient odor. They reported all signs of disorder they noticed during their walk together with their associated emotional response. Based on recent evidence that odors reflexively direct visual attention to (either semantically or affectively) congruent visual objects, we hypothesized that participants would notice more signs of disorder in the presence of ambient tar odor (since this odor may bias attention to unpleasant and negative features), and less signs of disorder in the presence of ambient grass odor (since this odor may bias visual attention toward the vegetation in the environment and away from the signs of disorder). Contrary to our expectations the results provide no indication that the presence of an ambient odor affected the participants' visual attention for signs of disorder or their emotional response. However, the paradigm used in present study does not allow us to draw any conclusions in this respect. We conclude that a closer affective, semantic, or spatiotemporal link between the contents of a desktop VE and ambient scents may be required to effectively establish diagnostic associations that guide a user's attention. In the absence of these direct links, ambient scent may be more diagnostic for the physical environment of the observer as a whole than for the particular items in that environment (or, in this case, items represented in the VE).

  11. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  12. W-MAC: a workload-aware MAC protocol for heterogeneous convergecast in wireless sensor networks.

    Science.gov (United States)

    Xia, Ming; Dong, Yabo; Lu, Dongming

    2011-01-01

    The power consumption and latency of existing MAC protocols for wireless sensor networks (WSNs) are high in heterogeneous convergecast, where each sensor node generates different amounts of data in one convergecast operation. To solve this problem, we present W-MAC, a workload-aware MAC protocol for heterogeneous convergecast in WSNs. A subtree-based iterative cascading scheduling mechanism and a workload-aware time slice allocation mechanism are proposed to minimize the power consumption of nodes, while offering a low data latency. In addition, an efficient schedule adjustment mechanism is provided for adapting to data traffic variation and network topology change. Analytical and simulation results show that the proposed protocol provides a significant energy saving and latency reduction in heterogeneous convergecast, and can effectively support data aggregation to further improve the performance.

  13. Notas sobre dois livros de MacIntyre Notes on two books by MacIntyre

    Directory of Open Access Journals (Sweden)

    Isabel Ribeiro de Oliveira

    2005-04-01

    Full Text Available Os conceitos centrais da teoria da justiça desenvolvida por Alasdair MacIntyre - prática, narrativa e tradição - ocupam o núcleo da análise feita acerca de dois de seus livros: Depois da Virtude e Justiça de Quem? Qual racionalidade?. O artigo considera a relação, em MacIntyre, entre ética e história, virtude e relativismo, bem como apresenta seu conceito do Eu, como corretivos à anomia contemporânea.The central concepts of MacIntyre's approach to justice - practice, narrative and tradition - constitute the main trust of the analysis of two of his books: After Virtue and Whose justice? Which rationality? The article elaborates on the relationship of ethics to history, of virtues to relativism as well as his conception of the self as correctives to the pervasive anomie in contemporary societies.

  14. Monitored Anaesthesia Care (MAC in antalgic surgery

    Directory of Open Access Journals (Sweden)

    Giovanni Maria Pisanu

    2011-09-01

    Full Text Available The use of surgical techniques for pain relief in the treatment of chronic-persistent pain unresponsive to drug therapy is experiencing a growing spread application in algology. These techniques have set themselves the goal of removing the pain after treatment. Therefore, not always, percutaneous or open procedures are carried out with due precaution necessary to alleviate the patient discomfort and suffering during the surgical intervention. We present our personal experience in the use of this technique Monitored Anaesthesia Care (MAC for patients undergoing surgical treatment of pain management at our Regional Center of Pain Management.

  15. One of the First Portable Macs

    CERN Multimedia

    1989-01-01

    It was one of the first portable macs released. The Portable had many new advances in mobile computing : The display was crispy clear, and looked beautiful when used in daylight ; The Portable came with a Lead-acid gel/cell battery that could run a anywhere from 6 -12 hours ; It supported to internal hard drives, and an external one. The reaction to the laptop was weak because it was slow, it had no capacity for expansion, it weighed heavily, its price was expensive. It has been stayed 1 year and half on the market.

  16. Energy Efficient MAC for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Pekka KOSKELA

    2010-10-01

    Full Text Available This paper considers an overlay solution for asynchronous Medium Access Control (MAC protocols in a duty-cycled wireless sensor network (WSN. The solution extends sleeping times and corrects time drift when the sampling rate is low. The sleeping time is adjusted according to the requisite data sampling rate and the delay requirements of the prevailing application. This and the time drift correction considerably reduced idle listening and thus also decreased power consumption. When the power consumption is reduced, the life of wireless sensor nodes extends.

  17. Implementation of MAC by using Modified Vedic Multiplier

    OpenAIRE

    2013-01-01

    Multiplier Accumulator Unit (MAC) is a part of Digital Signal Processors. The speed of MAC depends on the speed of multiplier. So by using an efficient Vedic multiplier which excels in terms of speed, power and area, the performance of MAC can be increased. For this fast method of multiplication based on ancient Indian Vedic mathematics is proposed in this paper. Among various method of multiplication in Vedic mathematics, Urdhva Tiryagbhyam is used and the multiplication is for 32 X 32 bits....

  18. Essential Mac OS X panther server administration integrating Mac OS X server into heterogeneous networks

    CERN Document Server

    Bartosh, Michael

    2004-01-01

    If you've ever wondered how to safely manipulate Mac OS X Panther Server's many underlying configuration files or needed to explain AFP permission mapping--this book's for you. From the command line to Apple's graphical tools, the book provides insight into this powerful server software. Topics covered include installation, deployment, server management, web application services, data gathering, and more

  19. APC-MAC/TA: Adaptive Power Controlled MAC Protocol with Traffic Awareness for Wireless Sensor Networks

    Science.gov (United States)

    Woo, Seok; Kim, Kiseon

    In this paper, we propose an adaptive power controlled MAC protocol with a traffic-aware scheme specifically designed to reduce both energy and latency in wireless sensor networks. Typically, existing MAC protocols for sensor networks sacrifice latency performance for node energy efficiency. However, some sensor applications for emergencies require rather fast transmissions of sensed data, where we need to consider both energy and latency together. The proposed MAC protocol includes two novel ideas: one is a transmission power control scheme for improving latency in high traffic loads, and the other is a traffic-aware scheme to save more energy in low traffic loads. The transmission power control scheme increases channel utilization by mitigating interference between nodes, and the traffic-aware scheme allows nodes to sleep to reduce idle energy consumption when there are no traffic loads in a network. Simulation results show that the proposed protocol significantly reduces the latency as well as the energy consumption compared to the S-MAC protocol specifically for a large transmission power of nodes and low network traffic.

  20. Main: Clone Detail [KOME

    Lifescience Database Archive (English)

    Full Text Available Clone Detail Mapping Pseudomolecule data detail Detail information Mapping to the TIGR japonica Pseudomolecu...les kome_mapping_pseudomolecule_data_detail.zip kome_mapping_pseudomolecule_data_detail ...

  1. Mac OS X Snow Leopard Server For Dummies

    CERN Document Server

    Rizzo, John

    2009-01-01

    Making Everything Easier!. Mac OS® X Snow Leopard Server for Dummies. Learn to::;. Set up and configure a Mac network with Snow Leopard Server;. Administer, secure, and troubleshoot the network;. Incorporate a Mac subnet into a Windows Active Directory® domain;. Take advantage of Unix® power and security. John Rizzo. Want to set up and administer a network even if you don't have an IT department? Read on!. Like everything Mac, Snow Leopard Server was designed to be easy to set up and use. Still, there are so many options and features that this book will save you heaps of time and effort. It wa

  2. Energy-efficient MAC protocols for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Li De-liang; Peng Fei

    2009-01-01

    Designing energy-efficient Medium Access Control (MAC) protocols has a significant influence on the energy performance of wireless sensor network (WSN). In this paper we present a survey of the recent typical MAC protocols regarding energy efficiency for WSN. According to channel access policies, we classify these protocols into four categories: contention-based, TDMA-based, hybrid, and cross layer protocols, in which the advantages and disadvantages in each class of MAC protocols are discussed. Finally, we point out open research issues that need to carry on to achieve high energy efficiency for the design of MAC protocols in WSN.

  3. Study on intracellular trafficking of Mac-1 by direct visualization

    Institute of Scientific and Technical Information of China (English)

    YAN Ming; MAO Jifang; WEI Yi; ZHONG Jigen; YANG Shengsheng; XU Renbao

    2004-01-01

    Previously, we constructed DNA vectors containing cDNA of Mac-1 subunits (CD11b or CD18b) fused with fluorescence protein (FP). cDNA fragments and the DNA constructs were then transfected into CHO cells (as CHO-Mac-1-FP). The structure and function of Mac-1-FP obtained from the CHO-Mac-1-FP cells are nearly identical to that expressed in wild type leukocytes. In the present study, the intracellular trafficking of Mac-1 was visualized directly by monitoring the fluorescent intensities of YFP-CD18 and PE-conjugated monoclonal antibody against CD11b under a confocal microscope in CHO-Mac-1-FP cells. The results indicate that: (ⅰ) although Mac-1 was not detected in the cell membrane at resting state, it had been translocated and clustered into the cell membrane by 1 h and internalized 2 h after PMA stimulation, at which point the fluorescence intensity began to diminish gradually, probably due to partial degradation of Mac-1. The fluorescence of CD18 and CD11b reappeared on the cell membrane 1 h after re-treatment with PMA, suggesting the recycling of non-degraded Mac-1. (ⅱ) The adhesion rate of CHO-Mac-1-FP to magnetic beads coupled ICAM-1 increased within 4 h after their initial interaction, accompanied by the clustering of Mac-1-FP. After 8 h,the adhesion rate declined and fluorescence also decreased simultaneously. The pattern of change in fluorescence in CHO-Mac-1-FP cells elicited by ICAM-1 beads was similar to that elicited by PMA, suggesting that endocytosis and degradation of Mac-1 occurred after the interaction with ICAM-1. Thus, we conclude that the intracellular trafficking of Mac-1 after activation is associated with membrane translocation, endocytosis, degradation and recycling. These changes are in parallel with the adhesion of CHO-Mac-1-FP cells with ICAM-1, and may be involved in the adhesion and detachment of leukocytes. The detachment of leukocytes may be caused by endocytosis of Mac-1.

  4. An Energy Efficient Analysis of S-MAC And H-MAC Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    P.T.Kalaivaani

    2013-04-01

    Full Text Available Wireless Sensor Networks (WSNs is an interesting topic to the researchers because of its variousapplications. The applications are health monitoring and environmental monitoring, Industrial ProcessMonitoring, Target detection, Target tracking, Energy Efficiency, Disaster Management and MilitarySecurity Systems. The wireless medium requires highly optimized medium Access Protocols to avoidinterferences. Limited resources have driven the research towards energy consumption of MACfunctionalities. Two Medium Access Control (MAC protocol performances are analyzed by using the MAClayer frame work for wireless sensor networks. In this paper an energy efficient analysis of S-MAC and HMACprotocols for wireless sensor networks is proposed with spatial correlation concept. Two MACprotocols such as Sensor MAC (S-MAC and Hybrid MAC (H-MAC protocols are proposed to analyze theperformance of Wireless Sensor Network using four different Parameters such as End to End delay, PacketDelivery Ratio, Packet Drop Rate and Energy Consumption. Performance analysis is carried out by usingthe simulation tool NS2.

  5. From cleanroom to desktop: emerging micro-nanofabrication technology for biomedical applications.

    Science.gov (United States)

    Pan, Tingrui; Wang, Wei

    2011-02-01

    This review is motivated by the growing demand for low-cost, easy-to-use, compact-size yet powerful micro-nanofabrication technology to address emerging challenges of fundamental biology and translational medicine in regular laboratory settings. Recent advancements in the field benefit considerably from rapidly expanding material selections, ranging from inorganics to organics and from nanoparticles to self-assembled molecules. Meanwhile a great number of novel methodologies, employing off-the-shelf consumer electronics, intriguing interfacial phenomena, bottom-up self-assembly principles, etc., have been implemented to transit micro-nanofabrication from a cleanroom environment to a desktop setup. Furthermore, the latest application of micro-nanofabrication to emerging biomedical research will be presented in detail, which includes point-of-care diagnostics, on-chip cell culture as well as bio-manipulation. While significant progresses have been made in the rapidly growing field, both apparent and unrevealed roadblocks will need to be addressed in the future. We conclude this review by offering our perspectives on the current technical challenges and future research opportunities.

  6. Correleation of the SAGE III on ISS Thermal Models in Thermal Desktop

    Science.gov (United States)

    Amundsen, Ruth M.; Davis, Warren T.; Liles, Kaitlin, A. K.; McLeod, Shawn C.

    2017-01-01

    The Stratospheric Aerosol and Gas Experiment III (SAGE III) instrument is the fifth in a series of instruments developed for monitoring aerosols and gaseous constituents in the stratosphere and troposphere. SAGE III was launched on February 19, 2017 and mounted to the International Space Station (ISS) to begin its three-year mission. A detailed thermal model of the SAGE III payload, which consists of multiple subsystems, has been developed in Thermal Desktop (TD). Correlation of the thermal model is important since the payload will be expected to survive a three-year mission on ISS under varying thermal environments. Three major thermal vacuum (TVAC) tests were completed during the development of the SAGE III Instrument Payload (IP); two subsystem-level tests and a payload-level test. Additionally, a characterization TVAC test was performed in order to verify performance of a system of heater plates that was designed to allow the IP to achieve the required temperatures during payload-level testing; model correlation was performed for this test configuration as well as those including the SAGE III flight hardware. This document presents the methods that were used to correlate the SAGE III models to TVAC at the subsystem and IP level, including the approach for modeling the parts of the payload in the thermal chamber, generating pre-test predictions, and making adjustments to the model to align predictions with temperatures observed during testing. Model correlation quality will be presented and discussed, and lessons learned during the correlation process will be shared.

  7. From Cleanroom to Desktop: Emerging Micro-Nanofabrication Technology for Biomedical Applications

    Science.gov (United States)

    Wang, Wei

    2010-01-01

    This review is motivated by the growing demand for low-cost, easy-to-use, compact-size yet powerful micro-nanofabrication technology to address emerging challenges of fundamental biology and translational medicine in regular laboratory settings. Recent advancements in the field benefit considerably from rapidly expanding material selections, ranging from inorganics to organics and from nanoparticles to self-assembled molecules. Meanwhile a great number of novel methodologies, employing off-the-shelf consumer electronics, intriguing interfacial phenomena, bottom-up self-assembly principles, etc., have been implemented to transit micro-nanofabrication from a cleanroom environment to a desktop setup. Furthermore, the latest application of micro-nanofabrication to emerging biomedical research will be presented in detail, which includes point-of-care diagnostics, on-chip cell culture as well as bio-manipulation. While significant progresses have been made in the rapidly growing field, both apparent and unrevealed roadblocks will need to be addressed in the future. We conclude this review by offering our perspectives on the current technical challenges and future research opportunities. PMID:21161384

  8. A Parallelized Vlasov-Fokker-Planck-Solver for Desktop PCs

    CERN Document Server

    Schönfeldt,; Brosi,; Miriam,; Schwarz,; Markus,; Steinmann,; L., Johannes; Müller,; Anke-Susanne,

    2016-01-01

    The numerical solution of the Vlasov-Fokker-Planck equation is a well established method to simulate the dynamics, including the self-interaction with its own wake field, of an electron bunch in a storage ring. In this paper we present Inovesa, a modularly extensible program that uses OpenCL to massively parallelize the computation. It allows a standard desktop PC to work with appropriate accuracy and yield reliable results within minutes. We provide numerical stability-studies over a wide parameter range and compare our numerical findings to known results. Simulation results for the case of coherent synchrotron radiation will be compared to measurements that probe the effects of the micro-bunching instability occurring in the short bunch operation at ANKA. It will be shown that the impedance model based on the shielding effect of two parallel plates can not only describe the instability threshold, but also the presence of multiple regimes that show differences in the emission of coherent synchrotron radiatio...

  9. Parallelized Vlasov-Fokker-Planck solver for desktop personal computers

    Directory of Open Access Journals (Sweden)

    Patrik Schönfeldt

    2017-03-01

    Full Text Available The numerical solution of the Vlasov-Fokker-Planck equation is a well established method to simulate the dynamics, including the self-interaction with its own wake field, of an electron bunch in a storage ring. In this paper we present Inovesa, a modularly extensible program that uses opencl to massively parallelize the computation. It allows a standard desktop PC to work with appropriate accuracy and yield reliable results within minutes. We provide numerical stability-studies over a wide parameter range and compare our numerical findings to known results. Simulation results for the case of coherent synchrotron radiation will be compared to measurements that probe the effects of the microbunching instability occurring in the short bunch operation at ANKA. It will be shown that the impedance model based on the shielding effect of two parallel plates can not only describe the instability threshold, but also the presence of multiple regimes that show differences in the emission of coherent synchrotron radiation.

  10. Innovative desktop learning tools. Implications for rural hospitals and physicians.

    Science.gov (United States)

    Oeffinger, J C; Hiebeler, L; Sherman, T; Gaskill, M; Portante, T; Polasek, J; Litterer, K

    1992-12-17

    Innovative methods of providing workplace education for health care professionals may be a key to the survival of rural hospitals in America. Such methods must overcome time, distance, cost and organizational constraints, and take into account the structure of the learning experience. The Texas Hospital Education and Research Foundation has recently been involved in two programs that tested new approaches to worker education using distance-learning strategies. The projects--resource sharing among rural directors of nursing and training for cancer tumor registrars--used computer-conferencing technology. A new model using existing satellite, audio-conferencing, and computer-based instruction augmented by computer conferencing is proposed. The Computer-Related Assisted Distance Learning Enhancement (CRADLE) model integrates existing technologies to provide education to health care workers at their desktop. The Cancer Learning Center (CLC) tested peer collaboration, the primary component of the model. The ultimate goal is to have the system available to all tumor registrars in Texas, and to secure funding to implement rural nursing and rural high-school health occupations education projects. Current projects from set-up through results are presented.

  11. A desktop Faraday rotation instrument in the ultraviolet

    Science.gov (United States)

    Ström, Valter; Rao, K. V.

    2008-02-01

    A simple versatile desktop instrument for the measurement of Faraday rotation in the ultraviolet range has been designed and constructed. A high pressure short arc mercury lamp is used for the light source. By using interference filter for mercury, the desired wavelength of the available lines for mercury (e.g., 365, 405, and 436 nm) is selected. Our instrument measures hysteresis loops in magnetic fields up to 900 kA/m within a few minutes. With a light beam intensity monitor, the detrimental effect from fluctuations in the light source has been virtually eliminated. The instrument can operate at photocurrents from the picoampere regime and above with a Faraday rotation sensitivity of around 1 millideg. By incorporating a higher order Taylor expansion approach, we improve the linearity of the Faraday rotation to transmitted light relationship by two orders of magnitude. The electronics is custom designed analog type, rendering relaxed dynamic requirements for the analog-to-digital converter. The design is fully protected from ambient light which makes operation with the equipment in darkness superfluous; neither does it need any optical table. The data acquisition and operation of the instrument are fully supported by a LABVIEW program. Measurements on a magnetite thin film and on microscope cover glass are given as examples for the performance and sensitivity of the equipment.

  12. BDE-209 in the Australian Environment: Desktop review

    Energy Technology Data Exchange (ETDEWEB)

    English, Karin, E-mail: k.english@uq.edu.au [School of Medicine, The University of Queensland, Brisbane (Australia); Children’s Health and Environment Program, Child Health Research Centre, The University of Queensland, Brisbane (Australia); Queensland Children’s Medical Research Institute, Children’s Health Research Centre, Brisbane (Australia); Toms, Leisa-Maree L. [School of Public Health and Social Work, and Institute of Health and Biomedical Innovation, Queensland University of Technology, Brisbane (Australia); Gallen, Christie; Mueller, Jochen F. [The University of Queensland, National Research Centre for Environmental Toxicology (Entox), Brisbane (Australia)

    2016-12-15

    The commercial polybrominated diphenyl ether (PBDE) flame retardant mixture c-decaBDE is now being considered for listing on the Stockholm Convention on Persistent Organic Pollutants. The aim of our study was to review the literature regarding the use and detection of BDE-209, a major component of c-decaBDE, in consumer products and provide a best estimate of goods that are likely to contain BDE-209 in Australia. This review is part of a larger study, which will include quantitative testing of items to assess for BDE-209. The findings of this desktop review will be used to determine which items should be prioritized for quantitative testing. We identified that electronics, particularly televisions, computers, small household appliances and power boards, were the items that were most likely to contain BDE-209 in Australia. Further testing of these items should include items of various ages. Several other items were identified as high priority for future testing, including transport vehicles, building materials and textiles in non-domestic settings. The findings from this study will aid in the development of appropriate policies, should listing of c-decaBDE on the Stockholm Convention and Australia’s ratification of that listing proceed.

  13. Nielsen PrimeLocation Web/Desktop: Assessing and GIS Mapping Market Area

    Data.gov (United States)

    Social Security Administration — Nielsen PrimeLocation Web and Desktop Software Licensed for Internal Use only: Pop-Facts Demographics Database, Geographic Mapping Data Layers, Geo-Coding locations.

  14. 42 CFR 405.1122 - What evidence may be submitted to the MAC.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false What evidence may be submitted to the MAC. 405.1122... Council Review § 405.1122 What evidence may be submitted to the MAC. (a) Appeal before the MAC on request for review of ALJ's decision. (1) If the MAC is reviewing an ALJ's decision, the MAC limits its review...

  15. 42 CFR 423.2122 - What evidence may be submitted to the MAC.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false What evidence may be submitted to the MAC. 423.2122..., MAC review, and Judicial Review § 423.2122 What evidence may be submitted to the MAC. (a) Appeal before the MAC on request for review of ALJ's decision. (1) If the MAC is reviewing an ALJ's decision...

  16. Fabrication of low cost soft tissue prostheses with the desktop 3D printer

    OpenAIRE

    Yong He; Guang-huai Xue; Jian-zhong Fu

    2014-01-01

    Soft tissue prostheses such as artificial ear, eye and nose are widely used in the maxillofacial rehabilitation. In this report we demonstrate how to fabricate soft prostheses mold with a low cost desktop 3D printer. The fabrication method used is referred to as Scanning Printing Polishing Casting (SPPC). Firstly the anatomy is scanned with a 3D scanner, then a tissue casting mold is designed on computer and printed with a desktop 3D printer. Subsequently, a chemical polishing method is used ...

  17. THE DESIGN AND IMPLEMENTATION OF THE IEEE 802.11 MAC BASED ON SOFT-CORE PROCESSOR AND RTOS

    Institute of Scientific and Technical Information of China (English)

    Xiao Wan'ang; Fang Zhi; Shi Yin

    2007-01-01

    The implementation method of the IEEE 802.11 Medium Access Control (MAC) protocol is mainly based on DSP (Digital Signal Processor)/ARM (Advanced Reduced instruction set computer Machine) processor or DSP/ARM IP (Intellectual Property) core. This paper presents a method based on Nios Ⅱ soft-core processor embedded in Altera's Cyclone FPGA (Field Programmable Gate Array)and MicroC/OS-Ⅱ RTOS (Real-Time Operation System). The benefits and drawbacks of above methods are compared, and then the method presented in this paper is described. The hardware and software partitioning are discussed; the hardware architecture is also illustrated and the MAC software programming is described in detail. The presented method has some advantages, such as low cost,easy-implementation and very suitable for the implementation of IEEE 802.11 MAC in research stage.

  18. Influence of prior determination of baseline minimum alveolar concentration (MAC) of isoflurane on the effect of ketamine on MAC in dogs.

    Science.gov (United States)

    Gianotti, Giacomo; Valverde, Alexander; Johnson, Ron; Sinclair, Melissa; Gibson, Thomas; Dyson, Doris H

    2014-07-01

    The objective of this study was to determine if prior measurement of the minimum alveolar concentration (MAC) of isoflurane influences the effect of ketamine on the MAC of isoflurane in dogs. Eight mixed-breed dogs were studied on 2 occasions. Anesthesia was induced and maintained using isoflurane. In group 1 the effect of ketamine on isoflurane MAC was determined after initially finding the baseline isoflurane MAC. In group 2, the effect of ketamine on isoflurane MAC was determined without previous measure of the baseline isoflurane MAC. In both groups, MAC was determined again 30 min after stopping the CRI of ketamine. Plasma ketamine concentrations were measured during MAC determinations. In group 1, baseline MAC (mean ± SD: 1.18 ± 0.14%) was decreased by ketamine (0.88 ± 0.14%; P MAC after stopping ketamine was similar (1.09 ± 0.16%) to baseline MAC and higher than with ketamine (P MAC with ketamine (0.79 ± 0.11%) was also increased after stopping ketamine (1.10 ± 0.17%; P MAC values with ketamine were different between groups (P MAC determination. The MAC of isoflurane during the CRI of ketamine yielded different results when methods of same day (group-1) versus separate days (group-2) are used, despite similar plasma ketamine concentrations with both methods. However, because the magnitude of this difference was less than 10%, either method of determining MAC is deemed acceptable for research purposes.

  19. On the orthogonality of the MacDonald s functions

    Energy Technology Data Exchange (ETDEWEB)

    Passian, Ali [ORNL; Simpson, Henry [University of Tennessee, Knoxville (UTK); Koucheckian, Sherwin [University of South Florida, Tampa; Yakubovich, Semyon [University of Porto, Portugal

    2009-01-01

    A proof of an orthogonality relation for the MacDonald's functions with identical arguments but unequal complex lower indices is presented. The orthogonality is derived first via a heuristic approach based on the Mehler-Fock integral transform of the MacDonald's functions, and then proved rigorously using a polynomial approximation procedure.

  20. SuperMacLang: Development of an Authoring System.

    Science.gov (United States)

    Frommer, Judith; Foelsche, Otmar K. E.

    1999-01-01

    Describes the development of "SuperMacLang, the 1990s version of the MacLang authoring system. An analysis of various features of the program explains the ways in which certain aspects of collaboration and funding affected developer and programming decisions. (Author/VWL)

  1. Steven MacCall: Winner of LJ's 2010 Teaching Award

    Science.gov (United States)

    Berry, John N., III

    2010-01-01

    This article profiles Steven L. MacCall, winner of "Library Journal's" 2010 Teaching Award. An associate professor at the School of Library and Information Studies (SLIS) at the University of Alabama, Tuscaloosa, MacCall was nominated by Kathie Popadin, known as "Kpop" to the members of her cohort in the online MLIS program at SLIS. Sixteen of…

  2. MAC of xenon and halothane in rhesus monkeys.

    Science.gov (United States)

    Whitehurst, S L; Nemoto, E M; Yao, L; Yonas, H

    1994-10-01

    Local cerebral blood flow (LCBF) maps produced by 33% xenon-enhanced computed tomographic scanning (Xe/CT LCBF) are useful in the clinical diagnosis and management of patients with cerebrovascular disorders. However, observations in humans that 25-35% xenon (Xe) inhalation increases cerebral blood flow (CBF) have raised concerns that Xe/CT LCBF measurements may be inaccurate and that Xe inhalation may be hazardous in patients with decreased intracranial compliance. In contrast, 33% Xe does not increase CBF in rhesus monkeys. To determine whether this interspecies difference in the effect of Xe on CBF correlates with an interspecies difference in the anesthetic potency of Xe, we measured the minimum alveolar concentration (MAC) of Xe preventing movement to a tail-clamp stimulus in rhesus monkeys. Using a standard protocol for the determination of MAC in animals, we first measured the MAC of halothane (n = 5), and then used a combination of halothane and Xe to measure the MAC of Xe (n = 7). The halothane MAC was 0.99 +/- 0.12% (M +/- SD), and the Xe MAC was 98 +/- 15%. These results suggest that the MAC of Xe in rhesus monkeys is higher than the reported human Xe MAC value of 71%. Thus the absence of an effect of 33% Xe on CBF in the rhesus monkey may be related to its lower anesthetic potency.

  3. Intel-Based Mac Computers Improve Teaching and Learning

    Science.gov (United States)

    Technology & Learning, 2007

    2007-01-01

    Today, Mac computers offer schools an easy and powerful way to engage students in learning, foster 21st century skills and leverage existing software assets. Innovative software and hardware built into the Mac allows students to demonstrate their individual strengths--empowering them to be creators of content, rather than just consumers. Judging…

  4. Intel-Based Mac Computers Improve Teaching and Learning

    Science.gov (United States)

    Technology & Learning, 2007

    2007-01-01

    Today, Mac computers offer schools an easy and powerful way to engage students in learning, foster 21st century skills and leverage existing software assets. Innovative software and hardware built into the Mac allows students to demonstrate their individual strengths--empowering them to be creators of content, rather than just consumers. Judging…

  5. Multi-channel MAC Protocol in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Yongli Sun

    2013-11-01

    Full Text Available Since cognitive wireless network (CRN has the characteristic of secondary use, it can enable the device to dynamically access available spectrum without interference to primary users (PUs, which can effectively alleviate contradiction between the lack of spectrum resources and the growing demand for wireless access. However, Medium Access Control (MAC protocol as CRN core components, can achieve competition access of the licensed spectrum and coordination control, which will maximize spectrum utilization efficiency and network throughput. The contribution of this survey is threefold. First, we analyze the characteristics of the existed multi- channel MAC protocol in CRN; Second, according to the different ways of spectrum access in CRNs, the multi-channel MAC protocols are classified into time-slotted based MAC protocol, control channel based MAC protocol and hybrid MAC protocol, and the paper emphatically analyzed the advantages and disadvantages of these multi-channel MAC protocols; Finally, the paper explores the difficulties and the challenges of multi-channel MAC protocols design in cognitive wireless network.

  6. Steven MacCall: Winner of LJ's 2010 Teaching Award

    Science.gov (United States)

    Berry, John N., III

    2010-01-01

    This article profiles Steven L. MacCall, winner of "Library Journal's" 2010 Teaching Award. An associate professor at the School of Library and Information Studies (SLIS) at the University of Alabama, Tuscaloosa, MacCall was nominated by Kathie Popadin, known as "Kpop" to the members of her cohort in the online MLIS program at SLIS. Sixteen of…

  7. A Sensing Error Aware MAC Protocol for Cognitive Radio Networks

    CERN Document Server

    Hu, Donglin

    2011-01-01

    Cognitive radios (CR) are intelligent radio devices that can sense the radio environment and adapt to changes in the radio environment. Spectrum sensing and spectrum access are the two key CR functions. In this paper, we present a spectrum sensing error aware MAC protocol for a CR network collocated with multiple primary networks. We explicitly consider both types of sensing errors in the CR MAC design, since such errors are inevitable for practical spectrum sensors and more important, such errors could have significant impact on the performance of the CR MAC protocol. Two spectrum sensing polices are presented, with which secondary users collaboratively sense the licensed channels. The sensing policies are then incorporated into p-Persistent CSMA to coordinate opportunistic spectrum access for CR network users. We present an analysis of the interference and throughput performance of the proposed CR MAC, and find the analysis highly accurate in our simulation studies. The proposed sensing error aware CR MAC p...

  8. McCay ("Mac") Vernon (1928-2013).

    Science.gov (United States)

    Sherman, William A

    2014-09-01

    McCay ("Mac") Vernon, the founding and preeminent psychologist in the field of deafness. Mac was born at Walter Reed Hospital in Washington, DC, into a military family on October 14, 1928 and died on August 28, 2013, at the age of 84. Prior to Mac, research and clinical direction in the field were sparse. Mac became the icon for psychological services for deaf people, and his work extended into the education of deaf children, forensic and ethical practices with the deaf, and public understanding of deafness as a disability and of deaf persons as a psychosocial minority group. Mac will also be remembered for his sharp intellect, good humor, compassion, and advocacy for those who are misunderstood.

  9. Alasdair MacIntyre, joven lector de Freud

    Directory of Open Access Journals (Sweden)

    Ramis Barceló, Rafael

    2010-06-01

    Full Text Available This article tries to show the reading of Freud that MacIntyre made from 1955 to 1970. For this purpose, it summarizes the ideas of MacIntyre in the intellectual context, mainly the use of philosophical ideas of Freud against the Enlightenment project. MacIntyre criticises Marxist interpreters and the mixing between Marx and Freud. MacIntyre uses the philosophical ideas of Freud for answering two problems on determinism: the links between determinism and reasons for action and determinism and Marxism. The main conclusion is that MacIntyre used Freud in his own advantage: as an ally in the criticism of the Enlightenment.

    Este artículo trata de mostrar la lectura que MacIntyre hizo de Freud desde 1955 hasta 1970. Con este fin, se resumen las ideas de MacIntyre en el contexto intelectual, principalmente el uso de las ideas filosóficas de Freud contra el proyecto de la Ilustración. MacIntyre critica a los intérpretes de Marx y a la mezcla entre Marx y Freud. MacIntyre usa las ideas filosóficas de Freud para contestar dos problemas sobre el determinismo: los vínculos entre el determinismo y las razones para la acción y el determinismo y el marxismo. La conclusión principal es que MacIntyre usó a Freud en su propio beneficio: como un aliado en la crítica de la Ilustración.

  10. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks

    Science.gov (United States)

    Song, W.-Z.; Huang, R.; Shirazi, B.; Husent, R.L.

    2009-01-01

    Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and frame into slots. Parent determines children's frame assigmnent based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. Firstly, given any node, at any time slot, there is at most one active sender in its neighborhood (includ ing itself). Secondly, the packet scheduling with TreelMAC is bufferless, which therefore minimizes the probability of network congestion. Thirdly, the data throughput to gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24 node test bed demonstrate that TreeMAC protocol significantly improves network throughput and energy efficiency, by comparing to the TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC[8]. ?? 2009 IEEE.

  11. TR-MAC: an energy-efficient MAC protocol exploiting transmitted reference modulation for wireless sensor networks

    NARCIS (Netherlands)

    Morshed, S.; Heijenk, Geert

    2014-01-01

    The medium access control (MAC) protocol determines the energy consumption of a wireless sensor node by specifying the listening, transmitting or sleeping time. Therefore MAC protocols play an important role in minimizing the overall energy consumption in a typical wireless sensor network (WSN).

  12. TR-MAC: an energy-efficient MAC protocol exploiting transmitted reference modulation for wireless sensor networks

    NARCIS (Netherlands)

    Morshed, Sarwar; Heijenk, Geert

    2014-01-01

    The medium access control (MAC) protocol determines the energy consumption of a wireless sensor node by specifying the listening, transmitting or sleeping time. Therefore MAC protocols play an important role in minimizing the overall energy consumption in a typical wireless sensor network (WSN). Usi

  13. Ruby in a nutshell a desktop quick reference

    CERN Document Server

    Matsumoto, Yukihiro

    2002-01-01

    Ruby is an absolutely pure object-oriented scripting language written in C and designed with Perl and Python capabilities in mind. While its roots are in Japan, Ruby is slowly but surely gaining ground in the US. The goal of Yukihiro Matsumoto, creator of Ruby and author of this book, is to incorporate the strengths of languages like Perl, Python, Lisp and Smalltalk. Ruby is a genuine attempt to combine the best of everything in the scripting world. Since 1993, Ruby mailing lists have been established, Web pages have formed, and a community has grown around it. The language itself is very good at text processing and is notable for its broad object orientation. Ruby is portable and runs under GNU/Linux (and other Unices) as well as DOS, MS Windows and Mac. With Ruby in a Nutshell, Matsumoto offers a practical reference to the features of this new language including the command-line options, syntax, built-in variables, functions, and many commonly used classes and modules. This guide covers the current stable ...

  14. Efficiency Sustainability Resource Visual Simulator for Clustered Desktop Virtualization Based on Cloud Infrastructure

    Directory of Open Access Journals (Sweden)

    Jong Hyuk Park

    2014-11-01

    Full Text Available Following IT innovations, manual operations have been automated, improving the overall quality of life. This has been possible because an organic topology has been formed among many diverse smart devices grafted onto real life. To provide services to these smart devices, enterprises or users use the cloud. Cloud services are divided into infrastructure as a service (IaaS, platform as a service (PaaS and software as a service (SaaS. SaaS is operated on PaaS, and PaaS is operated on IaaS. Since IaaS is the foundation of all services, algorithms for the efficient operation of virtualized resources are required. Among these algorithms, desktop resource virtualization is used for high resource availability when existing desktop PCs are unavailable. For this high resource availability, clustering for hierarchical structures is important. In addition, since many clustering algorithms show different percentages of the main resources depending on the desktop PC distribution rates and environments, selecting appropriate algorithms is very important. If diverse attempts are made to find algorithms suitable for the operating environments’ desktop resource virtualization, huge costs are incurred for the related power, time and labor. Therefore, in the present paper, a desktop resource virtualization clustering simulator (DRV-CS, a clustering simulator for selecting clusters of desktop virtualization clusters to be maintained sustainably, is proposed. The DRV-CS provides simulations, so that clustering algorithms can be selected and elements can be properly applied in different desktop PC environments through the DRV-CS.

  15. Desktop NMR for structure elucidation and identification of strychnine adulteration.

    Science.gov (United States)

    Singh, Kawarpal; Blümich, Bernhard

    2017-05-02

    Elucidating the structure of complex molecules is difficult at low magnetic fields due to the overlap of different peak multiplets and second-order coupling effects. This is even more challenging for rigid molecules with small chemical shift differences and with prochiral centers. Since low-field NMR spectroscopy is sometimes presumed as restricted to the analysis of only small and simple molecules, this paper aims at countering this misconception: it demonstrates the use of low-field NMR spectroscopy in chemical forensics for identifying strychnine and its counterions by exploring the chemical shift as a signature in different 1D (1)H and (13)C experiments. Hereby the applied methodologies combine various 1D and 2D experiments such as 1D (1)H, (13)C, DEPT, and 2D COSY, HETCOR, HSQC, HMBC and J-resolved spectroscopy to elucidate the molecular structure and skeleton of strychnine at 1 Tesla. Strychnine is exemplified here, because it is a basic precursor in the chemistry of natural products and is employed as a chemical weapon and as a doping agent in sports including the Olympics. In our study, the molecular structure of the compound could be identified either with a 1D experiment at high magnetic field or with HMBC and HSQC experiments at 1 T. In conclusion, low-field NMR spectroscopy enables the chemical elucidation of the strychnine structure through a simple click with a computer mouse. In situations where a high-field NMR spectrometer is unavailable, compact NMR spectrometers can nevertheless generate knowledge of the structure, important for identifying the different chemical reaction mechanisms associated with the molecule. Desktop NMR is a cost-effective viable option in chemical forensics. It can prove adulteration and identify the origin of different strychnine salts, in particular, the strychnine free base, strychnine hemisulphate and strychnine hydrochloride. The chemical shift signatures report the chemical structure of the molecules due to the impact

  16. The minimum alveolar concentration (MAC) of isoflurane in preterm neonates.

    Science.gov (United States)

    LeDez, K M; Lerman, J

    1987-09-01

    Studies in fetal lambs suggested that the minimum alveolar concentration (MAC) in preterm neonates may be less than that in full-term neonates and older infants. To determine the MAC of isoflurane in preterm neonates, 20 patients less than 32 weeks gestation at birth and 16 patients 32-37 weeks gestation at birth, all less than 1 month post-natal age, were studied. Following tracheal intubation, the neonates were anesthetized with a predetermined end-tidal concentration of isoflurane in oxygen and air. The move-no move responses to skin incision were recorded, and MAC was determined using the "up-and-down" technique. Heart rate and systolic arterial pressure were recorded awake, before skin incision, and after skin incision. MAC (mean +/- SD) of isoflurane in preterm neonates less than 32 weeks gestation was 1.28 +/- 0.17%, and MAC in neonates 32-37 weeks gestation was 1.41 +/- 0.18% (P less than 0.05). Although heart rate did not decrease significantly in either group during the study, systolic arterial pressure decreased between 20 and 30% below awake values both before and after skin incision in both age groups (P less than 0.01). We conclude that the MAC of isoflurane in preterm neonates less than 32 weeks gestation is significantly less than that in preterm neonates 32-37 weeks gestation, and that systolic arterial pressure decreases to a similar extent at approximately 1 MAC isoflurane in both age groups.

  17. Increased NMDA receptor inhibition at an increased Sevoflurane MAC

    Directory of Open Access Journals (Sweden)

    Brosnan Robert J

    2012-06-01

    Full Text Available Abstract Background Sevoflurane potently enhances glycine receptor currents and more modestly decreases NMDA receptor currents, each of which may contribute to immobility. This modest NMDA receptor antagonism by sevoflurane at a minimum alveolar concentration (MAC could be reciprocally related to large potentiation of other inhibitory ion channels. If so, then reduced glycine receptor potency should increase NMDA receptor antagonism by sevoflurane at MAC. Methods Indwelling lumbar subarachnoid catheters were surgically placed in 14 anesthetized rats. Rats were anesthetized with sevoflurane the next day, and a pre-infusion sevoflurane MAC was measured in duplicate using a tail clamp method. Artificial CSF (aCSF containing either 0 or 4 mg/mL strychnine was then infused intrathecally at 4 μL/min, and the post-infusion baseline sevoflurane MAC was measured. Finally, aCSF containing strychnine (either 0 or 4 mg/mL plus 0.4 mg/mL dizocilpine (MK-801 was administered intrathecally at 4 μL/min, and the post-dizocilpine sevoflurane MAC was measured. Results Pre-infusion sevoflurane MAC was 2.26%. Intrathecal aCSF alone did not affect MAC, but intrathecal strychnine significantly increased sevoflurane requirement. Addition of dizocilpine significantly decreased MAC in all rats, but this decrease was two times larger in rats without intrathecal strychnine compared to rats with intrathecal strychnine, a statistically significant (P  Conclusions Glycine receptor antagonism increases NMDA receptor antagonism by sevoflurane at MAC. The magnitude of anesthetic effects on a given ion channel may therefore depend on the magnitude of its effects on other receptors that modulate neuronal excitability.

  18. Increased NMDA receptor inhibition at an increased Sevoflurane MAC.

    Science.gov (United States)

    Brosnan, Robert J; Thiesen, Roberto

    2012-06-06

    Sevoflurane potently enhances glycine receptor currents and more modestly decreases NMDA receptor currents, each of which may contribute to immobility. This modest NMDA receptor antagonism by sevoflurane at a minimum alveolar concentration (MAC) could be reciprocally related to large potentiation of other inhibitory ion channels. If so, then reduced glycine receptor potency should increase NMDA receptor antagonism by sevoflurane at MAC. Indwelling lumbar subarachnoid catheters were surgically placed in 14 anesthetized rats. Rats were anesthetized with sevoflurane the next day, and a pre-infusion sevoflurane MAC was measured in duplicate using a tail clamp method. Artificial CSF (aCSF) containing either 0 or 4 mg/mL strychnine was then infused intrathecally at 4 μL/min, and the post-infusion baseline sevoflurane MAC was measured. Finally, aCSF containing strychnine (either 0 or 4 mg/mL) plus 0.4 mg/mL dizocilpine (MK-801) was administered intrathecally at 4 μL/min, and the post-dizocilpine sevoflurane MAC was measured. Pre-infusion sevoflurane MAC was 2.26%. Intrathecal aCSF alone did not affect MAC, but intrathecal strychnine significantly increased sevoflurane requirement. Addition of dizocilpine significantly decreased MAC in all rats, but this decrease was two times larger in rats without intrathecal strychnine compared to rats with intrathecal strychnine, a statistically significant (P MAC. The magnitude of anesthetic effects on a given ion channel may therefore depend on the magnitude of its effects on other receptors that modulate neuronal excitability.

  19. No Effect of Ambient Odor on the Affective Appraisal of a Desktop Virtual Environment with Signs of Disorder: e78721

    National Research Council Canada - National Science Library

    Alexander Toet; Martin van Schaik; Nicolet C M Theunissen

    2013-01-01

      Background Desktop virtual environments (VEs) are increasingly deployed to study the effects of environmental qualities and interventions on human behavior and safety related concerns in built environments...

  20. HydroDesktop as a Community Designed and Developed Resource for Hydrologic Data Discovery and Analysis

    Science.gov (United States)

    Ames, D. P.

    2013-12-01

    As has been seen in other informatics fields, well-documented and appropriately licensed open source software tools have the potential to significantly increase both opportunities and motivation for inter-institutional science and technology collaboration. The CUAHSI HIS (and related HydroShare) projects have aimed to foster such activities in hydrology resulting in the development of many useful community software components including the HydroDesktop software application. HydroDesktop is an open source, GIS-based, scriptable software application for discovering data on the CUAHSI Hydrologic Information System and related resources. It includes a well-defined plugin architecture and interface to allow 3rd party developers to create extensions and add new functionality without requiring recompiling of the full source code. HydroDesktop is built in the C# programming language and uses the open source DotSpatial GIS engine for spatial data management. Capabilities include data search, discovery, download, visualization, and export. An extension that integrates the R programming language with HydroDesktop provides scripting and data automation capabilities and an OpenMI plugin provides the ability to link models. Current revision and updates to HydroDesktop include migration of core business logic to cross platform, scriptable Python code modules that can be executed in any operating system or linked into other software front-end applications.

  1. Testing the quality of images for permanent magnet desktop MRI systems using specially designed phantoms.

    Science.gov (United States)

    Qiu, Jianfeng; Wang, Guozhu; Min, Jiao; Wang, Xiaoyan; Wang, Pengcheng

    2013-12-21

    Our aim was to measure the performance of desktop magnetic resonance imaging (MRI) systems using specially designed phantoms, by testing imaging parameters and analysing the imaging quality. We designed multifunction phantoms with diameters of 18 and 60 mm for desktop MRI scanners in accordance with the American Association of Physicists in Medicine (AAPM) report no. 28. We scanned the phantoms with three permanent magnet 0.5 T desktop MRI systems, measured the MRI image parameters, and analysed imaging quality by comparing the data with the AAPM criteria and Chinese national standards. Image parameters included: resonance frequency, high contrast spatial resolution, low contrast object detectability, slice thickness, geometrical distortion, signal-to-noise ratio (SNR), and image uniformity. The image parameters of three desktop MRI machines could be measured using our specially designed phantoms, and most parameters were in line with MRI quality control criterion, including: resonance frequency, high contrast spatial resolution, low contrast object detectability, slice thickness, geometrical distortion, image uniformity and slice position accuracy. However, SNR was significantly lower than in some references. The imaging test and quality control are necessary for desktop MRI systems, and should be performed with the applicable phantom and corresponding standards.

  2. Multichannel MAC Layer In Mobile Ad—Hoc Network

    Science.gov (United States)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  3. Handling Deafness Problem of Scheduled Multi-Channel Polling MACs

    Science.gov (United States)

    Jiang, Fulong; Liu, Hao; Shi, Longxing

    Combining scheduled channel polling with channel diversity is a promising way for a MAC protocol to achieve high energy efficiency and performance under both light and heavy traffic conditions. However, the deafness problem may cancel out the benefit of channel diversity. In this paper, we first investigate the deafness problem of scheduled multi-channel polling MACs with experiments. Then we propose and evaluate two schemes to handle the deafness problem. Our experiment shows that deafness is a significant reason for performance degradation in scheduled multi-channel polling MACs. A proper scheme should be chosen depending on the traffic pattern and the design objective.

  4. Cooperative energy harvesting-adaptive MAC protocol for WBANs.

    Science.gov (United States)

    Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos

    2015-05-28

    In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard.

  5. A Hybrid MacCormack-type Scheme for Computational Aeroacoustics

    Science.gov (United States)

    Yazdani, Soroush

    A new type of MacCormack scheme, using a modified Low Dissipation and Dispersion Runge-Kutta time marching method, is presented. This scheme is using two stages in every step which implements biased spatial differencing stencils and for the remaining stages uses non-dissipative central differencing stencils. Because of using the MacCormack-type scheme in this method, the new scheme carries an inherent artificial dissipation which uses the ease of implementing boundary condition specifications of a two-stage MacCormack scheme.

  6. iMac G3 Blueberry 350MHz

    CERN Multimedia

    2000-01-01

    The iMac G3 is an all-in-one personal computer, encompassing both the monitor and the computer in one package. It allowed to revitalize the Apple brand that was in decline and close to financial ruin. Originally released in striking bondi blue and later a range of other translucent plastic envelopes in bright colors. The iMac comes with a keyboard and mouse matching the color of the case. The iMac G3 was sold from 1998 to 2003 and has been updated many times.

  7. IMIS desktop & smartphone software solutions for monitoring spacecrafts' payload from anywhere

    Science.gov (United States)

    Baroukh, J.; Queyrut, O.; Airaud, J.

    In the past years, the demand for satellite remote operations has increased guided by on one hand, the will to reduce operations cost (on-call operators out of business hours), and on the other hand, the development of cooperation space missions resulting in a world wide distribution of engineers and science team members. Only a few off-the-shelf solutions exist to fulfill the need of remote payload monitoring, and they mainly use proprietary devices. The recent advent of mobile technologies (laptops, smartphones and tablets) as well as the worldwide deployment of broadband networks (3G, Wi-Fi hotspots), has opened up a technical window that brings new options. As part of the Mars Science Laboratory (MSL) mission, the Centre National D'Etudes Spatiales (CNES, the French space agency) has developed a new software solution for monitoring spacecraft payloads. The Instrument Monitoring Interactive Software (IMIS) offers state-of-the-art operational features for payload monitoring, and can be accessed remotely. It was conceived as a generic tool that can be used for heterogeneous payloads and missions. IMIS was designed as a classical client/server architecture. The server is hosted at CNES and acts as a data provider while two different kinds of clients are available depending on the level of mobility required. The first one is a rich client application, built on Eclipse framework, which can be installed on usual operating systems and communicates with the server through the Internet. The second one is a smartphone application for any Android platform, connected to the server thanks to the mobile broadband network or a Wi-Fi connection. This second client is mainly devoted to on-call operations and thus only contains a subset of the IMIS functionalities. This paper describes the operational context, including security aspects, that led IMIS development, presents the selected software architecture and details the various features of both clients: the desktop and the sm

  8. Cross-Cultural Adaptations of the MacArthur Competence Assessment Tool for Treatment in Iran

    Directory of Open Access Journals (Sweden)

    Saber

    2016-01-01

    Full Text Available Background According to general ethical and legal principles, valid consent must be obtained before starting any procedure. Objectives Due to the lack of a standard tool for assessing patients’ capacity to consent to medical treatment in Iran, the present study was carried out aiming to devise a Persian version of a cross-cultural adaptation of the MacArthur competence assessment tool. Patients and Methods By reviewing different methods of cultural translation and adaptation for assessment tools, and due to the lack of consensus on its processes, we selected Wild’s model as one of the most comprehensive methods in this regard. Wild’s (2005 10-stage model includes preparation, forward translation, reconciliation of the forward translation, back translation of reconciliation, back translation review, cognitive debriefing and cognitive review, and finalization, proofreading and final reporting. Using this model, we translated the MacArthur assessment tool and made it adaptable to Iranian patients. Results The MacArthur assessment tool is not dependent on any specific culture and language. As a result, if translation and its scientific adaptation are done based on an integrated and detailed model, the tool can be used for every culture and language. In other words, this tool is not culture-specific; so, it is applicable in cases where a translation is needed, and it can be culturally adapted to suit different societies. Conclusions In the present study, we are able to focus on and prove the efficacy and benefits of this measurement tool.

  9. PAD-MAC: primary user activity-aware distributed MAC for multi-channel cognitive radio networks.

    Science.gov (United States)

    Ali, Amjad; Piran, Md Jalil; Kim, Hansoo; Yun, Jihyeok; Suh, Doug Young

    2015-03-30

    Cognitive radio (CR) has emerged as a promising technology to solve problems related to spectrum scarcity and provides a ubiquitous wireless access environment. CR-enabled secondary users (SUs) exploit spectrum white spaces opportunistically and immediately vacate the acquired licensed channels as primary users (PUs) arrive. Accessing the licensed channels without the prior knowledge of PU traffic patterns causes severe throughput degradation due to excessive channel switching and PU-to-SU collisions. Therefore, it is significantly important to design a PU activity-aware medium access control (MAC) protocol for cognitive radio networks (CRNs). In this paper, we first propose a licensed channel usage pattern identification scheme, based on a two-state Markov model, and then estimate the future idle slots using previous observations of the channels. Furthermore, based on these past observations, we compute the rank of each available licensed channel that gives SU transmission success assessment during the estimated idle slot. Secondly, we propose a PU activity-aware distributed MAC (PAD-MAC) protocol for heterogeneous multi-channel CRNs that selects the best channel for each SU to enhance its throughput. PAD-MAC controls SU activities by allowing them to exploit the licensed channels only for the duration of estimated idle slots and enables predictive and fast channel switching. To evaluate the performance of the proposed PAD-MAC, we compare it with the distributed QoS-aware MAC (QC-MAC) and listen-before-talk MAC schemes. Extensive numerical results show the significant improvements of the PAD-MAC in terms of the SU throughput, SU channel switching rate and PU-to-SU collision rate.

  10. Infecting Windows, Linux & Mac in one go

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Still love bashing on Windows as you believe it is an insecure operating system? Hold on a second! Just recently, a vulnerability has been published for Java 7.   It affects Windows/Linux PCs and Macs, Internet Explorer, Safari and Firefox. In fact, it affects all computers that have enabled the Java 7 plug-in in their browser (Java 6 and earlier is not affected). Once you visit a malicious website (and there are plenty already out in the wild), your computer is infected… That's "Game Over" for you.      And this is not the first time. For a while now, attackers have not been targeting the operating system itself, but rather aiming at vulnerabilities inherent in e.g. your Acrobat Reader, Adobe Flash or Java programmes. All these are standard plug-ins added into your favourite web browser which make your web-surfing comfortable (or impossible when you un-install them). A single compromised web-site, however, is sufficient to prob...

  11. Interoperability of Linux and Windows in Desktop Domain%Linux与Windows在桌面领域的互操作性

    Institute of Scientific and Technical Information of China (English)

    王亚军

    2012-01-01

    Linux和Windows都是计算机操作系统领域中的技术热点,两者实现互操作有利于在竞争中共同推动操作系统技术向纵深发展.针对Linux和Windows在桌面领域中的互操作问题,文中作了系统的阐述.在桌面领域,Linux和Windows可以采用API仿真等虚拟化技术或修改操作系统源代码的方法来互运行对方程序,可以采用开放、通用与统一的数据文件格式标准来互处理数据文件,可以采用内核空间文件系统机制或用户空间文件系统机制来互访问文件系统等.%Linux and Windows are both hot points in the academic field of computer technology. The interoperability of them two further expands their respective development area. On the other hand, some new technology problems are also produced. Focusing on the interoperability of Linux and Windows in desktop domain, this paper goes into a little more detail about these problems and their solutions. In desktop domain, the two operating systems can mutually run programs by adopting virtualization technologies such as API emulation or by altering source codes of operating systems, can mutually deal with data files by adopting open, common and unified data file format standards, and can mutually access file systems by adopting the mechanism of file system in kernel space or in user space.

  12. Prior determination of baseline minimum alveolar concentration (MAC) of isoflurane does not influence the effect of ketamine on MAC in rabbits.

    Science.gov (United States)

    Gianotti, Giacomo; Valverde, Alexander; Sinclair, Melissa; Dyson, Doris H; Gibson, Thomas; Johnson, Ron

    2012-10-01

    The objective of this study was to compare the effect on the minimum alveolar concentration (MAC) of isoflurane when ketamine was administered either after or without prior determination of the baseline MAC of isoflurane in rabbits. Using a prospective randomized crossover study, 8 adult, female New Zealand rabbits were allocated to 2 treatment groups. Anesthesia was induced and maintained with isoflurane. Group 1 (same-day determination) had the MAC-sparing effect of ketamine [1 mg/kg bodyweight (BW) bolus followed by a constant rate infusion (CRI) of 40 μg/kg BW per min, given by intravenous (IV)], which was determined after the baseline MAC of isoflurane was determined beforehand. A third MAC determination was started 30 min after stopping the CRI. Group 2 (separate-day determination) had the MAC-sparing effect of ketamine determined without previous determination of the baseline MAC of isoflurane. A second MAC determination was started 30 min after stopping the CRI. In group 1, the MAC of isoflurane (2.15 ± 0.09%) was significantly decreased by ketamine (1.63 ± 0.07%). After stopping the CRI, the MAC was significantly less (2.04 ± 0.11%) than the baseline MAC of isoflurane and significantly greater than the MAC during the CRI. In group 2, ketamine decreased isoflurane MAC (1.53 ± 0.22%) and the MAC increased significantly (1.94 ± 0.25%) after stopping the CRI. Minimum alveolar concentration (MAC) values did not differ significantly between the groups either during ketamine administration or after stopping ketamine. Under the study conditions, prior determination of the baseline isoflurane MAC did not alter the effect of ketamine on MAC. Both methods of determining MAC seemed to be valid for research purposes.

  13. Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications

    Directory of Open Access Journals (Sweden)

    Timothy Pavlic

    2008-03-01

    Full Text Available Desktop search applications can contain cached copies of files that were deleted from the file system. Forensic investigators see this as a potential source of evidence, as documents deleted by suspects may still exist in the cache. Whilst there have been attempts at recovering data collected by desktop search applications, there is no methodology governing the process, nor discussion on the most appropriate means to do so. This article seeks to address this issue by developing a process model that can be applied when developing an information extraction application for desktop search applications, discussing preferred methods and the limitations of each. This work represents a more structured approach than other forms of current research.

  14. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    Science.gov (United States)

    Zacharias, Sven; Newe, Thomas

    2011-08-01

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  15. After MacIntyre : Kaasaegsest vooruseetikast / Meego Remmel

    Index Scriptorium Estoniae

    Remmel, Meego

    2006-01-01

    Alasdair MacIntyre panus 20. sajandi eetikasse. Tema käsitlus vooruseetikast ja vooruseetilisest perspektiivist, mida on võimalik näha komplekselt, vaadeldes voorust, praktikat, narratiivi ja traditsiooni mõisteid

  16. After MacIntyre : Kaasaegsest vooruseetikast / Meego Remmel

    Index Scriptorium Estoniae

    Remmel, Meego

    2006-01-01

    Alasdair MacIntyre panus 20. sajandi eetikasse. Tema käsitlus vooruseetikast ja vooruseetilisest perspektiivist, mida on võimalik näha komplekselt, vaadeldes voorust, praktikat, narratiivi ja traditsiooni mõisteid

  17. Design and Implementation of an Efficient 64 bit MAC

    Directory of Open Access Journals (Sweden)

    Mohammad Shabber Hasan Khan

    2015-08-01

    Full Text Available The design of optimized 64 bit multiplier and accumulator (MAC unit is implemented in this paper. MAC unit plays major role in many of the digital signal processing (DSP applications. The MAC unit is designed with the combinations of multipliers and adders. In the proposed method MAC unit is implemented using Vedic multiplier and the adder is done with ripple carry adder .The components are reduced by implementing Vedic multiplier using the techniques of Vedic mathematics that have been modified to improve performance. a high speed processor depends significantly on the multiplier as it is one of the key hardware blocks in most digital signal processing systems as well as in general processors. The area is optimized effectively using Vedic multiplier .The total design implemented using Xilinx.

  18. Beamforming in Ad Hoc Networks: MAC Design and Performance Modeling

    National Research Council Canada - National Science Library

    Fakih, Khalil; Diouris, Jean-Francois; Andrieux, Guillaume

    2009-01-01

    .... Our proposition performs jointly channel estimation and radio resource sharing. We validate the fruitfulness of the proposed MAC and we evaluate the effects of the channel estimation on the network performance...

  19. Aeronautical Mobile Airport Communications System (AeroMACS)

    Science.gov (United States)

    Budinger, James M.; Hall, Edward

    2011-01-01

    To help increase the capacity and efficiency of the nation s airports, a secure wideband wireless communications system is proposed for use on the airport surface. This paper provides an overview of the research and development process for the Aeronautical Mobile Airport Communications System (AeroMACS). AeroMACS is based on a specific commercial profile of the Institute of Electrical and Electronics Engineers (IEEE) 802.16 standard known as Wireless Worldwide Interoperability for Microwave Access or WiMAX (WiMax Forum). The paper includes background on the need for global interoperability in air/ground data communications, describes potential AeroMACS applications, addresses allocated frequency spectrum constraints, summarizes the international standardization process, and provides findings and recommendations from the world s first AeroMACS prototype implemented in Cleveland, Ohio, USA.

  20. Rating of new outlet structures for MacFarlane Reservoir

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Memorandum explaining the new work on the outlet structure at MacFarlane Reservoir. Flow measurements were taken at different staff gage elevations and this data is...

  1. Big Mac arvestab raha ostujõudu / Harli Uljas

    Index Scriptorium Estoniae

    Uljas, Harli

    2005-01-01

    The Economist võrdleb maailma valuutade suhestamiseks Big Mac'i burgeri hindu 120 riigis, kuna see meetod võimaldab saada ülevaate riikide elanikkonna tegelikust ostujõust. Tabel: Hamburgeri standard

  2. Big Mac arvestab raha ostujõudu / Harli Uljas

    Index Scriptorium Estoniae

    Uljas, Harli

    2005-01-01

    The Economist võrdleb maailma valuutade suhestamiseks Big Mac'i burgeri hindu 120 riigis, kuna see meetod võimaldab saada ülevaate riikide elanikkonna tegelikust ostujõust. Tabel: Hamburgeri standard

  3. MAC layer security issues in wireless mesh networks

    Science.gov (United States)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  4. A tribute to Lloyd D. MacLean.

    Science.gov (United States)

    Keith, Roger G

    2015-08-01

    Dr. Lloyd D. MacLean, long-time co-editor of the Canadian Journal of Surgery passed away earlier this year at the age of 90. In order to appreciate the contributions of Dr. MacLean to the journal, this commentary recognizes him as a humble surgeon–scientist who was one of — if not the — most outstanding Canadian ambassadors to academic surgery in North America.

  5. Conformal holonomy in MacDowell-Mansouri gravity

    Energy Technology Data Exchange (ETDEWEB)

    Reid, James A., E-mail: j.a.reid@abdn.ac.uk [SUPA Department of Physics, University of Aberdeen, Aberdeen, AB24 3UE (United Kingdom); Wang, Charles H.-T., E-mail: c.wang@abdn.ac.uk [SUPA Department of Physics, University of Aberdeen, Aberdeen, AB24 3UE (United Kingdom); STFC Rutherford Appleton Laboratory, Chilton, Didcot, Oxon, OX11 0QX (United Kingdom)

    2014-03-15

    The MacDowell-Mansouri formulation of general relativity is based on a gauge theory whose gauge algebra depends on the sign of the cosmological constant. In this article, we show that the gauge algebra is uniquely determined by the conformal structure of spacetime itself. Specifically, we show that in vacuum: the spacetime conformal holonomy algebra coincides with the MacDowell-Mansouri gauge algebra for both signs of the cosmological constant, in both Lorentzian and Euclidean metric signatures.

  6. Some Problems of Alasdair MacIntyre’s "Emotivism Thesis"

    OpenAIRE

    2016-01-01

    In this article Alasdair MacIntyre’s thesis concerning emotivist use of moral utterances in contemporary liberal societies is analysed. One tries to show that it needs further clarification since at least three elements of MacIntyre’s argument seem to pose certain problems; these are: ‘discussion halt’ as the source of emotivism, comprehensive doctrines as premises of respective arguments in liberal debates and the problem of incommensurability. These three problematic eleme...

  7. Applications and a Three-dimensional Desktop Environment for an Immersive Virtual Reality System

    CERN Document Server

    Kageyama, Akira

    2013-01-01

    We developed an application launcher called Multiverse for scientific visualizations in a CAVE-type virtual reality (VR) system. Multiverse can be regarded as a type of three-dimensional (3D) desktop environment. In Multiverse, a user in a CAVE room can browse multiple visualization applications with 3D icons and explore movies that float in the air. Touching one of the movies causes "teleportation" into the application's VR space. After analyzing the simulation data using the application, the user can jump back into Multiverse's VR desktop environment in the CAVE.

  8. 42 CFR 423.2102 - Request for MAC review when ALJ issues decision or dismissal.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Request for MAC review when ALJ issues decision or... Reopening, ALJ Hearings, MAC review, and Judicial Review § 423.2102 Request for MAC review when ALJ issues decision or dismissal. (a)(1) An enrollee to the ALJ hearing may request a MAC review if the enrollee files...

  9. 42 CFR 423.2062 - Applicability of policies not binding on the ALJ and MAC.

    Science.gov (United States)

    2010-10-01

    ... and MAC. 423.2062 Section 423.2062 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT... BENEFIT Reopening, ALJ Hearings, MAC review, and Judicial Review § 423.2062 Applicability of policies not binding on the ALJ and MAC. (a) ALJs and the MAC are not bound by CMS program guidance, such as program...

  10. 42 CFR 423.2110 - MAC reviews on its own motion.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false MAC reviews on its own motion. 423.2110 Section 423... (CONTINUED) MEDICARE PROGRAM VOLUNTARY MEDICARE PRESCRIPTION DRUG BENEFIT Reopening, ALJ Hearings, MAC review, and Judicial Review § 423.2110 MAC reviews on its own motion. (a) General rule. The MAC may decide on...

  11. 42 CFR 423.2050 - Removal of a hearing request from an ALJ to the MAC.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Removal of a hearing request from an ALJ to the MAC..., ALJ Hearings, MAC review, and Judicial Review § 423.2050 Removal of a hearing request from an ALJ to the MAC. If a request for hearing is pending before an ALJ, the MAC may assume responsibility for...

  12. 42 CFR 423.2108 - MAC Actions when request for review is filed.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false MAC Actions when request for review is filed. 423... Hearings, MAC review, and Judicial Review § 423.2108 MAC Actions when request for review is filed. (a) General. Except as specified in paragraph (c) of this section, when an enrollee requests that the MAC...

  13. A new real-time ethernet MAC protocol for time-critical applications

    Institute of Scientific and Technical Information of China (English)

    沈钢; 许晓鸣; 蔡云泽; 何星; 张卫东

    2002-01-01

    The authors propose a new persistent transmission-based real-time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real-time frames. Moreover, it is compatible with the protocol used by the existing Ethernet controllers for conventional datagram traffic and thus standard Ethernet stations can be used in the system without any modification. The paper describes the protocol in detail and analyses the maximum delivery delay for real-time traffic and the efficiency of the channel.

  14. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  15. Anaesthesia with sevoflurane in pigeons: minimal anaesthetic concentration (MAC) determination and investigation of cardiorespiratory variables at 1 MAC.

    Science.gov (United States)

    Botman, J; Gabriel, F; Dugdale, A H A; Vandeweerd, J-M

    2016-05-28

    The objective of the study was to determine the minimal anaesthetic concentration (MAC) of sevoflurane (SEVO) in pigeons and investigate the effects of 1 MAC SEVO anaesthesia on cardiovascular and respiratory variables compared with the awake state. This is a prospective, experimental study. Animals were seven healthy adult pigeons. After acclimatisation to handling, heart rate (HR), heart rhythm, respiratory rate (fR), end-expired carbon dioxide tension (PE'CO2), inspired CO2 tension, indirect systolic arterial blood pressure (SAP) and cloacal temperature were measured to determine baseline, 'awake' values. Pigeons were then anaesthetised with SEVO and MAC was determined by the 'bracketing' method. The same variables were monitored during a 40 minute period at 1.0 MAC SEVO for each bird. Mean MAC was 3.0±0.6 per cent for SEVO. During maintenance of anaesthesia at 1.0 MAC, SAP decreased significantly (Pawake PE'CO2 values were unexpectedly low. Sinus arrhythmias were detected in two birds under SEVO anaesthesia. The times to tracheal intubation and to recovery were 2.5±0.7 and 6.4±1.7 minutes, respectively. Recovery was rapid and uneventful in all birds. In conclusion, SEVO is suitable for anaesthesia in pigeons. British Veterinary Association.

  16. Learning Unix for Mac OS X Tiger Unlock the Power of Unix

    CERN Document Server

    Taylor, Dave

    2005-01-01

    Thoroughly revised and updated for Mac OS X Tiger, this new edition introduces Mac users to the Terminal application and shows you how to navigate the command interface, explore hundreds of Unix applications that come with the Mac, and, most importantly, how to take advantage of both the Mac and Unix interfaces. If you want to master the command-line, this gentle guide to using Unix on Mac OS X Tiger is well worth its cover price

  17. Writing Essays on a Laptop or a Desktop Computer: Does It Matter?

    Science.gov (United States)

    Ling, Guangming; Bridgeman, Brent

    2013-01-01

    To explore the potential effect of computer type on the Test of English as a Foreign Language-Internet-Based Test (TOEFL iBT) Writing Test, a sample of 444 international students was used. The students were randomly assigned to either a laptop or a desktop computer to write two TOEFL iBT practice essays in a simulated testing environment, followed…

  18. Students' Beliefs about Mobile Devices vs. Desktop Computers in South Korea and the United States

    Science.gov (United States)

    Sung, Eunmo; Mayer, Richard E.

    2012-01-01

    College students in the United States and in South Korea completed a 28-item multidimensional scaling (MDS) questionnaire in which they rated the similarity of 28 pairs of multimedia learning materials on a 10-point scale (e.g., narrated animation on a mobile device Vs. movie clip on a desktop computer) and a 56-item semantic differential…

  19. Writing Essays on a Laptop or a Desktop Computer: Does It Matter?

    Science.gov (United States)

    Ling, Guangming; Bridgeman, Brent

    2013-01-01

    To explore the potential effect of computer type on the Test of English as a Foreign Language-Internet-Based Test (TOEFL iBT) Writing Test, a sample of 444 international students was used. The students were randomly assigned to either a laptop or a desktop computer to write two TOEFL iBT practice essays in a simulated testing environment, followed…

  20. Use of Signaling to Integrate Desktop Virtual Reality and Online Learning Management Systems

    Science.gov (United States)

    Dodd, Bucky J.; Antonenko, Pavlo D.

    2012-01-01

    Desktop virtual reality is an emerging educational technology that offers many potential benefits for learners in online learning contexts; however, a limited body of research is available that connects current multimedia learning techniques with these new forms of media. Because most formal online learning is delivered using learning management…

  1. Free Molecular Heat Transfer Programs for Setup and Dynamic Updating the Conductors in Thermal Desktop

    Science.gov (United States)

    Malroy, Eric T.

    2007-01-01

    The programs, arrays and logic structure were developed to enable the dynamic update of conductors in thermal desktop. The MatLab program FMHTPRE.m processes the Thermal Desktop conductors and sets up the arrays. The user needs to manually copy portions of the output to different input regions in Thermal Desktop. Also, Fortran subroutines are provided that perform the actual updates to the conductors. The subroutines are setup for helium gas, but the equations can be modified for other gases. The maximum number of free molecular conductors allowed is 10,000 for a given radiation task. Additional radiation tasks for FMHT can be generated to account for more conductors. Modifications to the Fortran subroutines may be warranted, when the mode of heat transfer is in the mixed or continuum mode. The FMHT Thermal Desktop model should be activated by using the "Case Set Manager" once the model is setup. Careful setup of the model is needed to avoid excessive solve times.

  2. Computing on the Desktop: From Batch to Online in Two Large Danish Service Bureaus

    DEFF Research Database (Denmark)

    Jørgensen, Anker Helms

    The advent of the personal computer is often hailed as the major step towards empowering the computer user. This step was indeed significant, but it was preceeded by a similar step some 10-15 years earlier: the advent of the video terminal or ”glass–TTY”. The video terminal invaded the desktop...

  3. Students' Beliefs about Mobile Devices vs. Desktop Computers in South Korea and the United States

    Science.gov (United States)

    Sung, Eunmo; Mayer, Richard E.

    2012-01-01

    College students in the United States and in South Korea completed a 28-item multidimensional scaling (MDS) questionnaire in which they rated the similarity of 28 pairs of multimedia learning materials on a 10-point scale (e.g., narrated animation on a mobile device Vs. movie clip on a desktop computer) and a 56-item semantic differential…

  4. Generating Alternative Engineering Designs by Integrating Desktop VR with Genetic Algorithms

    Science.gov (United States)

    Chandramouli, Magesh; Bertoline, Gary; Connolly, Patrick

    2009-01-01

    This study proposes an innovative solution to the problem of multiobjective engineering design optimization by integrating desktop VR with genetic computing. Although, this study considers the case of construction design as an example to illustrate the framework, this method can very much be extended to other engineering design problems as well.…

  5. Film Pedagogy in the History Classroom: Desktop Documentary-Making Skills for History Teachers and Students

    Science.gov (United States)

    Schul, James E.

    2014-01-01

    The emergence of digital technology provides new opportunities for teaching and learning in the history classroom. However, these new opportunities often require new skills to be learned by teachers and students alike. This article focuses on one such digitally oriented strategy, desktop documentary making, which empowers students to easily make…

  6. Generating Alternative Engineering Designs by Integrating Desktop VR with Genetic Algorithms

    Science.gov (United States)

    Chandramouli, Magesh; Bertoline, Gary; Connolly, Patrick

    2009-01-01

    This study proposes an innovative solution to the problem of multiobjective engineering design optimization by integrating desktop VR with genetic computing. Although, this study considers the case of construction design as an example to illustrate the framework, this method can very much be extended to other engineering design problems as well.…

  7. Negotiation of Meaning in Desktop Videoconferencing-Supported Distance Language Learning

    Science.gov (United States)

    Wang, Yuping

    2006-01-01

    The aim of this research is to reveal the dynamics of focus on form in task completion via videoconferencing. This examination draws on current second language learning theories regarding effective language acquisition, research in Computer Mediated Communication (CMC) and empirical data from an evaluation of desktop videoconferencing-supported…

  8. Empirical Analysis of Server Consolidation and Desktop Virtualization in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Bao Rong Chang

    2013-01-01

    Full Text Available Physical server transited to virtual server infrastructure (VSI and desktop device to virtual desktop infrastructure (VDI have the crucial problems of server consolidation, virtualization performance, virtual machine density, total cost of ownership (TCO, and return on investments (ROI. Besides, how to appropriately choose hypervisor for the desired server/desktop virtualization is really challenging, because a trade-off between virtualization performance and cost is a hard decision to make in the cloud. This paper introduces five hypervisors to establish the virtual environment and then gives a careful assessment based on C/P ratio that is derived from composite index, consolidation ratio, virtual machine density, TCO, and ROI. As a result, even though ESX server obtains the highest ROI and lowest TCO in server virtualization and Hyper-V R2 gains the best performance of virtual machine management; both of them however cost too much. Instead the best choice is Proxmox Virtual Environment (Proxmox VE because it not only saves the initial investment a lot to own a virtual server/desktop infrastructure, but also obtains the lowest C/P ratio.

  9. C-MAC compared with direct laryngoscopy for intubation in patients with cervical spine immobilization: A manikin trial.

    Science.gov (United States)

    Smereka, Jacek; Ladny, Jerzy R; Naylor, Amanda; Ruetzler, Kurt; Szarpak, Lukasz

    2017-08-01

    The aim of this study was to compare C-MAC videolaryngoscopy with direct laryngoscopy for intubation in simulated cervical spine immobilization conditions. The study was designed as a prospective randomized crossover manikin trial. 70 paramedics with MAC and C-MAC on the first attempt (95.7% MAC vs. 100% C-MAC), with similar intubation times (16.5s MAC vs. 18s C-MAC). Scenario B: The results with C-MAC were significantly better than those with MAC (pMAC vs. 19 s C-MAC), success of the first intubation attempt (88.6% MAC vs. 100% C-MAC), Cormack-Lehane grade, POGO score, severity of dental compression, device difficulty score, and preferred airway device. Scenario C: The results with C-MAC were significantly better than those with MAC (pMAC vs. 100% C-MAC), overall success rate, intubation time (27 s MAC vs. 20.5 s C-MAC), Cormack-Lehane grade, POGO score, dental compression, device difficulty score and the preferred airway device. The C-MAC videolaryngoscope is an excellent alternative to the MAC laryngoscope for intubating manikins with cervical spine immobilization. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Victor Bérard et la Macédoine

    Directory of Open Access Journals (Sweden)

    Ivan Savev

    2011-01-01

    Full Text Available Un helléniste convaincu, Victor Bérard, en vient, au début du XXe siècle à soutenir l’existence de « Macédoniens » et le slogan « la Macédoine aux Macédoniens”.Le Congrès de Berlin en 1878 avait laissé la Macédoine aux mains des Ottomans. La Grèce, la Serbie et la Bulgarie, parvenues à ses limites et prévoyant le retrait futur des Ottomans peaufinent les arguments linguistiques et historiques qui justifieront leurs revendications territoriales. Victor Bérard, un helléniste respecté et bon connaisseur de la région sud balkanique, effectue des enquêtes en Macédoine en 1896 et 1903 qu’il publie à Paris.Cette étude montre comment, dans le contexte de la propagande nationaliste des prétendants à la possession de la Macédoine, Victor Bérard en vient progressivement à affirmer qu’il existe une population autochtone, les Macédoniens. Il soutient leur programme pour la constitution d’une fédération ou confédération avec le slogan « la Macédoine aux Macédoniens » ce qui fait toute l’actualité de ses ouvrages.In 1878, the Congress of Berlin had left Macedonia in the hands of the Ottomans. Greece, Serbia and Bulgaria had reached its limits. Anticipating the Ottoman retreat, they polish language and historical arguments that will justify their territorial claims. Victor Bérard, a respected Hellenist and a good expert of the southern Balkans, is doing researches in Macedonia in 1896 and 1903. These will be later published in Paris.This study shows how, in the context of the nationalist propaganda build-up made by the candidates for the possession of Macedonia, Victor Bérard comes progressively to assert the existence of a native population: the Macedonians. He supports their program for the forming of a federation or confederation which slogan would be “Macedonia to Macedonians”. This makes his works very topical.

  11. Dolphin natures, human virtues: MacIntyre and ethical naturalism.

    Science.gov (United States)

    Glackin, Shane Nicholas

    2008-09-01

    Can biological facts explain human morality? Aristotelian 'virtue' ethics has traditionally assumed so. In recent years Alasdair MacIntyre has reintroduced a form of Aristotle's 'metaphysical biology' into his ethics. He argues that the ethological study of dependence and rationality in other species--dolphins in particular--sheds light on how those same traits in the typical lives of humans give rise to the moral virtues. However, some goal-oriented dolphin behaviour appears both dependent and rational in the precise manner which impresses MacIntyre, yet anything but ethically 'virtuous'. More damningly, dolphin ethologists consistently refuse to evaluate such behaviour in the manner MacIntyre claims is appropriate to moral judgement. In light of this, I argue that virtues--insofar as they name a biological or ethological category--do not name a morally significant one.

  12. An Energy Efficient MAC Proto col for Linear WSNs

    Institute of Scientific and Technical Information of China (English)

    DAI Guoyong; MIAO Chunyu; YING Kezhen; WANG Kai; CHEN Qingzhang

    2015-01-01

    Wireless sensor networks (WSNs) have been employed as an ideal solution in many applications for data gathering in harsh environment. Energy consumption is a key issue in wireless sensor networks since nodes are often battery operated. Medium access control (MAC) pro-tocol plays an important role in energy efficiency in wire-less sensor networks because nodes’ access to the shared medium is coordinated by the MAC layer. An energy ef-ficient MAC protocol is designed for data gathering in linear wireless sensor networks. In order to enhance the performance, when a source node transmits data to the sink, proper relay nodes are selected for forwarding data according to the energy consumption factor and residual energy balance factor. Some simulation experiments are conducted and the results show that, the proposed proto-col provides better energy efficiency and long lifetime than the existing DMAC protocol.

  13. A Fair-Priority MAC design in Networked Control System

    Directory of Open Access Journals (Sweden)

    Hongjun Li

    2009-10-01

    Full Text Available Media Access Control (MAC protocols in Wireless Networked Control System (WNCS must minimize the radio energy costs in sensor nodes. Latency and throughput are also important design features for MAC protocols in the applications. But most of them cannot guarantee quality for real-time traffic. This paper studies the state of the art of current real-time MAC protocols, and then introduces a medium access control protocol and a improved protocol that provide multiple priority levels and hard real-time transmission. The channel is accessed by sensors according to their priorities. Sensors send frames in a round manner with same priority. The fairness between different priorities is provided. The channel access procedure is divided into two stages: broadcast period and transmission period. Simulation and experiment results indicate that our protocol provides high channel utilization and bounded delays for real-time communication and can be well applied in the many fields especially the dynamic wireless sensor networks.

  14. Implementation of MAC by using Modified Vedic Multiplier

    Directory of Open Access Journals (Sweden)

    Sreelekshmi M. S.

    2013-09-01

    Full Text Available Multiplier Accumulator Unit (MAC is a part of Digital Signal Processors. The speed of MAC depends on the speed of multiplier. So by using an efficient Vedic multiplier which excels in terms of speed, power and area, the performance of MAC can be increased. For this fast method of multiplication based on ancient Indian Vedic mathematics is proposed in this paper. Among various method of multiplication in Vedic mathematics, Urdhva Tiryagbhyam is used and the multiplication is for 32 X 32 bits. Urdhva Tiryagbhyam is a general multiplication formula applicable to all cases of multiplication. Adder used is Carry Look Ahead adder. The proposed design shows improvement over carry save adder.

  15. Cognitive MAC Protocols for General Primary Network Models

    CERN Document Server

    Mehanna, Omar; Gamal, Hesham El

    2009-01-01

    We consider the design of cognitive Medium Access Control (MAC) protocols enabling a secondary (unlicensed) transmitter-receiver pair to communicate over the idle periods of a set of primary (licensed) channels. More specifically, we propose cognitive MAC protocols optimized for both slotted and un-slotted primary networks. For the slotted structure, the objective is to maximize the secondary throughput while maintaining synchronization between the secondary pair and not causing interference to the primary network. Our investigations differentiate between two sensing scenarios. In the first, the secondary transmitter is capable of sensing all the primary channels, whereas it senses only a subset of the primary channels in the second scenario. In both cases, we propose blind MAC protocols that efficiently learn the statistics of the primary traffic on-line and asymptotically achieve the throughput obtained when prior knowledge of primary traffic statistics is available. For the un-slotted structure, the object...

  16. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs.

    Science.gov (United States)

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-02-10

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings.

  17. ETEEM- Extended Traffic Aware Energy Efficient MAC Scheme for WSNs

    Directory of Open Access Journals (Sweden)

    Younas Khan

    2016-11-01

    Full Text Available Idle listening issue arises when a sensor node listens to medium despite the absence of data which results in consumption of energy. ETEEM is a variant of Traffic Aware Energy Efficient MAC protocol (TEEM which focuses on energy optimization due to reduced idle listening time and much lesser overhead on energy sources. It uses a novel scheme for using idle listening time of sensor nodes. The nodes are only active for small amount of time and most of the time, will be in sleep mode when no data is available. ETEEM reduces energy at byte level and uses a smaller byte packet called FLAG replacing longer byte SYNC packets of S-MAC and SYNCrts of TEEM respectively. It also uses a single acknowledgement packet per data set hence reducing energy while reducing frequency of the acknowledgment frames sent. The performance of ETEEM is 70% better comparative to other under-consideration MAC protocols.

  18. Office for iPad and Mac for dummies

    CERN Document Server

    Weverka, Peter

    2015-01-01

    The easy way to work with Office on your iPad or Mac Are you a Mac user who isn't accustomed to working with Microsoft Office? Consider this friendly guide your go-to reference! Written in plain English and packed with easy-to-follow, step-by-step instructions, Office for iPad and Mac For Dummies walks you through every facet of Office, from installing the software and opening files to working with Word, Excel, PowerPoint, and Outlook-and beyond. Plus, you'll discover how to manage files, share content and collaborate online through social media, and find help when you need it. Two things a

  19. SACRB-MAC: A High-Capacity MAC Protocol for Cognitive Radio Sensor Networks in Smart Grid.

    Science.gov (United States)

    Yang, Zhutian; Shi, Zhenguo; Jin, Chunlin

    2016-03-31

    The Cognitive Radio Sensor Network (CRSN) is considered as a viable solution to enhance various aspects of the electric power grid and to realize a smart grid. However, several challenges for CRSNs are generated due to the harsh wireless environment in a smart grid. As a result, throughput and reliability become critical issues. On the other hand, the spectrum aggregation technique is expected to play an important role in CRSNs in a smart grid. By using spectrum aggregation, the throughput of CRSNs can be improved efficiently, so as to address the unique challenges of CRSNs in a smart grid. In this regard, we proposed Spectrum Aggregation Cognitive Receiver-Based MAC (SACRB-MAC), which employs the spectrum aggregation technique to improve the throughput performance of CRSNs in a smart grid. Moreover, SACRB-MAC is a receiver-based MAC protocol, which can provide a good reliability performance. Analytical and simulation results demonstrate that SACRB-MAC is a promising solution for CRSNs in a smart grid.

  20. SACRB-MAC: A High-Capacity MAC Protocol for Cognitive Radio Sensor Networks in Smart Grid

    Directory of Open Access Journals (Sweden)

    Zhutian Yang

    2016-03-01

    Full Text Available The Cognitive Radio Sensor Network (CRSN is considered as a viable solution to enhance various aspects of the electric power grid and to realize a smart grid. However, several challenges for CRSNs are generated due to the harsh wireless environment in a smart grid. As a result, throughput and reliability become critical issues. On the other hand, the spectrum aggregation technique is expected to play an important role in CRSNs in a smart grid. By using spectrum aggregation, the throughput of CRSNs can be improved efficiently, so as to address the unique challenges of CRSNs in a smart grid. In this regard, we proposed Spectrum Aggregation Cognitive Receiver-Based MAC (SACRB-MAC, which employs the spectrum aggregation technique to improve the throughput performance of CRSNs in a smart grid. Moreover, SACRB-MAC is a receiver-based MAC protocol, which can provide a good reliability performance. Analytical and simulation results demonstrate that SACRB-MAC is a promising solution for CRSNs in a smart grid.

  1. AMPA receptor competitive antagonism reduces halothane MAC in rats.

    Science.gov (United States)

    McFarlane, C; Warner, D S; Todd, M M; Nordholm, L

    1992-12-01

    Various subtypes of receptors have been identified for glutamate, an excitatory neurotransmitter. Previous studies have shown that antagonism of glutamate at the NMDA receptors reduces minimum alveolar concentration (MAC) for volatile anesthetics. NBQX (2,3-dihydroxy-6-nitro-7-sulfamoyl-benzo(f)quinoxaline) is a selective antagonist at the glutamatergic AMPA receptor. The purpose of this experiment was to determine whether AMPA receptor antagonism influences halothane MAC in the rat. Sprague-Dawley rats were anesthetized with halothane in 50% O2/balance N2, tracheally intubated and the lungs were mechanically ventilated. Increasing doses of NBQX were intravenously infused in three groups while the control group was infused with vehicle (D5W). Halothane MAC was then determined by the tail-clamp method. Halothane MAC was log-linearly related to plasma NBQX concentrations (MAC = 0.125 (In plasma concentration NBQX) + 1.035, r2 = 0.77). A maximal 58% reduction of halothane MAC was achieved with an NBQX loading dose of 42 mg/kg followed by a continuous infusion rate of 36 mg x kg-1 x h-1 (control = 1.02 +/- 0.07%; NBQX = 0.43 +/- 0.12%; P awake rats were randomly assigned to groups based on the dose of NBQX infused. Pa(CO2) and mean arterial pressure were measured at time 0 and at 5 and 30 min after start of NBQX infusion. The infusion was then stopped. Time until recovery of the righting reflex was recorded.(ABSTRACT TRUNCATED AT 250 WORDS)

  2. Vehicle Health Management Communications Requirements for AeroMACS

    Science.gov (United States)

    Kerczewski, Robert J.; Clements, Donna J.; Apaza, Rafael D.

    2012-01-01

    As the development of standards for the aeronautical mobile airport communications system (AeroMACS) progresses, the process of identifying and quantifying appropriate uses for the system is progressing. In addition to defining important elements of AeroMACS standards, indentifying the systems uses impacts AeroMACS bandwidth requirements. Although an initial 59 MHz spectrum allocation for AeroMACS was established in 2007, the allocation may be inadequate; studies have indicated that 100 MHz or more of spectrum may be required to support airport surface communications. Hence additional spectrum allocations have been proposed. Vehicle health management (VHM) systems, which can produce large volumes of vehicle health data, were not considered in the original bandwidth requirements analyses, and are therefore of interest in supporting proposals for additional AeroMACS spectrum. VHM systems are an emerging development in air vehicle safety, and preliminary estimates of the amount of data that will be produced and transmitted off an aircraft, both in flight and on the ground, have been prepared based on estimates of data produced by on-board vehicle health sensors and initial concepts of data processing approaches. This allowed an initial estimate of VHM data transmission requirements for the airport surface. More recently, vehicle-level systems designed to process and analyze VHM data and draw conclusions on the current state of vehicle health have been undergoing testing and evaluation. These systems make use of vehicle system data that is mostly different from VHM data considered previously for airport surface transmission, and produce processed system outputs that will be also need to be archived, thus generating additional data load for AeroMACS. This paper provides an analysis of airport surface data transmission requirements resulting from the vehicle level reasoning systems, within the context of overall VHM data requirements.

  3. Link-layer jamming attacks on S-MAC

    OpenAIRE

    Law, Yee Wei; Hartel, Pieter; Hartog, den, D.N.; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. In this paper, we investigate some jamming attacks on S-MAC, the level of effectiveness and efficiency the attacks can potentially achieve, and a countermeasure that can be implemented against one o...

  4. Rand and MacIntyre on moral agency

    OpenAIRE

    Beadle, Ron

    2008-01-01

    This paper contrasts the work of Ayn Rand and Alasdair MacIntyre on moral agency. Both argue that moral agency requires the application of a consistent moral code across relationships with others and that such consistency is rarely evident in the modern social order. However, while MacIntyre holds this failure to be a defining feature of the modern social order, Rand holds this to be a failure of individuals and a marker of a wider cultural confusion. While Rand sees selfishness and capitalis...

  5. Alasdair MacIntyre: relatividad conceptual, tomismo y liberalismo

    Directory of Open Access Journals (Sweden)

    Carlos Isler S.

    2011-01-01

    Full Text Available Influenciado por Thomas Kuhn, Alasdair MacIntyre presenta una teoría conceptualmente relativista sobre las tradiciones de investigación, la cual pretende no sólo describir la estructura de las distintas tradiciones, sino también encontrar un principioque permita resolver las disputas entre ellas. Se expone esta teoría y se analiza su compatibilidad con el tomismo, tradición a la que MacIntyre dice pertenecer, y con el liberalismo, tradición a la que critica con vigor.

  6. Mac Lane method in the investigation of magnetic translation groups

    OpenAIRE

    Florek, Wojciech

    1998-01-01

    Central extensions of the three-dimensional translation group T=Z^3 by the unitary group U(1) (a group of factors) are considered within the frame of the Mac~Lane method. All nonzero vectors t in T are considered to be generators of T. This choice leads to very illustrative relations between the Mac~Lane method and Zak's approach to magnetic translation groups. It is shown that factor systems introduced by Zak and Brown can be realized only for the unitary group U(1) and for some of its finit...

  7. The Application of Hollysys MACS V652 Control System in Refining Rocking Furnace%和利时MACS V652控制系统在精炼摇炉中的应用

    Institute of Scientific and Technical Information of China (English)

    黄健

    2014-01-01

    以铜陵有色张家港联合铜业有限公司新熔炼厂区为例,详细介绍了和利时MACS V652分散控制系统在熔炼厂区集中控制项目上的工艺设计、自动化方案、网络构架和工程特色,以及具体实施情况。%Take new smelting plant of Tongling Nonferrous Metals Group Zhangjiagang United Copper Industry Limited Company as example, we make a detailed introduction for process design, automation scheme, network framework, engineering characteristics and specific implementation for Hollysys MACS V652 DCS (distributed control system) used in smelting plant centralized control project.

  8. Visual overview, oral detail

    DEFF Research Database (Denmark)

    Hertzum, Morten; Simonsen, Jesper

    2015-01-01

    and with the coordinating nurse, who is the main keeper of the whiteboard. On the basis of observations, we find that coordination is accomplished through a highly intertwined process of technologically mediated visual overview combined with orally communicated details. The oral details serve to clarify and elaborate...

  9. LOCKE Detailed Specification Tables

    CERN Document Server

    Menezo, Lucia G; Gregorio, Jose-Angel

    2012-01-01

    This document shows the detailed specification of LOCKE coherence protocol for each cache controller, using a table-based technique. This representation provides clear, concise visual information yet includes sufficient detail (e.g., transient states) arguably lacking in the traditional, graphical form of state diagrams.

  10. Detail and survey radioautographs

    Energy Technology Data Exchange (ETDEWEB)

    Wainwright, Wm.W.

    1949-04-19

    The much used survey or contact type of radioautograph is indispensible for a study of the gross distribution of radioactive materials. A detail radioautograph is equally indispensible. The radioautograph makes possible the determination of plutonium with respect to cells. Outlines of survey and detail techniques are given.

  11. MC2: Dynamical Analysis of the Merging Galaxy Cluster MACS J1149.5+2223

    Science.gov (United States)

    Golovich, Nathan; Dawson, William A.; Wittman, David; Ogrean, Georgiana; van Weeren, Reinout; Bonafede, Annalisa

    2016-11-01

    We present an analysis of the merging cluster MACS J1149.5+2223 using archival imaging from Subaru/Suprime-Cam and multi-object spectroscopy from Keck/DEIMOS and Gemini/GMOS. We employ two- and three-dimensional substructure tests and determine that MACS J1149.5+2223 is composed of two separate mergers among three subclusters occurring ˜1 Gyr apart. The primary merger gives rise to elongated X-ray morphology and a radio relic in the southeast. The brightest cluster galaxy is a member of the northern subcluster of the primary merger. This subcluster is very massive ({16.7}-1.60+1.25× {10}14 {M}⊙ ). The southern subcluster is also very massive ({10.8}-3.54+3.37× {10}14 {M}⊙ ), yet it lacks an associated X-ray surface brightness peak, and it has been unidentified previously despite the detailed study of this Frontier Field cluster. A secondary merger is occurring in the north along the line of sight (LOS) with a third, less massive subcluster ({1.20}-0.34+0.19× {10}14 {M}⊙ ). We perform a Monte Carlo dynamical analysis on the main merger and estimate a collision speed at pericenter of {2770}-310+610 km s-1. We show the merger to be returning from apocenter with core passage occurring {1.16}-0.25+0.50 Gyr before the observed state. We identify the LOS merging subcluster in a strong lensing analysis in the literature and show that it is likely bound to MACS J1149 despite having reached an extreme collision velocity of ˜4000 km s-1.

  12. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  13. Student Use of Library Computers: Are Desktop Computers Still Relevant in Today's Libraries?

    Directory of Open Access Journals (Sweden)

    Susan Thompson

    2012-12-01

    Full Text Available Academic libraries have traditionally provided computers for students to access their collections and, more recently, facilitate all aspects of studying. Recent changes in technology, particularly the increased presence of mobile devices, calls into question how libraries can best provide technology support and how it might impact the use of other library services. A two-year study conducted at California State University San Marcos library analyzed student use of the computers in the library, both the library’s own desktop computers and laptops owned by students.  The results found that, despite the increased ownership of mobile technology by students, they still clearly preferred to use desktop computers in the library. It also showed that students who used computers in the library were more likely to use other library services and physical collections.

  14. [Teaching Desktop] Video Conferencing in a Collaborative and Problem Based Setting

    DEFF Research Database (Denmark)

    Ørngreen, Rikke; Mouritzen, Per

    2013-01-01

    This paper presents experiences from teaching video conferencing for learning and collaboration, and discusses the challenges and potentials of applying a collaborative and problem‐based learning (PBL) pedagogy. The research is an action research study, and we as researchers, educational planners......, teachers and assistant teachers wanted to find ways in the design for learning that enables the learners to acquire knowledge about the theories, models and concepts of the subject, as well as hands‐on competencies in a learning‐by‐doing manner. In particular we address the area of desktop video...... shows that the students experiment with various pedagogical situations, and that during the process of design, teaching, and reflection they acquire experiences at both a concrete specific and a general abstract level. The desktop video conference system creates challenges, with technical issues...

  15. A Five-Year Hedonic Price Breakdown for Desktop Personal Computer Attributes in Brazil

    Directory of Open Access Journals (Sweden)

    Nuno Manoel Martins Dias Fouto

    2009-07-01

    Full Text Available The purpose of this article is to identify the attributes that discriminate the prices of personal desktop computers. We employ the hedonic price method in evaluating such characteristics. This approach allows market prices to be expressed as a function, a set of attributes present in the products and services offered. Prices and characteristics of up to 3,779 desktop personal computers offered in the IT pages of one of the main Brazilian newspapers were collected from January 2003 to December 2007. Several specifications for the hedonic (multivariate linear regression were tested. In this particular study, the main attributes were found to be hard drive capacity, screen technology, main board brand, random memory size, microprocessor brand, video board memory, digital video and compact disk recording devices, screen size and microprocessor speed. These results highlight the novel contribution of this study: the manner and means in which hedonic price indexes may be estimated in Brazil.

  16. Ablation Modeling of Ares-I Upper State Thermal Protection System Using Thermal Desktop

    Science.gov (United States)

    Sharp, John R.; Page, Arthur T.

    2007-01-01

    The thermal protection system (TPS) for the Ares-I Upper Stage will be based on Space Transportation System External Tank (ET) and Solid Rocket Booster (SRB) heritage materials. These TPS materials were qualified via hot gas testing that simulated ascent and re-entry aerothermodynamic convective heating environments. From this data, the recession rates due to ablation were characterized and used in thermal modeling for sizing the thickness required to maintain structural substrate temperatures. At Marshall Space Flight Center (MSFC), the in-house code ABL is currently used to predict TPS ablation and substrate temperatures as a FORTRAN application integrated within SINDA/G. This paper describes a comparison of the new ablation utility in Thermal Desktop and SINDA/FLUINT with the heritage ABL code and empirical test data which serves as the validation of the Thermal Desktop software for use on the design of the Ares-I Upper Stage project.

  17. Desktop system for accounting, audit, and research in A&E.

    Science.gov (United States)

    Taylor, C J; Brain, S G; Bull, F; Crosby, A C; Ferguson, D G

    1997-03-01

    The development of a database for audit, research, and accounting in accident and emergency (A&E) is described. The system uses a desktop computer, an optical scanner, sophisticated optical mark reader software, and workload management data. The system is highly flexible, easy to use, and at a cost of around 16,000 pounds affordable for larger departments wishing to move towards accounting. For smaller departments, it may be an alternative to full computerisation.

  18. Fab the coming revolution on your desktop : from personal computers to personal fabrication

    CERN Document Server

    Gershenfeld, Neil

    2005-01-01

    What if you could someday put the manufacturing power of an automobile plant on your desktop? According to Neil Gershenfeld, the renowned MIT scientist and inventor, the next big thing is personal fabrication-the ability to design and produce your own products, in your own home, with a machine that combines consumer electronics and industrial tools. Personal fabricators are about to revolutionize the world just as personal computers did a generation ago, and Fab shows us how.

  19. Reducing the Digital Divide among Children Who Received Desktop or Hybrid Computers for the Home

    Directory of Open Access Journals (Sweden)

    Gila Cohen Zilka

    2016-06-01

    Full Text Available Researchers and policy makers have been exploring ways to reduce the digital divide. Parameters commonly used to examine the digital divide worldwide, as well as in this study, are: (a the digital divide in the accessibility and mobility of the ICT infrastructure and of the content infrastructure (e.g., sites used in school; and (b the digital divide in literacy skills. In the present study we examined the degree of effectiveness of receiving a desktop or hybrid computer for the home in reducing the digital divide among children of low socio-economic status aged 8-12 from various localities across Israel. The sample consisted of 1,248 respondents assessed in two measurements. As part of the mixed-method study, 128 children were also interviewed. Findings indicate that after the children received desktop or hybrid computers, changes occurred in their frequency of access, mobility, and computer literacy. Differences were found between the groups: hybrid computers reduce disparities and promote work with the computer and surfing the Internet more than do desktop computers. Narrowing the digital divide for this age group has many implications for the acquisition of skills and study habits, and consequently, for the realization of individual potential. The children spoke about self improvement as a result of exposure to the digital environment, about a sense of empowerment and of improvement in their advantage in the social fabric. Many children expressed a desire to continue their education and expand their knowledge of computer applications, the use of software, of games, and more. Therefore, if there is no computer in the home and it is necessary to decide between a desktop and a hybrid computer, a hybrid computer is preferable.

  20. Digital patient records and the medical desktop: an integrated physician workstation for medical informatics training.

    OpenAIRE

    Litt, H. I.; Loonsk, J. W.

    1992-01-01

    The Institute of Medicine and others have advocated a shift from a paper-based to an electronic medical record and many authorities have advanced the concept of a physician workstation that can provide access to a wide variety of both clinically and reference oriented medical information. We have developed a working model of an integrated physician workstation based on a graphically oriented "Medical Desktop," for personal computers. This system gives the user access to much of the informatio...

  1. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Yee Wei; Hartel, Pieter; Hartog, den Jerry; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. W

  2. Listening, Looking, and Learning with MacLang.

    Science.gov (United States)

    Frommer, Judith

    1989-01-01

    Describes how the capabilities of the MacLang authoring system allow foreign language teachers to develop computer-assisted instruction that meets the listening skill objectives of foreign language courses. Examples are given of the use of audio and video interfaces that facilitate listening comprehension. (Author/CB)

  3. Beamforming in Ad Hoc Networks: MAC Design and Performance Modeling

    Directory of Open Access Journals (Sweden)

    Khalil Fakih

    2009-01-01

    Full Text Available We examine in this paper the benefits of beamforming techniques in ad hoc networks. We first devise a novel MAC paradigm for ad hoc networks when using these techniques in multipath fading environment. In such networks, the use of conventional directional antennas does not necessarily improve the system performance. On the other hand, the exploitation of the potential benefits of smart antenna systems and especially beamforming techniques needs a prior knowledge of the physical channel. Our proposition performs jointly channel estimation and radio resource sharing. We validate the fruitfulness of the proposed MAC and we evaluate the effects of the channel estimation on the network performance. We then present an accurate analytical model for the performance of IEEE 802.11 MAC protocol. We extend the latter model, by introducing the fading probability, to derive the saturation throughput for our proposed MAC when the simplest beamforming strategy is used in real multipath fading ad hoc networks. Finally, numerical results validate our proposition.

  4. God, Sport Philosophy, Kinesiology: A MacIntyrean Examination

    Science.gov (United States)

    Twietmeyer, Gregg

    2015-01-01

    Sport philosophy is in crisis. This subdiscipline of kinesiology garners little to no respect and few tenure track lines in kinesiology departments. Why is this the case? Why isn't philosophy held in greater esteem? Is it possible that philosopher Alasdair MacIntyre's (2009) diagnosis found in "God, Philosophy, Universities" could…

  5. MAC Support for High Density Wireless Sensor Networks

    NARCIS (Netherlands)

    Taddia, C.; Meratnia, Nirvana; van Hoesel, L.F.W.; Mazzini, G.; Havinga, Paul J.M.

    Large scale and high density networks of tiny sensor nodes offer promising solutions for event detection and actuating applications. In this paper we address the effect of high density of wireless sensor network performance with a specific MAC protocol, the Lightweight Medium Access Control (LMAC).

  6. God, Sport Philosophy, Kinesiology: A MacIntyrean Examination

    Science.gov (United States)

    Twietmeyer, Gregg

    2015-01-01

    Sport philosophy is in crisis. This subdiscipline of kinesiology garners little to no respect and few tenure track lines in kinesiology departments. Why is this the case? Why isn't philosophy held in greater esteem? Is it possible that philosopher Alasdair MacIntyre's (2009) diagnosis found in "God, Philosophy, Universities" could…

  7. Roles of Mac-1 and glycoprotein IIb/IIIa integrins in leukocyte-platelet aggregate formation: stabilization by Mac-1 and inhibition by GpIIb/IIIa blockers.

    Science.gov (United States)

    Patko, Zsofia; Csaszar, Albert; Acsady, Gyorgy; Peter, Karlheinz; Schwarz, Meike

    2012-01-01

    Circulating platelet-leukocyte hetero-aggregates play an important role in acute cardiovascular events and hypersensitivity reactions. The association involves the receptor families of selectins and integrin. The objective of this study was to investigate the role of CD11b/CD18 integrin (Mac-1) in hetero-aggregate formation and search for a counter-receptor on platelets ready to interact with Mac-1. As a model of leukocytes, Mac-1 presenting Chinese hamster ovary (CHO) cells were used to evaluate the role of Mac-1 in hetero-aggregate formation. The amount of CHO cell-bound active and inactive platelets was measured by flow cytometry, while the counter-receptors on platelets were identified via using blocking antibodies. We observed significant platelet adhesion on Mac-1-bearing cells when platelet-rich plasma or activated platelets were present. Inactive platelets did not adhere to Mac-1-bearing cells. Addition of fibrinogen, a ligand of Mac-1 significantly increased platelet binding. CD40L was demonstrated to act similarly on Mac-1. Inhibition of platelet GpIIb/IIIa completely abolished CHO cell-platelet aggregation. In our study, we have shown for the first time that Mac-1 mediates the formation of hetero-aggregates without selectin tethering when Mac-1 ligands such as fibrinogen or CD40L are present and blockers of platelet GpIIb/IIIa are able to diminish this interaction.

  8. Pyrogen testing of lipid-based TPN using Mono Mac 6 monocyte cell line and DELFIA

    DEFF Research Database (Denmark)

    Moesby, Lise; Hansen, E W; Christensen, J D

    1997-01-01

    Measurement of lipopolysaccharide (LPS) induced interleukin-6 (IL-6) secretion in Mono Mac 6 cells.......Measurement of lipopolysaccharide (LPS) induced interleukin-6 (IL-6) secretion in Mono Mac 6 cells....

  9. Realization of a Desktop Flight Simulation System for Motion-Cueing Studies

    Directory of Open Access Journals (Sweden)

    Berkay Volkaner

    2016-05-01

    Full Text Available Parallel robotic mechanisms are generally used in flight simulators with a motion-cueing algorithm to create an unlimited motion feeling of a simulated medium in a bounded workspace of the simulator. A major problem in flight simulators is that the simulation has an unbounded space and the manipulator has a limited one. Using a washout filter in the motion-cueing algorithm overcomes this. In this study, a low-cost six degrees of freedom (DoF desktop parallel manipulator is used to test a classical motion-cueing algorithm; the algorithm's functionality is confirmed with a Simulink real-time environment. Translational accelerations and angular velocities of the simulated medium obtained from FlightGear flight simulation software are processed through a generated washout filter algorithm and the simulated medium's motion information is transmitted to the desktop parallel robotic mechanism as a set point for each leg. The major issues of this paper are designing a desktop simulation system, controlling the parallel manipulator, communicating between the flight simulation and the platform, designing a motion-cueing algorithm and determining the parameters of the washout filters.

  10. Investigation Methodology of a Virtual Desktop Infrastructure for IoT

    Directory of Open Access Journals (Sweden)

    Doowon Jeong

    2015-01-01

    Full Text Available Cloud computing for IoT (Internet of Things has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. Many companies are adopting a virtual desktop infrastructure (VDI for private cloud computing to reduce costs and enhance the efficiency of their servers. As a VDI is widely used, threats of cyber terror and invasion are also increasing. To minimize the damage, response procedure for cyber intrusion on a VDI should be systematized. Therefore, we propose an investigation methodology for VDI solutions in this paper. Here we focus on a virtual desktop infrastructure and introduce various desktop virtualization solutions that are widely used, such as VMware, Citrix, and Microsoft. In addition, we verify the integrity of the data acquired in order that the result of our proposed methodology is acceptable as evidence in a court of law. During the experiment, we observed an error: one of the commonly used digital forensic tools failed to mount a dynamically allocated virtual disk properly.

  11. Virtual Desktop under Cloud Architecture%云架构下的虚拟化桌面

    Institute of Scientific and Technical Information of China (English)

    苏玉成; 蒋昆; 郭江博; 徐家富; 任斌; 张亚娜

    2014-01-01

    目的:提高医院办公电脑的维修效率和数据的安全性。方法对医院现有计算机设备维修业务流程进行优化,并结合医院云架构平台建设虚拟化桌面。结果通过规划医院云架构下的虚拟化桌面的建设,在不影响业务人员工作的情况下,提高了办公效率和信息安全,减少了设备的维修时间。结论该项目的实施为虚拟化桌面在医院环境下应用进行了探索。%Objective To improve the data security and maintenance efifciency of ofifce computers in the hospital. Methods To optimize the maintenance business process of existing computers and establish the virtual desktop based on cloud architecture platform in the hospital. Results The establishment of virtual desktop under cloud architecture has improved the office efficiency and information safety and has reduced the maintenance time of ofifce computers without prejudice to the work of business personnel. Conclusion The implementation of the project can provide exploration information for the application of virtual desktop in hospitals.

  12. Detailed Soils 24K

    Data.gov (United States)

    Kansas Data Access and Support Center — This data set is a digital soil survey and is the most detailed level of soil geographic data developed by the National Cooperative Soil Survey. The information was...

  13. No effect of ambient odor on the affective appraisal of a desktop virtual environment with signs of disorder.

    Directory of Open Access Journals (Sweden)

    Alexander Toet

    Full Text Available BACKGROUND: Desktop virtual environments (VEs are increasingly deployed to study the effects of environmental qualities and interventions on human behavior and safety related concerns in built environments. For these applications it is essential that users appraise the affective qualities of the VE similar to those of its real world counterpart. Previous studies have shown that factors like simulated lighting, sound and dynamic elements all contribute to the affective appraisal of a desktop VE. Since ambient odor is known to affect the affective appraisal of real environments, and has been shown to increase the sense of presence in immersive VEs, it may also be an effective tool to tune the affective appraisal of desktop VEs. This study investigated if exposure to ambient odor can modulate the affective appraisal of a desktop VE with signs of public disorder. METHOD: Participants explored a desktop VE representing a suburban neighborhood with signs of public disorder (neglect, vandalism and crime, while being exposed to either room air or subliminal levels of unpleasant (tar or pleasant (cut grass ambient odor. Whenever they encountered signs of disorder they reported their safety related concerns and associated affective feelings. RESULTS: Signs of crime in the desktop VE were associated with negative affective feelings and concerns for personal safety and personal property. However, there was no significant difference between reported safety related concerns and affective connotations in the control (no-odor and in each of the two ambient odor conditions. CONCLUSION: Ambient odor did not affect safety related concerns and affective connotations associated with signs of disorder in the desktop VE. Thus, semantic congruency between ambient odor and a desktop VE may not be sufficient to influence its affective appraisal, and a more realistic simulation in which simulated objects appear to emit scents may be required to achieve this goal.

  14. No effect of ambient odor on the affective appraisal of a desktop virtual environment with signs of disorder.

    Science.gov (United States)

    Toet, Alexander; van Schaik, Martin; Theunissen, Nicolet C M

    2013-01-01

    Desktop virtual environments (VEs) are increasingly deployed to study the effects of environmental qualities and interventions on human behavior and safety related concerns in built environments. For these applications it is essential that users appraise the affective qualities of the VE similar to those of its real world counterpart. Previous studies have shown that factors like simulated lighting, sound and dynamic elements all contribute to the affective appraisal of a desktop VE. Since ambient odor is known to affect the affective appraisal of real environments, and has been shown to increase the sense of presence in immersive VEs, it may also be an effective tool to tune the affective appraisal of desktop VEs. This study investigated if exposure to ambient odor can modulate the affective appraisal of a desktop VE with signs of public disorder. Participants explored a desktop VE representing a suburban neighborhood with signs of public disorder (neglect, vandalism and crime), while being exposed to either room air or subliminal levels of unpleasant (tar) or pleasant (cut grass) ambient odor. Whenever they encountered signs of disorder they reported their safety related concerns and associated affective feelings. Signs of crime in the desktop VE were associated with negative affective feelings and concerns for personal safety and personal property. However, there was no significant difference between reported safety related concerns and affective connotations in the control (no-odor) and in each of the two ambient odor conditions. Ambient odor did not affect safety related concerns and affective connotations associated with signs of disorder in the desktop VE. Thus, semantic congruency between ambient odor and a desktop VE may not be sufficient to influence its affective appraisal, and a more realistic simulation in which simulated objects appear to emit scents may be required to achieve this goal.

  15. MAC: identifying and correcting annotation for multi-nucleotide variations.

    Science.gov (United States)

    Wei, Lei; Liu, Lu T; Conroy, Jacob R; Hu, Qiang; Conroy, Jeffrey M; Morrison, Carl D; Johnson, Candace S; Wang, Jianmin; Liu, Song

    2015-08-01

    Next-Generation Sequencing (NGS) technologies have rapidly advanced our understanding of human variation in cancer. To accurately translate the raw sequencing data into practical knowledge, annotation tools, algorithms and pipelines must be developed that keep pace with the rapidly evolving technology. Currently, a challenge exists in accurately annotating multi-nucleotide variants (MNVs). These tandem substitutions, when affecting multiple nucleotides within a single protein codon of a gene, result in a translated amino acid involving all nucleotides in that codon. Most existing variant callers report a MNV as individual single-nucleotide variants (SNVs), often resulting in multiple triplet codon sequences and incorrect amino acid predictions. To correct potentially misannotated MNVs among reported SNVs, a primary challenge resides in haplotype phasing which is to determine whether the neighboring SNVs are co-located on the same chromosome. Here we describe MAC (Multi-Nucleotide Variant Annotation Corrector), an integrative pipeline developed to correct potentially mis-annotated MNVs. MAC was designed as an application that only requires a SNV file and the matching BAM file as data inputs. Using an example data set containing 3024 SNVs and the corresponding whole-genome sequencing BAM files, we show that MAC identified eight potentially mis-annotated SNVs, and accurately updated the amino acid predictions for seven of the variant calls. MAC can identify and correct amino acid predictions that result from MNVs affecting multiple nucleotides within a single protein codon, which cannot be handled by most existing SNV-based variant pipelines. The MAC software is freely available and represents a useful tool for the accurate translation of genomic sequence to protein function.

  16. Generation of MAC waves by convection in Earth's core

    Science.gov (United States)

    Jaupart, Etienne; Buffett, Bruce

    2017-05-01

    Convection in Earth's core is a viable mechanism for generating MAC waves when the top of the core is stably stratified. We quantify the generation mechanism by extending the physical description of MAC waves to include a source term due to buoyancy forces in the convecting part of the core. Solutions for the forced motion are obtained using a Green's function, which is constructed from the eigenfunctions for the unforced motion. When the source term is evaluated using the output of a numerical geodynamo model, the largest excitation occurs at even spherical harmonic degrees, corresponding to waves with symmetric azimuthal flow about the equator. We also find that the magnitude of the source term decreases at periods shorter than about 60 yr. As a result most of the wave generation is confined to waves with periods of 60 yr or longer. Quantitative predictions for the wave amplitudes depend on the projection of the source term into the eigenfunction of the waves. Strong stratification limits the penetration of density anomalies into the stratified layer, which means that the source term is confined to the lowermost part of the layer. Overtones of MAC waves with large amplitudes in the lower part of the stratified layer are more effectively generated by convection, even though these waves are heavily damped by magnetic diffusion. Generation of MAC waves by convection establishes a physical link between observable wave motion and deeper convective processes. Detection of changes in the amplitude and phase of MAC waves would constrain the generation processes and offer insights into the nature of the convection.

  17. 42 CFR 405.1110 - MAC reviews on its own motion.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false MAC reviews on its own motion. 405.1110 Section 405....1110 MAC reviews on its own motion. (a) General rule. The MAC may decide on its own motion to review a decision or dismissal issued by an ALJ. CMS or any of its contractors may refer a case to the MAC for it to...

  18. Minimum Alveolar Concentration for Blunting Adrenergic Responses (MAC-BAR) of Sevoflurane in Dogs

    OpenAIRE

    YAMASHITA, Kazuto; FURUKAWA, Erika; ITAMI, Takaharu; ISHIZUKA, Tomohito; TAMURA, Jun; MIYOSHI, Kenjirou

    2012-01-01

    It is well known that heart rate or arterial blood pressure may increase in response to surgical stimulation despite the absence of a purposeful movement. However, there is limited information regarding anesthetic requirement for blunting adrenergic response in dogs. This study was designed to compare the minimum alveolar concentrations of sevoflurane required to prevent autonomic response (MAC-BAR) and purposeful movement (MAC) in dogs. Sevoflurane MAC-BAR and MAC were determined in 5 beagle...

  19. MC$^2$: Dynamical Analysis of the Merging Galaxy Cluster MACS J1149.5+2223

    CERN Document Server

    Golovich, Nathan; Wittman, David; Ogrean, Georgiana A; van Weeren, Reinout J; Bonafede, Annalisa

    2016-01-01

    We present an analysis of the merging cluster MACS J1149.5+2223 using archival imaging from Subaru/Suprime-Cam and multi-object spectroscopy from Keck/DEIMOS and Gemini/GMOS. We employ two and three dimensional substructure tests and determine that MACS J1149.5+2223 is composed of two separate mergers between three subclusters occurring $\\sim$1 Gyr apart. The primary merger gives rise to elongated X-ray morphology and a radio relic in the southeast. The brightest cluster galaxy is a member of the northern subcluster of the primary merger. This subcluster is very massive (16.7$^{+\\text{1.25}}_{-\\text{1.60}}\\times\\text{10}^{\\text{14}}$ M$_{\\odot}$). The southern subcluster is also very massive (10.8$^{+\\text{3.37}}_{-\\text{3.54}}\\times\\text{10}^{\\text{14}}$ M$_{\\odot}$), yet it lacks an associated X-ray surface brightness peak, and it has been unidentified previously despite the detailed study of this \\emph{Frontier Field} cluster. A secondary merger is occurring in the north along the line of sight with a thir...

  20. MDS-Mac: a scheduled MAC for localization, time-synchronisation and communication in underwater acoustic networks

    NARCIS (Netherlands)

    Kleunen, van Wouter; Meratnia, Nirvana; Havinga, Paul J.M.

    2012-01-01

    In this paper we describe a design for an underwater MAC protocol which combines localization, time-synchronisation and communication. This protocol is designed for small-scale clustered networks in which all nodes are able to ommunicate with each other. We consider an integrated design of localizat

  1. TR-MAC: an energy-efficient MAC protocol for wireless sensor networks exploiting noise-based transmitted reference modulation

    NARCIS (Netherlands)

    Morshed, S.; Dimitrova, D.C.; Brogle, M.; Braun, T.; Heijenk, Gerhard J.

    Energy-constrained behavior of sensor nodes is one of the most important criteria for successful deployment of wireless sensor net- works. The medium access control (MAC) protocol determines the time a sensor node transceiver spends listening or transmitting, and hence the energy consumption of the

  2. CoR-MAC: Contention over Reservation MAC Protocol for Time-Critical Services in Wireless Body Area Sensor Networks.

    Science.gov (United States)

    Yu, Jeongseok; Park, Laihyuk; Park, Junho; Cho, Sungrae; Keum, Changsup

    2016-05-09

    Reserving time slots for urgent data, such as life-critical information, seems to be very attractive to guarantee their deadline requirements in wireless body area sensor networks (WBASNs). On the other hand, this reservation imposes a negative impact on performance for the utilization of a channel. This paper proposes a new channel access scheme referred to as the contention over reservation MAC (CoR-MAC) protocol for time-critical services in wireless body area sensor networks. CoR-MAC uses the dual reservation; if the reserved time slots are known to be vacant, other nodes can access the time slots by contention-based reservation to maximize the utilization of a channel and decrease the delay of the data. To measure the effectiveness of the proposed scheme against IEEE 802.15.4 and IEEE 802.15.6, we evaluated their performances with various performance indexes. The CoR-MAC showed 50% to 850% performance improvement in terms of the delay of urgent and time-critical data according to the number of nodes.

  3. Library Signage: Applications for the Apple Macintosh and MacPaint.

    Science.gov (United States)

    Diskin, Jill A.; FitzGerald, Patricia

    1984-01-01

    Describes specific applications of the Macintosh computer at Carnegie-Mellon University Libraries, where MacPaint was used as a flexible, easy to use, and powerful tool to produce informational, instructional, and promotional signage. Profiles of system hardware and software, an evaluation of the computer program MacPaint, and MacPaint signage…

  4. 42 CFR 405.1050 - Removal of a hearing request from an ALJ to the MAC.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Removal of a hearing request from an ALJ to the MAC... Removal of a hearing request from an ALJ to the MAC. If a request for hearing is pending before an ALJ, the MAC may assume responsibility for holding a hearing by requesting that the ALJ send the hearing...

  5. 42 CFR 405.1108 - MAC actions when request for review or escalation is filed.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false MAC actions when request for review or escalation...) Medicare Appeals Council Review § 405.1108 MAC actions when request for review or escalation is filed. (a) Except as specified in paragraphs (c) and (d) of this section, when a party requests that the MAC review...

  6. Traffic-adaptive duty cycle adaptation in TR-MAC protocol for wireless sensor networks

    NARCIS (Netherlands)

    Morshed, Sarwar; Baratchi, Mitra; Heijenk, Geert

    2016-01-01

    The Medium Access Control (MAC) layer can influence the energy consumption of a wireless sensor network (WSN) to a significant level. TR-MAC is an energy-efficient preamble sampling based MAC protocol for low power WSNs suitable for low data rate and low duty cycle scenario. However, low data rate i

  7. 42 CFR 405.1102 - Request for MAC review when ALJ issues decision or dismissal.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Request for MAC review when ALJ issues decision or...) Medicare Appeals Council Review § 405.1102 Request for MAC review when ALJ issues decision or dismissal. (a)(1) A party to the ALJ hearing may request a MAC review if the party files a written request for...

  8. THO-MAC:一种两跳优化的低延迟低功耗无线传感器网络介质访问控制协议%THO-MAC:a low-latency and energy-efficient MAC protocol with two-hop optimization in WS Ns

    Institute of Scientific and Technical Information of China (English)

    唐宏伟; 徐明; 孙彩霞

    2014-01-01

    Energy consumption and latency are two major problems that are primarily considered in the design of medium access control (MAC)protocols in wireless sensor networks (WSNs).A new low-latency,energy-efficient and receiver-initiated asynchronous MAC protocol in WSNs is proposed.By precisely predicting the receiver’s wakeup time,THO-MAC protocol can schedule the sender to listen to the channel,such that it can reduce the sender’s energy waste of idle listening.On the other hand,in order to reduce packet delivery latency,THO-MAC protocol chooses the forwarders in the sender’s two-hop forwarders set to minimize the two-hop forwarding latency.The performance of THO-MAC protocol in terms of detailed NS2 simulation is evaluated.The simulation results show that the THO-MAC protocol reduces 35 .5%and 1 8%packet delivery latency,while saving 23.5% and 15.5% sensor energy consumption,compared with RI-MAC and Any-MAC,the two state-of-the-art MAC protocols.%功耗与延迟是无线传感器网络介质访问控制协议设计首要考虑的两个问题。提出了一种新的传感器网络低延迟、低功耗、接收节点初始化异步介质访问控制协议---THO-MAC协议。通过准确预测接收节点的唤醒时间,THO-MAC 协议调度发送节点侦听信道,从而减少发送节点空闲侦听能量浪费。THO-MAC协议在发送节点两跳转发节点集中选择使报文两跳转发延迟最小的转发节点,从而降低报文传输延迟。使用NS2模拟器对THO-MAC协议进行了详细模拟。模拟结果显示,与RI-MAC和Any-MAC协议相比,THO-MAC协议可以减少35.5%和18%的报文传输延迟,同时节省23.5%和15.5%的节点功耗。

  9. The design of MACs (minimal actin cortices).

    Science.gov (United States)

    Vogel, Sven K; Heinemann, Fabian; Chwastek, Grzegorz; Schwille, Petra

    2013-11-01

    The actin cell cortex in eukaryotic cells is a key player in controlling and maintaining the shape of cells, and in driving major shape changes such as in cytokinesis. It is thereby constantly being remodeled. Cell shape changes require forces acting on membranes that are generated by the interplay of membrane coupled actin filaments and assemblies of myosin motors. Little is known about how their interaction regulates actin cell cortex remodeling and cell shape changes. Because of the vital importance of actin, myosin motors and the cell membrane, selective in vivo experiments and manipulations are often difficult to perform or not feasible. Thus, the intelligent design of minimal in vitro systems for actin-myosin-membrane interactions could pave a way for investigating actin cell cortex mechanics in a detailed and quantitative manner. Here, we present and discuss the design of several bottom-up in vitro systems accomplishing the coupling of actin filaments to artificial membranes, where key parameters such as actin densities and membrane properties can be varied in a controlled manner. Insights gained from these in vitro systems may help to uncover fundamental principles of how exactly actin-myosin-membrane interactions govern actin cortex remodeling and membrane properties for cell shape changes.

  10. The minimum alveolar concentration (MAC) and hemodynamic effects of halothane, isoflurane, and sevoflurane in newborn swine.

    Science.gov (United States)

    Lerman, J; Oyston, J P; Gallagher, T M; Miyasaka, K; Volgyesi, G A; Burrows, F A

    1990-10-01

    To determine the minimum alveolar concentration (MAC) and hemodynamic responses to halothane, isoflurane, and sevoflurane in newborn swine, 36 fasting swine 4-10 days of age were anesthetized with one of the three volatile anesthetics in 100% oxygen. MAC was determined for each swine. Carotid artery and internal jugular catheters were inserted and each swine was allowed to recover for 48 h. After recovery, heart rate (HR), systemic systolic arterial pressure (SAP), and cardiac index (CI) were measured awake and then at 0.5, 1.0, and 1.5 MAC of the designated anesthetic in random sequence. The (mean +/- SD) MAC for halothane was 0.90 +/- 0.12%; the MAC for isoflurane was 1.48 +/- 0.21%; and the MAC for sevoflurane was 2.12 +/- 0.39%. Awake (mean +/- SD) measurements of HR, SAP, and CI did not differ significantly among the three groups. Compared to the awake HR, the mean HR decreased 35% at 1.5 MAC halothane (P less than 0.001), 19% at 1.5 MAC isoflurane (P less than 0.005), and 31% at 1.5 MAC sevoflurane (P less than 0.005). Compared to awake SAP, mean SAP measurements decreased 46% at 1.5 MAC halothane (P less than 0.001), 43% at 1.5 MAC isoflurane (P less than 0.001), and 36% at 1.5 MAC sevoflurane (P less than 0.005). Mean SAP at 1.0 and 1.5 MAC halothane and isoflurane were significantly less than those measured at equipotent concentrations of sevoflurane (P less than 0.005). Compared to awake CI, mean CI measurements decreased 53% at 1.5 MAC halothane (P less than 0.001) and 43% at 1.5 MAC isoflurane (P less than 0.005).(ABSTRACT TRUNCATED AT 250 WORDS)

  11. MAC-awake of isoflurane, enflurane and halothane evaluated by slow and fast alveolar washout.

    Science.gov (United States)

    Gaumann, D M; Mustaki, J P; Tassonyi, E

    1992-01-01

    End-tidal anaesthetic concentrations at first eye opening in response to a verbal command during recovery from anaesthesia (MAC-awake), were measured for isoflurane (n = 16), enflurane (n = 16) and halothane (n = 14). MAC-awake was measured during either slow or fast alveolar washout. Slow washout was obtained by decreasing anaesthetic concentrations in predetermined steps of 15 min, assuming equilibration between brain and alveolar partial pressures. Fast alveolar washout was obtained by discontinuation of the inhalation anaesthetic, which had been maintained at 1 MAC for at least 15 min. Mean MAC-awake obtained with slow alveolar washout was similar for isoflurane (0.25 (SD 0.03) MAC), and enflurane (0.27 (0.04) MAC) and significantly greater than values obtained by fast alveolar washout (isoflurane: 0.19 (0.03) MAC; enflurane: 0.20 (0.03) MAC). The MAC-awake of isoflurane and enflurane was significantly less than that of halothane, which was 0.59 (0.10) MAC as evaluated by the slow and 0.50 (0.05) MAC as evaluated by the fast alveolar washout method. Recovery time from anaesthesia with fast alveolar washout was 8.8 (4.0) min for halothane, which was not different from isoflurane (15 (2.5) min), but significantly shorter than for enflurane (22 (10) min), reflecting differences in the anaesthetic concentration gradient between MAC and MAC-awake values. These data do not support the hypothesis of a uniform ratio between MAC and MAC-awake values.

  12. Una lectura interpretativa de Tras la virtud, de Alasdair MacIntyre - An Interpretive Reading of After Virtue, by Alasdair MacIntyre

    Directory of Open Access Journals (Sweden)

    Fernando Fernández-Llebrez

    2010-12-01

    Full Text Available This article centers on the thought of Alasdair MacIntyre, whose most prominente work, After Virtue, is considered a classic of political science. In contrast with other reviews, this article will examine After Virtue within the broader context of MacIntyre’s thinking and publications. An overview of MacIntyre’s literary corpus and the evolution of his thinking will shed light on the volume examined and trace certain ideas that are characteristic of this Scottish political philosopher. Matters that remained unsettled in After Virtue have become over time more defined in MacIntyre’s thinking, such as the influence exerted upon him by Thomas Aquinas.

  13. Three Latin Phonological Details

    DEFF Research Database (Denmark)

    Olsen, Birgit Anette

    2006-01-01

    The present paper deals with three minor details of Latin phonology: 1) the development of the initial sequence *u¿l¿-, where it is suggested that an apparent vacillation between ul- and vol-/vul- represents sandhi variants going back to the proto-language, 2) the adjectives ama¯rus ‘bitter' and ...

  14. Distinguishing and Second-Preimage Attacks on CBC-Like MACs

    Science.gov (United States)

    Jia, Keting; Wang, Xiaoyun; Yuan, Zheng; Xu, Guangwu

    This paper first presents a new distinguishing attack on the CBC-MAC structure based on block ciphers in cipher block chaining (CBC) mode. This attack detects a CBC-like MAC from random functions. The second result of this paper is a second-preimage attack on the CBC-MAC, which is an extension of the attack of Brincat and Mitchell. The attack also covers MT-MAC, PMAC and MACs with three-key enciphered CBC mode. Instead of exhaustive search, both types of attacks are of birthday attack complexity.

  15. TM6SF2 and MAC30, new enzyme homologues in sterol metabolism and common metabolic disease.

    Directory of Open Access Journals (Sweden)

    Luis eSanchez-Pulido

    2014-12-01

    Full Text Available Carriers of the Glu167Lys coding variant in the TM6SF2 gene have recently been identified as being more susceptible to non-alcoholic fatty liver disease (NAFLD, yet exhibit lower levels of circulating lipids and hence are protected against cardiovascular disease. Despite the physiological importance of these observations, the molecular function of TM6SF2 remains unknown, and no sequence similarity with functionally characterised proteins has been identified. In order to trace its evolutionary history and to identify functional domains, we embarked on a computational protein sequence analysis of TM6SF2. We identified a new domain, the EXPERA domain, which is conserved among TM6SF, MAC30/TMEM97 and EBP (D8,D7 sterol isomerase protein families. EBP mutations are the cause of chondrodysplasia punctata 2 X-linked dominant (CDPX2, also known as Conradi-Hünermann-Happle syndrome, a defective cholesterol biosynthesis disorder. Our analysis of evolutionary conservation among EXPERA domain-containing families and the previously suggested catalytic mechanism for the EBP enzyme, indicate that TM6SF and MAC30/TMEM97 families are both highly likely to possess, as for the EBP family, catalytic activity as sterol isomerases. This unexpected prediction of enzymatic functions for TM6SF and MAC30/TMEM97 is important because it now permits detailed experiments to investigate the function of these key proteins in various human pathologies, from cardiovascular disease to cancer.

  16. CoCoTools: open-source software for building connectomes using the CoCoMac anatomical database.

    Science.gov (United States)

    Blumenfeld, Robert S; Bliss, Daniel P; Perez, Fernando; D'Esposito, Mark

    2014-04-01

    Neuroanatomical tracer studies in the nonhuman primate macaque monkey are a valuable resource for cognitive neuroscience research. These data ground theories of cognitive function in anatomy, and with the emergence of graph theoretical analyses in neuroscience, there is high demand for these data to be consolidated into large-scale connection matrices ("macroconnectomes"). Because manual review of the anatomical literature is time consuming and error prone, computational solutions are needed to accomplish this task. Here we describe the "CoCoTools" open-source Python library, which automates collection and integration of macaque connectivity data for visualization and graph theory analysis. CoCoTools both interfaces with the CoCoMac database, which houses a vast amount of annotated tracer results from 100 years (1905-2005) of neuroanatomical research, and implements coordinate-free registration algorithms, which allow studies that use different parcellations of the brain to be translated into a single graph. We show that using CoCoTools to translate all of the data stored in CoCoMac produces graphs with properties consistent with what is known about global brain organization. Moreover, in addition to describing CoCoTools' processing pipeline, we provide worked examples, tutorials, links to on-line documentation, and detailed appendices to aid scientists interested in using CoCoTools to gather and analyze CoCoMac data.

  17. Magnetic activated cell sorting (MACS): utility in assisted reproduction.

    Science.gov (United States)

    Makker, Kartikeya; Agarwal, Ashok; Sharma, Rakesh K

    2008-07-01

    Assisted reproductive techniques (ART) have now been extensively incorporated in the management of infertile couples. But even after rapid methodological and technological advances the success rates of these procedures have been below expectations. This has led to development of many sperm preparation protocols to obtain an ideal semen sample for artificial reproduction. Sperm apoptosis has been heavily linked to failures in reproductive techniques. One of the earliest changes shown by apoptotic spermatozoa is externalization of phosphatidyl serine. Magnetic activated cell sorting (MACS) is a novel sperm preparation technique that separates apoptotic and non-apoptotic spermatozoa based on the expression of phosphatidylserine. This has led to the incorporation of MACS as a sperm preparation technique. The review highlights the principle and mechanism of this novel technique and enumerates its advantages as a sperm preparation technique. Its utility in ART as an efficient tool for sperm recovery and its application in cryopreservation of semen samples is also explained.

  18. Secure MAC for Wireless Sensor Networks through RBFNN

    Directory of Open Access Journals (Sweden)

    P.Sankara Rao

    2010-08-01

    Full Text Available This paper discusses an application of a neural network in wireless sensor network security. It presents a Radial Basic Function Neural Network based media access control protocol (MAC to secure a CSMA-based wireless sensor network against the denial-of-service attacks launched by adversaries. The Radial Basic Function Neural Network enhances the security of a WSN by constantly monitoring the parameters that exhibit unusual variations in case of an attack. The RBFN shuts down the MAC layer and the physical layer of the sensor node when the suspicion factor, the output of the MLP, exceeds a preset threshold level. The MLP-guarded secure WSN is implemented using the Prowler simulator. Simulation results show that the MLP helps in extending the lifetime of the WSN.

  19. On the Development of Low Power MAC Protocol for WBANs

    CERN Document Server

    Ullah, Sana; Kwak, Kyung Sup

    2009-01-01

    Current advances in wireless communication, microelectronics, semiconductor technologies, and intelligent sensors have contributed to the development of unobtrusive WBANs. These networks provide long term health monitoring of patients without any constraint in their normal activities. Traditional MAC protocols do not accommodate the assorted WBAN traffic requirements in a power efficient manner. In this paper, we present a brief discussion on the development process of a low power MAC protocol for WBANs. We observe the behavior of a beacon-enabled IEEE 802.15.4 for on-body sensor networks. We further propose a low power technique called traffic based wakeup mechanism for a WBAN that exploits the traffic patterns of the BAN Nodes to ensure power efficient and reliable communication.

  20. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure......Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...

  1. Gravitational Duality in MacDowell-Mansouri Gauge Theory

    CERN Document Server

    García-Compéan, H; Ramírez, C

    1998-01-01

    Strong-weak duality invariance can only be defined for particular sectors of supersymmetric Yang-Mills theories. Nevertheless, for full non-Abelian non-supersymmetric theories, dual theories with inverted couplings, have been found. We show that an analogous procedure allows to find the dual action to the gauge theory of gravity constructed by the MacDowell-Mansouri model plus the superposition of a $\\Theta$ term.

  2. Mac OS X Server Snow Leopard 雪豹

    Institute of Scientific and Technical Information of China (English)

    王炳晨

    2010-01-01

    日前,苹果公司宣布推出Mac OSX Server Snow Leopard服务器系统。这是一个真正意义的全64位操作系统,为充分发挥多核心处理器和内存的性能而设计,且完全兼容32位应用程序。

  3. On the Selection of MAC Optimised Routing Protocol for VANET

    Directory of Open Access Journals (Sweden)

    Kanu Priya

    2017-02-01

    Full Text Available In today‘s era of modernization, the concept of smart vehicles, smart cities and automated vehicles is trending day by day. VANET (Vehicular Adhoc Network has also been emerging as a potential applicant to enable these smart applications. Though VANET is very much similar to MANET (Mobile Adhoc Network but VANET has more severe challenges as compared to MANET due to hostile channel conditions and high degree of mobility. So lot of work related to MAC and Network Layer need attention from the network designers. In this paper MAC Layer has been optimised in terms of Queue Size by using QoS Parameters namely Packet Collision Rate, Packet Drop Rate, Throughput Rate and Broadcast Rate. In doing so, simulative investigations have been done to find out optimum queue size. For this purpose various routing protocols namely DSDV, AODV, ADV and GOD have been considered and optimum queue length for each of these have been obtained. Further the most efficient routing protocol has also been identified. Moreover this paper also compares the performance of most efficient Routing Protocols selected in terms of QoS parameters for different MAC Interfaces.

  4. Collection and analysis of environmental radiation data using a desktop computer

    Energy Technology Data Exchange (ETDEWEB)

    Gogolak, C V

    1982-04-01

    A portable instrumentation sytem using a Hewlett-Packard HP-9825 desktop computer for the collection and analysis of environmental radiation data is described. Procedures for the transmission of data between the HP-9825 and various nuclear counters are given together with a description of the necessary hardware and software. Complete programs for the analysis of Ge(Li) and NaI(Tl) gamma-ray spectra, high pressure ionization chamber monitor data, /sup 86/Kr monitor data and air filter sample alpha particle activity measurements are presented. Some utility programs, intended to increase system flexibility, are included.

  5. A Desk-top tutorial Demonstration of Model-based Fault Detection and Diagnosis

    OpenAIRE

    Shi, John Z.; Elshanti, Ali; Gu, Fengshou; Ball, Andrew

    2007-01-01

    In this paper, a demonstration on the model-based approach for fault detection has been presented. The aim of this demo is to provide students a desk-top tool to start learning model-based approach. The demo works on a traditional three-tank system. After a short review of the model-based approach, this paper emphasizes on two difficulties often asked by students when they start learning model-based approach: how to develop a system model and how to generate residual for fault detection. The ...

  6. Desktop system for accounting, audit, and research in A&E.

    Science.gov (United States)

    Taylor, C J; Brain, S G; Bull, F; Crosby, A C; Ferguson, D G

    1997-01-01

    The development of a database for audit, research, and accounting in accident and emergency (A&E) is described. The system uses a desktop computer, an optical scanner, sophisticated optical mark reader software, and workload management data. The system is highly flexible, easy to use, and at a cost of around 16,000 pounds affordable for larger departments wishing to move towards accounting. For smaller departments, it may be an alternative to full computerisation. Images Figure 1 Figure 2 Figure 3 Figure 5 Figure 6 PMID:9132200

  7. Teaching Online or On-Campus? – What Students Say About Desktop Videoconferencing

    Directory of Open Access Journals (Sweden)

    Anders Grov Nilsen

    2013-06-01

    Full Text Available In order to refine online teaching environments, we ask: What do in-service student teachers (n=32 and master’s degree students (n=24 say about desktop videoconferencing (DVC, and how has DVC influenced online teaching and learning? 56 students have completed a survey. Focus group interviews (n=11 and recordings from lessons were also part of the data collected. Our students say that they can cope with the practical and technological issues. The responses indicate there are changes according to student attendance when using DVC.

  8. An evaluation of international nursing education using interactive desktop video conferencing.

    Science.gov (United States)

    Waddell, D L; Tronsgard, B A; Smith, A; Smith, G

    1999-01-01

    Evolving computer technology has opened the door to unique and previously unavailable educational experiences. The use of one form of distance learning enabled undergraduate nursing students in the United States and England to participate in a short course on women's health issues. The nursing faculty at two universities, one in the United States and the other in England, collaborated on an international nursing education project. The delivery device was interactive desktop video conferencing (DTV). The focus of this article is on the evaluation of the project with recommendations about how best to use DTV in international nursing education.

  9. 42 CFR 423.2140 - MAC Review of ALJ decision in a case remanded by a Federal District Court.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false MAC Review of ALJ decision in a case remanded by a... BENEFIT Reopening, ALJ Hearings, MAC review, and Judicial Review § 423.2140 MAC Review of ALJ decision in..., when a case is remanded by a Federal District Court for further consideration and the MAC remands the...

  10. Detailed Debunking of Denial

    Science.gov (United States)

    Enting, I. G.; Abraham, J. P.

    2012-12-01

    The disinformation campaign against climate science has been compared to a guerilla war whose tactics undermine the traditional checks and balances of science. One comprehensive approach has to been produce archives of generic responses such as the websites of RealClimate and SkepticalScience. We review our experiences with an alternative approach of detailed responses to a small number of high profile cases. Our particular examples were Professor Ian Plimer and Christopher Monckton, the Third Viscount Monckton of Brenchley, each of whom has been taken seriously by political leaders in our respective countries. We relate our experiences to comparable examples such as John Mashey's analysis of the Wegman report and the formal complaints about Lomborg's "Skeptical Environmentalist" and Durkin's "Great Global Warming Swindle". Our two approaches used contrasting approaches: an on-line video of a lecture vs an evolving compendium of misrepresentations. Additionally our approaches differed in the emphasis. The analysis of Monckton concentrated on the misrepresentation of the science, while the analysis of Plimer concentrated on departures from accepted scientific practice: fabrication of data, misrepresentation of cited sources and unattributed use of the work of others. Benefits of an evolving compendium were the ability to incorporate contributions from members of the public who had identified additional errors and the scope for addressing new aspects as they came to public attention. `Detailed debunking' gives non-specialists a reference point for distinguishing non-science when engaging in public debate.

  11. Leukocyte integrin Mac-1 regulates thrombosis via interaction with platelet GPIbα.

    Science.gov (United States)

    Wang, Yunmei; Gao, Huiyun; Shi, Can; Erhardt, Paul W; Pavlovsky, Alexander; A Soloviev, Dmitry; Bledzka, Kamila; Ustinov, Valentin; Zhu, Liang; Qin, Jun; Munday, Adam D; Lopez, Jose; Plow, Edward; Simon, Daniel I

    2017-05-30

    Inflammation and thrombosis occur together in many diseases. The leukocyte integrin Mac-1 (also known as integrin αMβ2, or CD11b/CD18) is crucial for leukocyte recruitment to the endothelium, and Mac-1 engagement of platelet GPIbα is required for injury responses in diverse disease models. However, the role of Mac-1 in thrombosis is undefined. Here we report that mice with Mac-1 deficiency (Mac-1(-/-)) or mutation of the Mac-1-binding site for GPIbα have delayed thrombosis after carotid artery and cremaster microvascular injury without affecting parameters of haemostasis. Adoptive wild-type leukocyte transfer rescues the thrombosis defect in Mac-1(-/-) mice, and Mac-1-dependent regulation of the transcription factor Foxp1 contributes to thrombosis as evidenced by delayed thrombosis in mice with monocyte-/macrophage-specific overexpression of Foxp1. Antibody and small-molecule targeting of Mac-1:GPIbα inhibits thrombosis. Our data identify a new pathway of thrombosis involving leukocyte Mac-1 and platelet GPIbα, and suggest that targeting this interaction has anti-thrombotic therapeutic potential with reduced bleeding risk.

  12. Characteristics of Mycobacterium avium complex (MAC) pulmonary disease in previously treated lung cancer patients.

    Science.gov (United States)

    Meier, Erin; Pennington, Kelly; Gallo de Moraes, Alice; Escalante, Patricio

    2017-01-01

    Mycobacterium avium complex (MAC) is responsible for a large portion of non-tuberculous mycobacterial (NTM) infections worldwide. Host factors such as active malignancy, immunosuppression, chronic obstructive pulmonary disease (COPD) and bronchiectasis increase the risk of MAC infection. However, the relationship between previously treated lung cancer with subsequent development of MAC pulmonary disease and treatment outcomes have not been previously studied. We retrospectively identified all patients with lung cancer and MAC pulmonary disease documented in medical records at Mayo Clinic between January 2005 and October 2016. Patients who were diagnosed with MAC pulmonary disease before or at the time of lung cancer diagnosis were excluded. Patients meeting all inclusion criteria underwent chart review for prior oncologic treatments, clinical characteristics, and MAC treatment response. We identified 13 patients with MAC pulmonary disease and prior lung cancer, including 4 men and 9 women. Eight patients had structural lung disease that can predispose to MAC pulmonary disease, including bronchiectasis (23.0%) and COPD (46.2%). Four (30.8%) had no apparent immunosuppression or other risk factor(s) for MAC pulmonary disease. Primary pulmonary malignancies included pulmonary carcinoid, adenocarcinoma, and squamous cell carcinoma. Ten (76.9%) patients were started on antimicrobial treatment for MAC, and 8 (61.5%) patients completed MAC treatment with 6 (46.1%) patients achieving symptomatic improvement. MAC pulmonary disease in previously treated lung cancer can occur without apparent risk factors for this NTM infection. Symptomatic improvement with MAC antimicrobial therapy appears to be lower than expected but comorbidities might influence outcomes in this patient population.

  13. IMPACTS OF APPLICATION USAGE AND LOCAL HARDWARE ON THE THROUGHPUT OF COMPUTER NETWORKS WITH DESKTOP VIRTUALIZATION

    Directory of Open Access Journals (Sweden)

    Vitor Chaves De Oliveira

    2013-01-01

    Full Text Available Currently, virtualization solutions are employed in the vast majority of organizations around the world. The reasons for this are the benefits gained by the approach, focusing on increases in security, availability and data integrity. These privileges are also present in a new technique, which emerges from this same concept and is called desktop virtualization. This method, compelled by these advantages, has grown considerably and is likely to be implemented on more than three-quarters of organizations before 2014. As it is a technique based on physical client server architecture, it conducts all its actions on a local computer and responds to user interaction, through clients that are physically elsewhere. This means that the technique depends on the communication network which makes the interaction possible. Therefore, the importance of the network is increased and it is important to study its behavior compared to a traditional desktop solution, that is, a local solution. This article demonstrates the impact related to a Quality of Service (QoS parameter, throughput, which suffered great alterations depending on the implemented computational environment. Concomitantly, other results are expressed concerning the Quality of Experience (QoE decay with a thin client and a significant benefit of virtualization on the QoS, when remote access is required.

  14. Assessing soil erosion risk using RUSLE through a GIS open source desktop and web application.

    Science.gov (United States)

    Duarte, L; Teodoro, A C; Gonçalves, J A; Soares, D; Cunha, M

    2016-06-01

    Soil erosion is a serious environmental problem. An estimation of the expected soil loss by water-caused erosion can be calculated considering the Revised Universal Soil Loss Equation (RUSLE). Geographical Information Systems (GIS) provide different tools to create categorical maps of soil erosion risk which help to study the risk assessment of soil loss. The objective of this study was to develop a GIS open source application (in QGIS), using the RUSLE methodology for estimating erosion rate at the watershed scale (desktop application) and provide the same application via web access (web application). The applications developed allow one to generate all the maps necessary to evaluate the soil erosion risk. Several libraries and algorithms from SEXTANTE were used to develop these applications. These applications were tested in Montalegre municipality (Portugal). The maps involved in RUSLE method-soil erosivity factor, soil erodibility factor, topographic factor, cover management factor, and support practices-were created. The estimated mean value of the soil loss obtained was 220 ton km(-2) year(-1) ranged from 0.27 to 1283 ton km(-2) year(-1). The results indicated that most of the study area (80 %) is characterized by very low soil erosion level (web and the desktop application are freely available.

  15. Effects of boundary-layer separation controllers on a desktop fume hood.

    Science.gov (United States)

    Huang, Rong Fung; Chen, Jia-Kun; Hsu, Ching Min; Hung, Shuo-Fu

    2016-10-02

    A desktop fume hood installed with an innovative design of flow boundary-layer separation controllers on the leading edges of the side plates, work surface, and corners was developed and characterized for its flow and containment leakage characteristics. The geometric features of the developed desktop fume hood included a rearward offset suction slot, two side plates, two side-plate boundary-layer separation controllers on the leading edges of the side plates, a slanted surface on the leading edge of the work surface, and two small triangular plates on the upper left and right corners of the hood face. The flow characteristics were examined using the laser-assisted smoke flow visualization technique. The containment leakages were measured by the tracer gas (sulphur hexafluoride) detection method on the hood face plane with a mannequin installed in front of the hood. The results of flow visualization showed that the smoke dispersions induced by the boundary-layer separations on the leading edges of the side plates and work surface, as well as the three-dimensional complex flows on the upper-left and -right corners of the hood face, were effectively alleviated by the boundary-layer separation controllers. The results of the tracer gas detection method with a mannequin standing in front of the hood showed that the leakage levels were negligibly small (≤0.003 ppm) at low face velocities (≥0.19 m/s).

  16. Use of a programmable desk-top calculator for the statistical quality control of radioimmunoassays.

    Science.gov (United States)

    Cernosek, S F; Gutierrez-Cernosek, R M

    1978-07-01

    We have developed an interactive statistical quality-control system for the small- to medium-sized radioimmunoassay laboratory, which can be used in a programmable desk-top calculator instead of the medium- or large-scale computer systems usually required. The design of this quality-control system is modeled after the suggestions of Rodbard and has three components. The first component evaluates the relationship between the measured response variable of the radioimmunoassay and the precision (or variance) of these measurements. This derived relationship is then used in the second component of the system as the basis for the weighting function used to calculate an interative, weighted, least squares regression of the logit-log transformation of the dose-response curve. The third component uses the quality-control parameters statistically calculated from the linearized dose-response curve to monitor whether the assay is "in-control". The calculator tabulates the means and confidence limits for the various parameters and can plot the statistical quality-control charts. The major benefit of this statistical quality-control system is that it allows the real-time computation and plotting of quality-control data with a programmable desk-top calculator.

  17. DIaaS: Resource Management System for the Intra-Cloud with On-Premise Desktops

    Directory of Open Access Journals (Sweden)

    Hyun-Woo Kim

    2017-01-01

    Full Text Available Infrastructure as a service with desktops (DIaaS based on the extensible mark-up language (XML is herein proposed to utilize surplus resources. DIaaS is a traditional surplus-resource integrated management technology. It is designed to provide fast work distribution and computing services based on user service requests as well as storage services through desktop-based distributed computing and storage resource integration. DIaaS includes a nondisruptive resource service and an auto-scalable scheme to enhance the availability and scalability of intra-cloud computing resources. A performance evaluation of the proposed scheme measured the clustering performance time for surplus resource utilization. The results showed improvement in computing and storage services in a connection of at least two computers compared to the traditional method for high-availability measurement of nondisruptive services. Furthermore, an artificial server error environment was used to create a clustering delay for computing and storage services and for nondisruptive services. It was compared to the Hadoop distributed file system (HDFS.

  18. Fabrication of low cost soft tissue prostheses with the desktop 3D printer.

    Science.gov (United States)

    He, Yong; Xue, Guang-huai; Fu, Jian-zhong

    2014-11-27

    Soft tissue prostheses such as artificial ear, eye and nose are widely used in the maxillofacial rehabilitation. In this report we demonstrate how to fabricate soft prostheses mold with a low cost desktop 3D printer. The fabrication method used is referred to as Scanning Printing Polishing Casting (SPPC). Firstly the anatomy is scanned with a 3D scanner, then a tissue casting mold is designed on computer and printed with a desktop 3D printer. Subsequently, a chemical polishing method is used to polish the casting mold by removing the staircase effect and acquiring a smooth surface. Finally, the last step is to cast medical grade silicone into the mold. After the silicone is cured, the fine soft prostheses can be removed from the mold. Utilizing the SPPC method, soft prostheses with smooth surface and complicated structure can be fabricated at a low cost. Accordingly, the total cost of fabricating ear prosthesis is about $30, which is much lower than the current soft prostheses fabrication methods.

  19. Security Risk Minimization for Desktop and Mobile Software Systems. An In-Depth Analysis

    Directory of Open Access Journals (Sweden)

    Florina Camelia PUICAN

    2014-01-01

    Full Text Available In an extremely rapid growing industry such as the information technology nowadays, continuous and efficient workflows need to be established within any integrated enterprise or consumer software system. Taking into consideration the actual trend of data and information migrating to mobile devices, which have became more than just simple gadgets, the security threats and vulnerabilities of software products have created a new playground for attackers, especially when the system offers cross-platform (desktop and mobile functionalities and applicability. In this context, the paper proposes an in depth analysis over some of the weaknesses software systems present, providing also a set of solutions for minimizing and mitigating the risks of any solution, be it mobile or desktop. Subsequently, even though consumer and enterprise systems have fundamentally different structures and architectures (due to the different needs of the end user, data loss or information leakage may and will affect any type of machine if proper securization of the systems is not taken into consideration, therefore risk minimization through an in-depth analysis of any integrated software system becomes mandatory and needs extensive care.

  20. Fabrication of low cost soft tissue prostheses with the desktop 3D printer

    Science.gov (United States)

    He, Yong; Xue, Guang-Huai; Fu, Jian-Zhong

    2014-11-01

    Soft tissue prostheses such as artificial ear, eye and nose are widely used in the maxillofacial rehabilitation. In this report we demonstrate how to fabricate soft prostheses mold with a low cost desktop 3D printer. The fabrication method used is referred to as Scanning Printing Polishing Casting (SPPC). Firstly the anatomy is scanned with a 3D scanner, then a tissue casting mold is designed on computer and printed with a desktop 3D printer. Subsequently, a chemical polishing method is used to polish the casting mold by removing the staircase effect and acquiring a smooth surface. Finally, the last step is to cast medical grade silicone into the mold. After the silicone is cured, the fine soft prostheses can be removed from the mold. Utilizing the SPPC method, soft prostheses with smooth surface and complicated structure can be fabricated at a low cost. Accordingly, the total cost of fabricating ear prosthesis is about $30, which is much lower than the current soft prostheses fabrication methods.

  1. Global detailed gravimetric geoid

    Science.gov (United States)

    Vincent, S.; Marsh, J. G.

    1974-01-01

    A global detailed gravimetric geoid has been computed by combining the Goddard Space Flight Center GEM-4 gravity model derived from satellite and surface gravity data and surface 1 x 1-deg mean free-air gravity anomaly data. The accuracy of the geoid is plus or minus 2 meters on continents, 5 to 7 meters in areas where surface gravity data are sparse, and 10 to 15 meters in areas where no surface gravity data are available. Comparisons have been made with the astrogeodetic data provided by Rice (United States), Bomford (Europe), and Mather (Australia). Comparisons have also been carried out with geoid heights derived from satellite solutions for geocentric station coordinates in North America, the Caribbean, Europe and Australia.

  2. Consider the details

    DEFF Research Database (Denmark)

    Rasmussen, Rasmus; Hertzum, Morten

    2013-01-01

    levels of distance in our study. For revision time, the electronic whiteboard is slower on one subtask but there is no difference on another subtask. Participants prefer the electronic whiteboard. Given the font size of the electronic whiteboard, the inferior reading accuracy is unsurprising......Electronic whiteboards are replacing dry-erase whiteboards in many contexts. In this study we compare electronic and dry-erase whiteboards in emergency departments (EDs) with respect to reading distance and revision time. We find inferior reading accuracy for the electronic whiteboard at all three...... but the reduced possibilities for acquiring information at a glance when clinicians pass the whiteboard may adversely affect their overview. Conversely, the similar revision times for one subtask show that logon may be done quickly. We discuss how details such as font size and logon may impact the high-level...

  3. THE INFLUENCE OF MAC BUFFER ON THE CONTENTION-BASED ACCESS SCHEME WITH BURSTING OPTION FOR IEEE 802.11E WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    S. SELVAKENNEDY

    2006-12-01

    Full Text Available Wireless LANs are increasingly being used for inelastic applications. Currently, there is little support for quality of service in the IEEE 802.11 MAC protocol, and IEEE task group E has defined the 802.11e MAC extension. Enhanced distributed channel access (EDCA is a contention-based scheme of the 802.11e standard. To allow a station to transmit more than one frame from a single contention, an optional feature known as controlled frame-bursting (CFB is introduced in the standard. In this paper, we initially performed an average analysis to determine a suitable burst duration limit. Then, a detailed evaluation and comparison of the EDCA protocol with the CFB option is carried out through simulation to quantify its performance gain. The impact of the MAC transmit buffer size is also incorporated. Accordingly, we have proposed a suitable approach to guide the configuration of the burst duration limit. It is demonstrated that an optimized CFB configuration allows the MAC protocol to achieve 30% more capacity than the basic EDCA scheme.

  4. Contributions to Desktop Grid Computing : From High Throughput Computing to Data-Intensive Sciences on Hybrid Distributed Computing Infrastructures

    OpenAIRE

    Fedak, Gilles

    2015-01-01

    Since the mid 90’s, Desktop Grid Computing - i.e the idea of using a large number of remote PCs distributed on the Internet to execute large parallel applications - has proved to be an efficient paradigm to provide a large computational power at the fraction of the cost of a dedicated computing infrastructure.This document presents my contributions over the last decade to broaden the scope of Desktop Grid Computing. My research has followed three different directions. The first direction has ...

  5. Design of High Speed Architecture of Parallel MAC Based On Radix-2 MBA

    Directory of Open Access Journals (Sweden)

    Syed Anwar Ahmed,

    2014-05-01

    Full Text Available The multiplier and multiplier-and-accumulator (MAC are the essential elements of the digital signal processing such as filtering, convolution, transformations and Inner products. Parallel MAC is frequently used in digital signal processing and video/graphics applications. Fast multipliers are essential parts of digital signal processing systems. The speed of multiply operation is of great importance in digital signal processing as well as in the general purpose processors today, especially since the media processing took off. The MAC provides high speed multiplication and multiplication with accumulative addition. This paper presents a combined process of multiplication and accumulation based on radix-4 & radix-8 booth encodings. In this Paper, we investigate the method of implementing the Parallel MAC with the smallest possible delay. Enhancing the speed of operation of the parallel MAC is a major design issue. This has been achieved by developing a CLA adder for parallel MAC.

  6. TMAC: Timestamp-Ordered MAC Protocol for Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2011-05-01

    Wireless Mesh Networks (WMNs) have emerged to meet a need for a self-organized and self-configured multi-hop wireless network infrastructure. Low cost infrastructure and ease of deployment have made WMNs an attractive technology for last mile access. However, 802.11 based WMNs are subject to serious fairness issues. With backlogged TCP traffic, nodes which are two or more hops away from the gateway are subject to starvation, while the one-hop away node saturates the channel with its own local traffic. We study the interactions of TCP and IEEE 802.11 MAC in WMNs to aid us in understanding and overcoming the unfairness problem. We propose a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically derive the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs via a manipulative per-node scheduling mechanism which takes advantage of the age of each packet as a priority metric. Simulation is conducted to validate our model and to illustrate the fairness characteristics of TMAC. Our results show that TMAC achieves excellent resource allocation fairness while maintaining above 90% of maximum link capacity in parking lot and large grid topologies. Our work illuminates the factors affecting TCP fairness in WMNs. Our theoretical and empirical findings can be used in future research to develop more fairness-aware protocols for WMNs.

  7. Crowdsourcing detailed flood data

    Science.gov (United States)

    Walliman, Nicholas; Ogden, Ray; Amouzad*, Shahrzhad

    2015-04-01

    Over the last decade the average annual loss across the European Union due to flooding has been 4.5bn Euros, but increasingly intense rainfall, as well as population growth, urbanisation and the rising costs of asset replacements, may see this rise to 23bn Euros a year by 2050. Equally disturbing are the profound social costs to individuals, families and communities which in addition to loss of lives include: loss of livelihoods, decreased purchasing and production power, relocation and migration, adverse psychosocial effects, and hindrance of economic growth and development. Flood prediction, management and defence strategies rely on the availability of accurate information and flood modelling. Whilst automated data gathering (by measurement and satellite) of the extent of flooding is already advanced it is least reliable in urban and physically complex geographies where often the need for precise estimation is most acute. Crowdsourced data of actual flood events is a potentially critical component of this allowing improved accuracy in situations and identifying the effects of local landscape and topography where the height of a simple kerb, or discontinuity in a boundary wall can have profound importance. Mobile 'App' based data acquisition using crowdsourcing in critical areas can combine camera records with GPS positional data and time, as well as descriptive data relating to the event. This will automatically produce a dataset, managed in ArcView GIS, with the potential for follow up calls to get more information through structured scripts for each strand. Through this local residents can provide highly detailed information that can be reflected in sophisticated flood protection models and be core to framing urban resilience strategies and optimising the effectiveness of investment. This paper will describe this pioneering approach that will develop flood event data in support of systems that will advance existing approaches such as developed in the in the UK

  8. Tournament MAC with Constant Size Congestion Window for WLAN

    CERN Document Server

    Galtier, Jerome

    2007-01-01

    In the context of radio distributed networks, we present a generalized approach for the Medium Access Control (MAC) with fixed congestion window. Our protocol is quite simple to analyze and can be used in a lot of different situations. We give mathematical evidence showing that our performance is tight, in the sense that no protocol with fixed congestion window can do better. We also place ourselves in the WiFi/WiMAX framework, and show experimental results enlightening collision reduction of 14% to 21% compared to the best known other methods. We show channel capacity improvement, and fairness considerations.

  9. Dual Description of Supergravity MacDowell-Mansouri Theory

    CERN Document Server

    García-Compéan, H; Obregón, O; Ramírez, C

    1999-01-01

    In the context of field theory two elements seem to be necessary to search for strong-weak coupling duality. First, one needs a gauge theory and second, it should be supersymmetric. For gravitation these two elements are present in MacDowell-Mansouri supergravity. The search for an "effective duality" in this theory presents technical and conceptual problems that we discuss. Nevertheless, by means of a field theoretical approach, which in the abelian case coincides with $S$-duality, we exhibit a dual theory for supergravity, with inverted couplings. This results in a supersymmetric non-linear sigma model of the Freedman-Townsend type.

  10. Mac configuration management at the Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Marcus, Allan B [Los Alamos National Laboratory

    2010-01-01

    The Los Alamos National Laboratory (LANL) had a need for central configuration management of non-Windows computers. LANL has three to five thousand Macs and an equal number of Linux based systems. The primary goal was to be able to inventory all non-windows systems and patch Mc OS X systems. LANL examined a number of commercial and open source solutions and ultimately selected Puppet. This paper will discuss why we chose Puppet, how we implemented it, and some lessons we learned along the way.

  11. Proximate analysis of coal by Leco MAC-400

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, S.T. (British Steel Corporation, London (UK). Ravenscraig Works)

    1988-01-01

    Discussion is presented of the use of the Leco Mac-400 Proximate Analyser at the Ravenscraig Steel Works, UK. It is used for the analysis of in-plant coals and the determination of ash in coke. The instrument does not meet the British Standard requirement for repeatability, so is not used for 'value in use' coal analysis. It has recently been overhauled, however, and will be re-evaluated to see if the overhaul has brought an improvement in performance. 6 figs., 7 tabs.

  12. Intelligent Cooperative MAC Protocol for Balancing Energy Consumption

    Science.gov (United States)

    Wu, S.; Liu, K.; Huang, B.; Liu, F.

    To extend the lifetime of wireless sensor networks, we proposed an intelligent balanced energy consumption cooperative MAC protocol (IBEC-CMAC) based on the multi-node cooperative transmission model. The protocol has priority to access high-quality channels for reducing energy consumption of each transmission. It can also balance the energy consumption among cooperative nodes by using high residual energy nodes instead of excessively consuming some node's energy. Simulation results show that IBEC-CMAC can obtain longer network lifetime and higher energy utilization than direct transmission.

  13. Detailed IR aperture measurements

    CERN Document Server

    Bruce, Roderik; Garcia Morales, Hector; Giovannozzi, Massimo; Hermes, Pascal Dominik; Mirarchi, Daniele; Quaranta, Elena; Redaelli, Stefano; Rossi, Carlo; Skowronski, Piotr Krzysztof; Wretborn, Sven Joel; CERN. Geneva. ATS Department

    2016-01-01

    MD 1673 was carried out on October 5 2016, in order to investigate in more detail the available aperture in the LHC high-luminosity insertions at 6.5 TeV and β∗=40 cm. Previous aperture measurements in 2016 during commissioning had shown that the available aperture is at the edge of protection, and that the aperture bottleneck at β∗=40 cm in certain cases is found in the separation plane instead of in the crossing plane. Furthermore, the bottlenecks were consistently found in close to the upstream end of Q3 on the side of the incoming beam, and not in Q2 on the outgoing beam as expected from calculations. Therefore, this MD aimed at measuring IR1 and IR5 separately (at 6.5 TeV and β∗=40 cm, for 185 µrad half crossing angle), to further localize the bottlenecks longitudinally using newly installed BLMs, investigate the difference in aperture between Q2 and Q3, and to see if any aperture can be gained using special orbit bumps.

  14. Minimum alveolar concentration (MAC) for sevoflurane and xenon at normothermia and hypothermia in newborn pigs.

    Science.gov (United States)

    Liu, X; Dingley, J; Elstad, M; Scull-Brown, E; Steen, P A; Thoresen, M

    2013-05-01

    Neuroprotection from therapeutic hypothermia increases when combined with the anaesthetic gas xenon in animal studies. A clinical feasibility study of the combined treatment has been successfully undertaken in asphyxiated human term newborns. It is unknown whether xenon alone would be sufficient for sedation during hypothermia eliminating or reducing the need for other sedative or analgesic infusions in ventilated sick infants. Minimum alveolar concentration (MAC) of xenon is unknown in any neonatal species. Eight newborn pigs were anaesthetised with sevoflurane alone and then sevoflurane plus xenon at two temperatures. Pigs were randomised to start at either 38.5°C or 33.5°C. MAC for sevoflurane was determined using the claw clamp technique at the preset body temperature. For xenon MAC determination, a background of 0.5 MAC sevoflurane was used, and 60% xenon added to the gas mixture. The relationship between sevoflurane and xenon MAC is assumed to be additive. Xenon concentrations were changed in 5% steps until a positive clamp reaction was noted. Pigs' temperature was changed to the second target, and two MAC determinations for sevoflurane and 0.5 MAC sevoflurane plus xenon were repeated. MAC for sevoflurane was 4.1% [95% confidence interval (CI): 3.65-4.50] at 38.5°C and 3.05% (CI: 2.63-3.48) at 33.5°C, a significant reduction. MAC for xenon was 120% at 38.5°C and 116% at 33.5°C, not different. In newborn swine sevoflurane, MAC was temperature dependent, while xenon MAC was independent of temperature. There was large individual variability in xenon MAC, from 60% to 120%. © 2013 The Acta Anaesthesiologica Scandinavica Foundation.

  15. MQ-MAC: A Multi-Constrained QoS-Aware Duty Cycle MAC for Heterogeneous Traffic in Wireless Sensor Networks

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Rahman, Md. Obaidur; Hong, Choong Seon; Lee, Sungwon

    2010-01-01

    Energy conservation is one of the striking research issues now-a-days for power constrained wireless sensor networks (WSNs) and hence, several duty-cycle based MAC protocols have been devised for WSNs in the last few years. However, assimilation of diverse applications with different QoS requirements (i.e., delay and reliability) within the same network also necessitates in devising a generic duty-cycle based MAC protocol that can achieve both the delay and reliability guarantee, termed as multi-constrained QoS, while preserving the energy efficiency. To address this, in this paper, we propose a Multi-constrained QoS-aware duty-cycle MAC for heterogeneous traffic in WSNs (MQ-MAC). MQ-MAC classifies the traffic based on their multi-constrained QoS demands. Through extensive simulation using ns-2 we evaluate the performance of MQ-MAC. MQ-MAC provides the desired delay and reliability guarantee according to the nature of the traffic classes as well as achieves energy efficiency. PMID:22163439

  16. MQ-MAC: a multi-constrained QoS-aware duty cycle MAC for heterogeneous traffic in wireless sensor networks.

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Rahman, Md Obaidur; Hong, Choong Seon; Lee, Sungwon

    2010-01-01

    Energy conservation is one of the striking research issues now-a-days for power constrained wireless sensor networks (WSNs) and hence, several duty-cycle based MAC protocols have been devised for WSNs in the last few years. However, assimilation of diverse applications with different QoS requirements (i.e., delay and reliability) within the same network also necessitates in devising a generic duty-cycle based MAC protocol that can achieve both the delay and reliability guarantee, termed as multi-constrained QoS, while preserving the energy efficiency. To address this, in this paper, we propose a Multi-constrained QoS-aware duty-cycle MAC for heterogeneous traffic in WSNs (MQ-MAC). MQ-MAC classifies the traffic based on their multi-constrained QoS demands. Through extensive simulation using ns-2 we evaluate the performance of MQ-MAC. MQ-MAC provides the desired delay and reliability guarantee according to the nature of the traffic classes as well as achieves energy efficiency.

  17. MQ-MAC: A Multi-Constrained QoS-Aware Duty Cycle MAC for Heterogeneous Traffic in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2010-11-01

    Full Text Available Energy conservation is one of the striking research issues now-a-days for power constrained wireless sensor networks (WSNs and hence, several duty-cycle based MAC protocols have been devised for WSNs in the last few years. However, assimilation of diverse applications with different QoS requirements (i.e., delay and reliability within the same network also necessitates in devising a generic duty-cycle based MAC protocol that can achieve both the delay and reliability guarantee, termed as multi-constrained QoS, while preserving the energy efficiency. To address this, in this paper, we propose a Multi-constrained QoS-aware duty-cycle MAC for heterogeneous traffic in WSNs (MQ-MAC. MQ-MAC classifies the traffic based on their multi-constrained QoS demands. Through extensive simulation using ns-2 we evaluate the performance of MQ-MAC. MQ-MAC provides the desired delay and reliability guarantee according to the nature of the traffic classes as well as achieves energy efficiency.

  18. Sevoflurane decreases bispectral index values more than does halothane at equal MAC multiples.

    Science.gov (United States)

    Schwab, Hildebrand S; Seeberger, Manfred D; Eger, Edmond I; Kindler, Christoph H; Filipovic, Miodrag

    2004-12-01

    At the minimum alveolar concentration (MAC) of inhaled anesthetics, 50% of subjects move in response to noxious stimulation. Similarly, at MAC-awake, 50% of subjects respond appropriately to command. The bispectral index (BIS) nominally measures the effect of anesthetics on wakefulness or consciousness. We postulated that the use of halothane with a larger MAC-awake/MAC ratio than sevoflurane would produce higher BIS values at comparable levels of MAC. We studied 33 unpremedicated patients anesthetized by inhalation, 18 with sevoflurane and 15 with halothane. We measured BIS before and during anesthesia at 1 MAC, both before and after tracheal intubation facilitated by fentanyl and rocuronium and then at 1.5 MAC. BIS measurements were made after meeting steady-state conditions. No surgery was performed during this study. BIS values in awake patients did not differ between the sevoflurane and halothane groups (96 +/- 2 and 96 +/- 2, mean +/- sd, respectively). At 1 MAC without and with neuromuscular blockade and at 1.5 MAC, BIS values for patients anesthetized with halothane (54 +/- 7, 56 +/- 7, and 49 +/- 7, respectively) exceeded those for patients anesthetized with sevoflurane (34 +/- 6, 34 +/- 6, and 29 +/- 5, respectively) (P < 0.0001). This finding adds to other evidence indicating that BIS is drug specific.

  19. Power-Controlled MAC Protocols with Dynamic Neighbor Prediction for Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Meng; ZHANG Lin; XIAO Yong-kang; SHAN Xiu-ming

    2004-01-01

    Energy and bandwidth are the scarce resources in ad hoc networks because most of the mobile nodes are battery-supplied and share the exclusive wireless medium. Integrating the power control into MAC protocol is a promising technique to fully exploit these precious resources of ad hoc wireless networks. In this paper, a new intelligent power-controlled Medium Access Control (MAC) (iMAC) protocol with dynamic neighbor prediction is proposed. Through the elaborate design of the distributed transmit-receive strategy of mobile nodes, iMAC greatly outperforms the prevailing IEEE 802.11 MAC protocols in not only energy conservation but also network throughput. Using the Dynamic Neighbor Prediction (DNP), iMAC performs well in mobile scenes. To the best of our knowledge, iMAC is the first protocol that considers the performance deterioration of power-controlled MAC protocols in mobile scenes and then proposes a solution. Simulation results indicate that DNP is important and necessary for power-controlled MAC protocols in mobile ad hoc networks.

  20. An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Lauritsen, Rasmus; Toft, Tomas

    2014-01-01

    (nicknamed MiniMac). While TinyOT has already been implemented, we present in this paper the first implementation of MiniMac, using the same platform as the existing TinyOT implementation. We also suggest several improvements of MiniMac, both on the protocol design and implementation level. In particular, we...... suggest a modification of MiniMac that achieves increased parallelism at no extra communication cost. This gives an asymptotic improvement of the original protocol as well as an 8-fold speed-up of our implementation. We compare the resulting protocol to TinyOT for the case of secure computation in parallel...

  1. PA-MAC:A Passive Asynchronous MAC Protocol for Low Duty-Cycled Wireless Sensor Networks%PA-MAC:一种被动的异步低占空比无线传感器网络MAC协议

    Institute of Scientific and Technical Information of China (English)

    唐震洲; 施晓秋; 金可仲

    2011-01-01

    空闲侦听是无线传感器网络能耗的主要原因之一,而占空比机制是减少空闲侦听能量损耗最主要的方法之一.提出了一种新的无线传感器网络异步MAC协议,称为PA-MAC(Passive Asynchronous MAC),即被动异步MAC.PA-MAC通过采用接收方发起数据传输机制、异步占空比机制以及节点唤醒时间估计机制,降低了节点的工作占空比,提高了网络的能量有效性.在NS2网络仿真平台上对PA-MAC的性能进行了评估.仿真结果表明,在保持网络性能的前提下,PA-MAC能够进一步降低节点工作的占空比,进而减少节点的能耗.%The problem of idle listening is one of the most concerned issues in wireless sensor networks, and the duty cycling mechanism is widely used to reduce energy consumption. We present a new asynchronous MAC protocol, called Passive-Asynchronous MAC (PA-MAC). PA-MAC uses receiver-initiated data transmission scheme, asynchronous duty cycling mechanism and awakening time estimation scheme to achieve low duty cycle and high energy efficiency. Simulations have been done to evaluate the performance of the proposed new protocol, by which we can find out that,on the premise of keeping the network performance,PA-MAC can further reduce the nodes' duty cycle ,thereby reduce the energy consumption.

  2. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  3. Learning Microsoft Excel 2011 for Mac video training DVD

    CERN Document Server

    Vaccaro, Guy

    2011-01-01

    In this video tutorial for Microsoft Excel 2011 For Mac, expert author Guy Vaccaro teaches you to effectively utilize the features and functions of Excel through project based learning. You will complete various projects, and along they way learn to leverage the power of the most important features Excel 2011 has to offer the Mac user. Starting your training course with the creation of a spreadsheet to record and monitor sales data, you will learn the basics of what you can do with a spreadsheet. You will then move on to creating a Profit and Loss report, learning formulas along the way. Moving to score sheets for a sports day, you will discover conditional based formatting, lookups, and more. You then create a functional expense claim form, advancing your Excel expertise. Moving on to a sales contact management sheet, you will discover how you can manipulate text, and even create mail merges from Excel. Finally, you will utilize all your knowledge thus far to create a sales report, including charts, pivot ta...

  4. MAC Layer Resource Allocation for Wireless Body Area Networks

    Institute of Scientific and Technical Information of China (English)

    Qinghua Shen; Xuemin Sherman Shen; Tom HLuan; Jing Liu

    2014-01-01

    Wireless body area networks (WBANs) can provide low-cost, timely healthcare services and are expected to be widely used for e-healthcare in hospitals. In a hospital, space is often limited and multiple WBANs have to coexist in an area and share the same channel in order to provide healthcare services to different patients. This causes severe interference between WBANs that could significantly reduce the network throughput and increase the amount of power consumed by sensors placed on the body. There-fore, an efficient channel-resource allocation scheme in the medium access control (MAC) layer is crucial. In this paper, we devel-op a centralized MAC layer resource allocation scheme for a WBAN. We focus on mitigating the interference between WBANs and reducing the power consumed by sensors. Channel and buffer state are reported by smartphones deployed in each WBAN, and channel access allocation is performed by a central controller to maximize network throughput. Sensors have strict limitations in terms of energy consumption and computing capability and cannot provide all the necessary information for channel allocation in a timely manner. This deteriorates network performance. We exploit the temporal correlation of the body area channel in order to minimize the number of channel state reports necessary. We view the network design as a partly observable optimization prob-lem and develop a myopic policy, which we then simulate in Matlab.

  5. A Review of MAC Scheduling Algorithms in LTE System

    Directory of Open Access Journals (Sweden)

    Satheesh Monikandan B

    2017-06-01

    Full Text Available The recent wireless communication networks rely on the new technology named Long Term Evolution (LTE to offer high data rate real-time (RT traffic with better Quality of Service (QoS for the increasing demand of customer requirement. LTE provide low latency for real-time services with high throughput, with the help of two-level packet retransmission. Hybrid Automatic Repeat Request (HARQ retransmission at the Medium Access Control (MAC layer of LTE networks achieves error-free data transmission. The performance of the LTE networks mainly depends on how effectively this HARQ adopted in the latest communication standard, Universal Mobile Telecommunication System (UMTS. The major challenge in LTE is to balance QoS and fairness among the users. Hence, it is very essential to design a down link scheduling scheme to get the expected service quality to the customers and to utilize the system resources efficiently. This paper provides a comprehensive literature review of LTE MAC layer and six types of QoS/Channel-aware downlink scheduling algorithms designed for this purpose. The contributions of this paper are to identify the gap of knowledge in the downlink scheduling procedure and to point out the future research direction. Based on the comparative study of algorithms taken for the review, this paper is concluded that the EXP Rule scheduler is most suited for LTE networks due to its characteristics of less Packet Loss Ratio (PLR, less Packet Delay (PD, high throughput, fairness and spectral efficiency.

  6. Using the rear projection of the Socibot Desktop robot for creation of applications with facial expressions

    Science.gov (United States)

    Gîlcă, G.; Bîzdoacă, N. G.; Diaconu, I.

    2016-08-01

    This article aims to implement some practical applications using the Socibot Desktop social robot. We mean to realize three applications: creating a speech sequence using the Kiosk menu of the browser interface, creating a program in the Virtual Robot browser interface and making a new guise to be loaded into the robot's memory in order to be projected onto it face. The first application is actually created in the Compose submenu that contains 5 file categories: audio, eyes, face, head, mood, this being helpful in the creation of the projected sequence. The second application is more complex, the completed program containing: audio files, speeches (can be created in over 20 languages), head movements, the robot's facial parameters function of each action units (AUs) of the facial muscles, its expressions and its line of sight. Last application aims to change the robot's appearance with the guise created by us. The guise was created in Adobe Photoshop and then loaded into the robot's memory.

  7. Expanding services in a shrinking economy: desktop document delivery in a dental school library.

    Science.gov (United States)

    Gushrowski, Barbara A

    2011-07-01

    How can library staff develop and promote a document delivery service and then expand the service to a wide audience? The setting is the library at the Indiana University School of Dentistry (IUSD), Indianapolis. A faculty survey and a citation analysis were conducted to determine potential use of the service. Volume of interlibrary loan transactions and staff and equipment capacity were also studied. IUSD Library staff created a desktop delivery service (DDSXpress) for faculty and then expanded the service to practicing dental professionals and graduate students. The number of faculty using DDSXpress remains consistent. The number of practicing dental professionals using the service is low. Graduate students have been quick to adopt the service. Through careful analysis of capacity and need for the service, staff successfully expanded document delivery service without incurring additional costs. Use of DDSXpress is continually monitored, and opportunities to market the service to practicing dental professionals are being investigated.

  8. Differences in typing forces, muscle activity, comfort, and typing performance among virtual, notebook, and desktop keyboards.

    Science.gov (United States)

    Kim, Jeong Ho; Aulck, Lovenoor; Bartha, Michael C; Harper, Christy A; Johnson, Peter W

    2014-11-01

    The present study investigated whether there were physical exposure and typing productivity differences between a virtual keyboard with no tactile feedback and two conventional keyboards where key travel and tactile feedback are provided by mechanical switches under the keys. The key size and layout were same across all the keyboards. Typing forces; finger and shoulder muscle activity; self-reported comfort; and typing productivity were measured from 19 subjects while typing on a virtual (0 mm key travel), notebook (1.8 mm key travel), and desktop keyboard (4 mm key travel). When typing on the virtual keyboard, subjects typed with less force (p's typing forces and finger muscle activity came at the expense of a 60% reduction in typing productivity (p typing sessions or when typing productivity is at a premium, conventional keyboards with tactile feedback may be more suitable interface.

  9. Fabrication of cerebral aneurysm simulator with a desktop 3D printer.

    Science.gov (United States)

    Liu, Yu; Gao, Qing; Du, Song; Chen, ZiChen; Fu, JianZhong; Chen, Bing; Liu, ZhenJie; He, Yong

    2017-05-17

    Now, more and more patients are suffering cerebral aneurysm. However, long training time limits the rapid growth of cerebrovascular neurosurgeons. Here we developed a novel cerebral aneurysm simulator which can be better represented the dynamic bulging process of cerebral aneurysm The proposed simulator features the integration of a hollow elastic vascular model, a skull model and a brain model, which can be affordably fabricated at the clinic (Fab@Clinic), under $25.00 each with the help of a low-cost desktop 3D printer. Moreover, the clinical blood flow and pulsation pressure similar to the human can be well simulated, which can be used to train the neurosurgical residents how to clip aneurysms more effectively.

  10. HI2: a two-degrees-of-freedom planar highly isotropic haptic interface for the desktop

    Science.gov (United States)

    Frisoli, Antonio; Prisco, Giuseppe M.; Salsedo, Fabio; Bergamasco, Massimo

    1999-11-01

    Haptic interfaces which fit on the desktop and provide a cursor control with 2D position convey additive feel sensations to the user in GUI and allow to enhance the efficiency of the human-computer interaction for both single user and collaborative applications. The merit of such devices is determined by the adaptability of the handle to different tasks/users, the ergonomics of the 2D workspace, the overall compactness of the device with respect to the usable workspace and the quality of the force feedback. A novel device has been designed along these guidelines. A new tendon-driven 5-bar mechanism is used to improve the isotropy of the kinematic performance over the workspace and the maximum generated force while reducing the device encumbrance. The present paper illustrates the kinematic and mechanical design of the device and reports the specifications achieved by the CAD model evaluation.

  11. Fabrication of cerebral aneurysm simulator with a desktop 3D printer

    Science.gov (United States)

    Liu, Yu; Gao, Qing; Du, Song; Chen, Zichen; Fu, Jianzhong; Chen, Bing; Liu, Zhenjie; He, Yong

    2017-05-01

    Now, more and more patients are suffering cerebral aneurysm. However, long training time limits the rapid growth of cerebrovascular neurosurgeons. Here we developed a novel cerebral aneurysm simulator which can be better represented the dynamic bulging process of cerebral aneurysm The proposed simulator features the integration of a hollow elastic vascular model, a skull model and a brain model, which can be affordably fabricated at the clinic (Fab@Clinic), under $25.00 each with the help of a low-cost desktop 3D printer. Moreover, the clinical blood flow and pulsation pressure similar to the human can be well simulated, which can be used to train the neurosurgical residents how to clip aneurysms more effectively.

  12. Expanding services in a shrinking economy: desktop document delivery in a dental school library

    Science.gov (United States)

    Gushrowski, Barbara A

    2011-01-01

    Question: How can library staff develop and promote a document delivery service and then expand the service to a wide audience? Setting: The setting is the library at the Indiana University School of Dentistry (IUSD), Indianapolis. Method: A faculty survey and a citation analysis were conducted to determine potential use of the service. Volume of interlibrary loan transactions and staff and equipment capacity were also studied. Main results: IUSD Library staff created a desktop delivery service (DDSXpress) for faculty and then expanded the service to practicing dental professionals and graduate students. The number of faculty using DDSXpress remains consistent. The number of practicing dental professionals using the service is low. Graduate students have been quick to adopt the service. Conclusion: Through careful analysis of capacity and need for the service, staff successfully expanded document delivery service without incurring additional costs. Use of DDSXpress is continually monitored, and opportunities to market the service to practicing dental professionals are being investigated. PMID:21753911

  13. High-performance image reconstruction in fluorescence tomography on desktop computers and graphics hardware.

    Science.gov (United States)

    Freiberger, Manuel; Egger, Herbert; Liebmann, Manfred; Scharfetter, Hermann

    2011-11-01

    Image reconstruction in fluorescence optical tomography is a three-dimensional nonlinear ill-posed problem governed by a system of partial differential equations. In this paper we demonstrate that a combination of state of the art numerical algorithms and a careful hardware optimized implementation allows to solve this large-scale inverse problem in a few seconds on standard desktop PCs with modern graphics hardware. In particular, we present methods to solve not only the forward but also the non-linear inverse problem by massively parallel programming on graphics processors. A comparison of optimized CPU and GPU implementations shows that the reconstruction can be accelerated by factors of about 15 through the use of the graphics hardware without compromising the accuracy in the reconstructed images.

  14. FRAMEWORK PARA CONVERSÃO DE APLICATIVOS DELPHI DESKTOP EM APLICATIVOS ANDROID NATIVO

    Directory of Open Access Journals (Sweden)

    Rodrigo da Silva Riquena

    2014-08-01

    Full Text Available With the growing use of mobile devices by companies and organizations there is an increasing demand applications in production mobile platform. For certain companies, business success may depend on a mobile application which approaches the customers or improve the performance of internal processes. However, developing software for the mobile platform is an expensive process which takes time and resources. A framework to convert Delphi Desktop applications into native Android applications in an automatic way constitutes a useful tool for architects and software developers can contribute with the implementation phase of the application. Therefore, this work is based on methods and processes for software reengineering as the PRE / OO (Process of Reengineering Object Oriented, for automatic conversion of an application developed in Delphi environment in an application for Android mobile platform. At last, an experiment was performed with a real case to corroborate the goals.

  15. Applications and Challenges of Private Desktop Cloud%私有桌面云的应用与挑战

    Institute of Scientific and Technical Information of China (English)

    余忠斌; 姜帅

    2013-01-01

      随着云计算技术的不断完善和推广使用,桌面云作为云计算的一种应用形态越来越受到关注。文章从桌面云的基本原理入手,通过对企业应用环境实地考察分析,设计出基于桌面云技术、适合企业实际情况的私有桌面云平台,为企业在数据安全、灵活接入管理、系统稳定性及运营成本等方面带来明显改进。%With the constant improvement and using of cloud computing technology, desktop cloud as an application form of cloud computing attracts more and more attention. Beginning with the basic principle of desktop cloud, this paper analyzes the application environments in enterpries, designs a private desktop cloud platform which is based on desktop cloud technology and suitable for the business practical situation and could improve data safety, flexibly access management, system stability, operation cost and so on.

  16. Reach a New Threshold of Freedom and Control with Dell's Flexible Computing Solution: On-Demand Desktop Streaming

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    When it comes to IT, there has always been an important link between data center control and client flexibility. As computing power increases, so do the potentially crippling threats to security, productivity and financial stability. This article talks about Dell's On-Demand Desktop Streaming solution which is designed to centralize complete…

  17. No effect of ambient odor on the affective appraisal of a desktop virtual environment with signs of disorder

    NARCIS (Netherlands)

    Toet, A.; Schaik, M.G. van; Theunissen, N.C.M.

    2013-01-01

    Background : Desktop virtual environments (VEs) are increasingly deployed to study the effects of environmental qualities and interventions on human behavior and safety related concerns in built environments. For these applications it is essential that users appraise the affective qualities of the V

  18. Student Behavioural Intentions to Use Desktop Video Conferencing in a Distance Course: Integration of Autonomy to the UTAUT Model

    Science.gov (United States)

    Lakhal, Sawsen; Khechine, Hager; Pascot, Daniel

    2013-01-01

    The aim of this study was to examine psychological factors which could influence acceptance and use of the desktop video conferencing technology by undergraduate business students. Based on the Unified Theory of Acceptance and Use of Technology, this study tested a theoretical model encompassing seven variables: behavioural intentions to use…

  19. A Brief Discussion on Desktop Cloud Computing System%桌面云系统建设思路探讨

    Institute of Scientific and Technical Information of China (English)

    刘进; 卢楠; 温晓洁; 耿辉

    2013-01-01

      桌面云技术日趋成熟,已开始小规模部署来取代传统PC.本文简要介绍了桌面云技术的特点、架构,探讨了桌面云系统的建设模式和服务器、存储及网络三个关键设计点,为日后大规模建设桌面云系统,全面替代传统PC,降低运营、管理成本,提高企业信息安全提供借鉴.%The desktop cloud computing technology has become more and more mature, has begun a small-scale deployment to replace the traditional PC. This article briefly describes the characteristics of the desktop cloud computing technology architecture. The article explores three key design point of the desktop cloud system building mode and server, storage and network. The article provides a reference of large-scale construction of the desktop cloud computing system, a comprehensive alternative to the traditional PC, reduce operational management costs, improve enterprise information security in future.

  20. No effect of ambient odor on the affective appraisal of a desktop virtual environment with signs of disorder

    NARCIS (Netherlands)

    Toet, A.; Schaik, M.G. van; Theunissen, N.C.M.

    2013-01-01

    Background : Desktop virtual environments (VEs) are increasingly deployed to study the effects of environmental qualities and interventions on human behavior and safety related concerns in built environments. For these applications it is essential that users appraise the affective qualities of the V

  1. Reach a New Threshold of Freedom and Control with Dell's Flexible Computing Solution: On-Demand Desktop Streaming

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    When it comes to IT, there has always been an important link between data center control and client flexibility. As computing power increases, so do the potentially crippling threats to security, productivity and financial stability. This article talks about Dell's On-Demand Desktop Streaming solution which is designed to centralize complete…

  2. A Collaborative Digital Pathology System for Multi-Touch Mobile and Desktop Computing Platforms

    KAUST Repository

    Jeong, W.

    2013-06-13

    Collaborative slide image viewing systems are becoming increasingly important in pathology applications such as telepathology and E-learning. Despite rapid advances in computing and imaging technology, current digital pathology systems have limited performance with respect to remote viewing of whole slide images on desktop or mobile computing devices. In this paper we present a novel digital pathology client-server system that supports collaborative viewing of multi-plane whole slide images over standard networks using multi-touch-enabled clients. Our system is built upon a standard HTTP web server and a MySQL database to allow multiple clients to exchange image and metadata concurrently. We introduce a domain-specific image-stack compression method that leverages real-time hardware decoding on mobile devices. It adaptively encodes image stacks in a decorrelated colour space to achieve extremely low bitrates (0.8 bpp) with very low loss of image quality. We evaluate the image quality of our compression method and the performance of our system for diagnosis with an in-depth user study. Collaborative slide image viewing systems are becoming increasingly important in pathology applications such as telepathology and E-learning. Despite rapid advances in computing and imaging technology, current digital pathology systems have limited performance with respect to remote viewing of whole slide images on desktop or mobile computing devices. In this paper we present a novel digital pathology client-server systems that supports collaborative viewing of multi-plane whole slide images over standard networks using multi-touch enabled clients. Our system is built upon a standard HTTP web server and a MySQL database to allow multiple clients to exchange image and metadata concurrently. © 2013 The Eurographics Association and John Wiley & Sons Ltd.

  3. Economic analysis of cloud-based desktop virtualization implementation at a hospital

    Directory of Open Access Journals (Sweden)

    Yoo Sooyoung

    2012-10-01

    Full Text Available Abstract Background Cloud-based desktop virtualization infrastructure (VDI is known as providing simplified management of application and desktop, efficient management of physical resources, and rapid service deployment, as well as connection to the computer environment at anytime, anywhere with anydevice. However, the economic validity of investing in the adoption of the system at a hospital has not been established. Methods This study computed the actual investment cost of the hospital-wide VDI implementation at the 910-bed Seoul National University Bundang Hospital in Korea and the resulting effects (i.e., reductions in PC errors and difficulties, application and operating system update time, and account management time. Return on investment (ROI, net present value (NPV, and internal rate of return (IRR indexes used for corporate investment decision-making were used for the economic analysis of VDI implementation. Results The results of five-year cost-benefit analysis given for 400 Virtual Machines (VMs; i.e., 1,100 users in the case of SNUBH showed that the break-even point was reached in the fourth year of the investment. At that point, the ROI was 122.6%, the NPV was approximately US$192,000, and the IRR showed an investment validity of 10.8%. From our sensitivity analysis to changing the number of VMs (in terms of number of users, the greater the number of adopted VMs was the more investable the system was. Conclusions This study confirms that the emerging VDI can have an economic impact on hospital information system (HIS operation and utilization in a tertiary hospital setting.

  4. multiplierz: an extensible API based desktop environment for proteomics data analysis

    Directory of Open Access Journals (Sweden)

    Webber James T

    2009-10-01

    Full Text Available Abstract Background Efficient analysis of results from mass spectrometry-based proteomics experiments requires access to disparate data types, including native mass spectrometry files, output from algorithms that assign peptide sequence to MS/MS spectra, and annotation for proteins and pathways from various database sources. Moreover, proteomics technologies and experimental methods are not yet standardized; hence a high degree of flexibility is necessary for efficient support of high- and low-throughput data analytic tasks. Development of a desktop environment that is sufficiently robust for deployment in data analytic pipelines, and simultaneously supports customization for programmers and non-programmers alike, has proven to be a significant challenge. Results We describe multiplierz, a flexible and open-source desktop environment for comprehensive proteomics data analysis. We use this framework to expose a prototype version of our recently proposed common API (mzAPI designed for direct access to proprietary mass spectrometry files. In addition to routine data analytic tasks, multiplierz supports generation of information rich, portable spreadsheet-based reports. Moreover, multiplierz is designed around a "zero infrastructure" philosophy, meaning that it can be deployed by end users with little or no system administration support. Finally, access to multiplierz functionality is provided via high-level Python scripts, resulting in a fully extensible data analytic environment for rapid development of custom algorithms and deployment of high-throughput data pipelines. Conclusion Collectively, mzAPI and multiplierz facilitate a wide range of data analysis tasks, spanning technology development to biological annotation, for mass spectrometry-based proteomics research.

  5. Emission of particulate matter from a desktop three-dimensional (3D) printer

    Science.gov (United States)

    Yi, Jinghai; LeBouf, Ryan F.; Duling, Matthew G.; Nurkiewicz, Timothy; Chen, Bean T.; Schwegler-Berry, Diane; Virji, M. Abbas; Stefaniak, Aleksandr B.

    2016-01-01

    ABSTRACT Desktop three-dimensional (3D) printers are becoming commonplace in business offices, public libraries, university labs and classrooms, and even private homes; however, these settings are generally not designed for exposure control. Prior experience with a variety of office equipment devices such as laser printers that emit ultrafine particles (UFP) suggests the need to characterize 3D printer emissions to enable reliable risk assessment. The aim of this study was to examine factors that influence particulate emissions from 3D printers and characterize their physical properties to inform risk assessment. Emissions were evaluated in a 0.5-m3 chamber and in a small room (32.7 m3) using real-time instrumentation to measure particle number, size distribution, mass, and surface area. Factors evaluated included filament composition and color, as well as the manufacturer-provided printer emissions control technologies while printing an object. Filament type significantly influenced emissions, with acrylonitrile butadiene styrene (ABS) emitting larger particles than polylactic acid (PLA), which may have been the result of agglomeration. Geometric mean particle sizes and total particle (TP) number and mass emissions differed significantly among colors of a given filament type. Use of a cover on the printer reduced TP emissions by a factor of 2. Lung deposition calculations indicated a threefold higher PLA particle deposition in alveoli compared to ABS. Desktop 3D printers emit high levels of UFP, which are released into indoor environments where adequate ventilation may not be present to control emissions. Emissions in nonindustrial settings need to be reduced through the use of a hierarchy of controls, beginning with device design, followed by engineering controls (ventilation) and administrative controls such as choice of filament composition and color. PMID:27196745

  6. Emission of particulate matter from a desktop three-dimensional (3D) printer.

    Science.gov (United States)

    Yi, Jinghai; LeBouf, Ryan F; Duling, Matthew G; Nurkiewicz, Timothy; Chen, Bean T; Schwegler-Berry, Diane; Virji, M Abbas; Stefaniak, Aleksandr B

    2016-01-01

    Desktop three-dimensional (3D) printers are becoming commonplace in business offices, public libraries, university labs and classrooms, and even private homes; however, these settings are generally not designed for exposure control. Prior experience with a variety of office equipment devices such as laser printers that emit ultrafine particles (UFP) suggests the need to characterize 3D printer emissions to enable reliable risk assessment. The aim of this study was to examine factors that influence particulate emissions from 3D printers and characterize their physical properties to inform risk assessment. Emissions were evaluated in a 0.5-m(3) chamber and in a small room (32.7 m(3)) using real-time instrumentation to measure particle number, size distribution, mass, and surface area. Factors evaluated included filament composition and color, as well as the manufacturer-provided printer emissions control technologies while printing an object. Filament type significantly influenced emissions, with acrylonitrile butadiene styrene (ABS) emitting larger particles than polylactic acid (PLA), which may have been the result of agglomeration. Geometric mean particle sizes and total particle (TP) number and mass emissions differed significantly among colors of a given filament type. Use of a cover on the printer reduced TP emissions by a factor of 2. Lung deposition calculations indicated a threefold higher PLA particle deposition in alveoli compared to ABS. Desktop 3D printers emit high levels of UFP, which are released into indoor environments where adequate ventilation may not be present to control emissions. Emissions in nonindustrial settings need to be reduced through the use of a hierarchy of controls, beginning with device design, followed by engineering controls (ventilation) and administrative controls such as choice of filament composition and color.

  7. Mac-1 deficiency induces respiratory failure by affecting type I alveolar epithelial cells.

    Science.gov (United States)

    Wang, J; Ci, Y B; Liu, C L; Sun, H M

    2017-08-31

    As a β2 integrin family member, Mac-1 plays an important role in the inflammatory response. Inflammation and lung injury are closely associated, but the involvement of Mac-1 in the occurrence and development of such pathologies remains poorly understood. We aimed to investigate the relationship between Mac-1 deficiency and respiratory failure in Mac-1 knockout {Mac-1(-/-)} mice, using C57BL/6J mice as a control. The newborn survival rate of Mac-1(-/-) mice was calculated, and mouse lung tissue was treated with hematoxylin and eosin and subjected to immunofluorescent staining. Moreover, western blotting and immunohistochemistry were used to detect the expression of molecules specific to type I and type II alveolar epithelial cells, as well as alveolar surfactant proteins secreted by the latter. Survival of Mac-1(-/-) pups was significantly lower than that of newborn C57BL/6J mice. In a float test, lung tissues from C57BL/6J mice were buoyant, whereas those of Mac-1(-/-) mice were not. Compared with C57BL/6J mice, expression of proSP-C {specific to type II alveolar epithelial cells} and alveolar surfactant proteins in Mac-1(-/-) mice was not significantly different, implying that type II cell function was unaltered. However, western blotting revealed expression of T1α, Aqp5, and Snx5 {type I alveolar epithelial cell markers} in Mac-1(-/-) mice to be significantly decreased {P Mac-1 may play an important role in respiratory failure. Its absence leads to this condition not by influencing type II alveolar epithelial cells or their secreted surfactant proteins, but rather by reducing type I alveolar cell numbers.

  8. The Firegoose: two-way integration of diverse data from different bioinformatics web resources with desktop applications

    Directory of Open Access Journals (Sweden)

    Schmid Amy K

    2007-11-01

    Full Text Available Abstract Background Information resources on the World Wide Web play an indispensable role in modern biology. But integrating data from multiple sources is often encumbered by the need to reformat data files, convert between naming systems, or perform ongoing maintenance of local copies of public databases. Opportunities for new ways of combining and re-using data are arising as a result of the increasing use of web protocols to transmit structured data. Results The Firegoose, an extension to the Mozilla Firefox web browser, enables data transfer between web sites and desktop tools. As a component of the Gaggle integration framework, Firegoose can also exchange data with Cytoscape, the R statistical package, Multiexperiment Viewer (MeV, and several other popular desktop software tools. Firegoose adds the capability to easily use local data to query KEGG, EMBL STRING, DAVID, and other widely-used bioinformatics web sites. Query results from these web sites can be transferred to desktop tools for further analysis with a few clicks. Firegoose acquires data from the web by screen scraping, microformats, embedded XML, or web services. We define a microformat, which allows structured information compatible with the Gaggle to be embedded in HTML documents. We demonstrate the capabilities of this software by performing an analysis of the genes activated in the microbe Halobacterium salinarum NRC-1 in response to anaerobic environments. Starting with microarray data, we explore functions of differentially expressed genes by combining data from several public web resources and construct an integrated view of the cellular processes involved. Conclusion The Firegoose incorporates Mozilla Firefox into the Gaggle environment and enables interactive sharing of data between diverse web resources and desktop software tools without maintaining local copies. Additional web sites can be incorporated easily into the framework using the scripting platform of the

  9. Application of HollySys MACS DCS to PET plant%HollySys MACS DCS在PET装置中的应用

    Institute of Scientific and Technical Information of China (English)

    霍卫

    2015-01-01

    介绍了HollySys MACS DCS在PET装置中的应用,简要说明了PET装置的生产工艺和MACS系统的主要特点,介绍了该装置控制系统的软硬件构成,阐述了HollySys MACS DCS在PET装置中应用的控制方案.

  10. 78 FR 26711 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Liquidity...

    Science.gov (United States)

    2013-05-08

    ...; Farmer Mac Liquidity Management ACTION: Proposed rule; reopening of comment period. SUMMARY: The Farm... amend its liquidity management regulations for the Federal Agricultural Mortgage Corporation (Farmer Mac... liquidity by addressing four definitions in Sec. 652.5,\\3\\ liquidity management in Sec. 652.35, and the...

  11. Optimization and verification of the TR-MAC protocol for wireless sensor networks

    NARCIS (Netherlands)

    Morshed, Sarwar; Heijenk, Geert

    2015-01-01

    Energy-efficiency is an important requirement in the design of communication protocols for wireless sensor networks (WSN). TR-MAC is an energy-efficient medium access control (MAC) layer protocol for low power WSN that exploits transmitted-reference (TR) modulation in the physical layer. The underly

  12. Official Portrait of STS-52 Canadian Payload Specialist Steve G. MacLean

    Science.gov (United States)

    1992-01-01

    STS-52 Canadian Payload Specialist Steven G. MacLean, wearing a launch and entry suit (LES), poses with a launch and entry helmet (LEH) and Canadian flag for his Official portrait. MacLean representing the Canadian Space Agency (CSA) will fly aboard Columbia, Orbiter Vehicle (OV) 102, for the STS-52 mission.

  13. Transcriptomic microarray analysis of BoMac cells after infection with bovine foamy virus

    NARCIS (Netherlands)

    Rola-Luszczak, M.; Materniak, M.; Pluta, A.; Hulst, M.M.; Kuz'mak, J.

    2014-01-01

    Bovine foamy virus (BFV) infections are highly prevalent among cattle worldwide. However, relatively little is known about the impact of this virus on the host immune system. In our study, we focused on a bovine macrophage cell line (BoMac) and examined changes in the BoMac transcriptome after in vi

  14. Scheduled MAC in Beacon Overlay Networks for Underwater Localization and Time-Synchronization

    NARCIS (Netherlands)

    van Kleunen, W.A.P.; Meratnia, Nirvana; Havinga, Paul J.M.

    2011-01-01

    In this article we introduce a MAC protocol designed for underwater localization and time-synchronisation. The MAC protocol assumes a network of static reference nodes and allows blind nodes to be localized by listening-only to the beacon messages. Such a system is known to be very scalable. We show

  15. Simulation of 64-bit MAC Unit using Kogge Stone Adder and Ancient Indian Mathematics

    Directory of Open Access Journals (Sweden)

    Aapurva Kaul

    2016-05-01

    Full Text Available This paper describes that multiply and accumulate (MAC unit plays a very vital role in various Digital Signal Processing applications. Speed of these applications depends on the speed of these three sub units of MAC multiply unit, adder unit and accumulator unit. In this paper the delay of 64-bit MAC unit is decreased as compared to the previous MAC units. In this Kogge Stone Adder is used as adder in design Vedic Multiplier using Urdhva Tiryakbhyam sutra. The designing of MAC unit is done under VIRTEX-4 family, XC4VFX140 device, FF1517 package and -11 speed and comparison of proposed MAC unit design is done under SPARTAN- 3E family, XC3S500 device, FG320 package and -5 speed in Xilinx ISE 8.1i. The combinational path delay of the 64-bit MAC unit is 59.705ns in SPARTAN-3E family. Ancient Indian mathematics is being used for designing of multiplier unit to decrease the overall delay of the MAC unit.

  16. A concurrent access MAC protocol for cognitive radio ad hoc networks without common control channel

    Science.gov (United States)

    Timalsina, Sunil K.; Moh, Sangman; Chung, Ilyong; Kang, Moonsoo

    2013-12-01

    Cognitive radio ad hoc networks (CRAHNs) consist of autonomous nodes that operate in ad hoc mode and aim at efficient utilization of spectrum resources. Usually, the cognitive nodes in a CRAHN exploit a number of available channels, but these channels are not necessarily common to all nodes. Such a network environment poses the problem of establishing a common control channel (CCC) as there might be no channel common to all the network members at all. In designing protocols, therefore, it is highly desirable to consider the network environment with no CCC. In this article, we propose a MAC protocol called concurrent access MAC (CA-MAC) that operates in the network environment with no CCC. The two devices in a communication pair can communicate with each other even if they have only one common channel available. Therefore, the problems with CCC (such as channel saturation and denial of service attacks) can also be resolved. In CA-MAC, channel accesses are distributed over communication pairs, resulting in increased network connectivity. In addition, CA-MAC allows different communication pairs to access multiple channels concurrently. According to our performance study, CA-MAC provides higher network connectivity with shorter channel access delay compared to SYN-MAC, which is the conventional key MAC protocol for the network environment with no CCC, resulting in better network throughput.

  17. Investigation of Mycobacterium avium complex (MAC) in Australian commercial milk using qPCR.

    Science.gov (United States)

    Adhikari, Shraddha; Caro Tohme, Tanya; Whiley, Harriet

    2017-02-01

    This technical research communication describes the first study to use quantitative polymerase chain reaction (qPCR) to investigate the presence of Mycobacterium avium complex (MAC) in Australian pasteurised milk. MAC is the most common NTM responsible for human illnesses and includes M. avium subspecies paratuberculosis (MAP). MAC is a causative agent of lymphadenitis in children, with contaminated food and water considered as a likely source. As such the presence of MAC in milk would have public health significance. MAP has been linked to Crohn's disease and is also the causative agent of Johne's disease in cattle. Previous studies have detected MAP in pasteurised milk from Brazil, India, Czech Republic, USA, Argentina, UK, Iran, Ireland and the United Kingdom. This study investigated a total of 180 commercially available Australian pasteurised milk samples which were tested for MAC DNA in triplicate using PCR. All samples were negative for MAC DNA. An additional 14 milk samples were tested, incubated for 3 weeks at 37 °C to potentially increase the concentration of any viable MAC that may be present and then retested. All samples were again negative for MAC DNA. This could be due to concentrations below the limit of detection, limited sample size or could be reflective of the Australian biosecurity control protocols and surveillance of Johne's disease in ruminant animals.

  18. An update on the side channel cryptanalysis of MACs based on cryptographic hash functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Okeya, Katsuyuki

    2007-01-01

    into consideration. Next, we propose new hybrid NMAC/HMAC schemes for security against side channel attacks assuming that their underlying block cipher is ideal. We then show that M-NMAC, MDx-MAC and a variant of the envelope MAC scheme based on DM with an ideal block cipher are secure against DPA attacks....

  19. THE EFFECT OF TEMPERATURE ON THE GROWTH OF MYCOBACTERIUM AVIUM COMPLEX (MAC) ORGANISMS

    Science.gov (United States)

    MAC organisms are able to grow, persist, and colonize in water distribution systems and may amplify in hospital hot water systems. This study examined the response of MAC organisms (M. avium, M. intracellulare, and MX) to a range of temperatures commonly associated with drinking...

  20. Sevoflurane at 1 MAC provides optimal myocardial protection during off-pump CABG.

    Science.gov (United States)

    Wang, Jiang; Zheng, Hong; Chen, Chun-Ling; Lu, Wei; Zhang, Yong-Qiang

    2013-06-01

    We investigated the myocardial protective effect of sevoflurane in patients receiving off-pump coronary artery bypass grafting (OPCABG) and the role of brain natriuretic peptide (BNP). Forty-eight patients receiving elective OPCABG were randomly assigned to a control group, and to 0.75 MAC, 1.0 MAC and 1.5 MAC sevoflurane groups. Blood samples were collected and levels of BNP and cardiac troponin I (cTnI) were measured before anesthesia, and immediately, 24, 48 and 72 h after surgery. Dopamine was necessary to maintain blood pressure in the sevoflurane groups, but not in the control group (p MAC sevoflurane significantly decreased post-surgical cTnI levels (p MAC had no significant effect, and increasing sevoflurane concentrations to 1.5 MAC caused no further decrease in cTnI concentrations. There was no significant difference in BNP level among the groups (p = 0.227) or between any two groups, although values of BNP showed a significant correlation with cTnI values in control subjects immediately after (r = 0.847) and 24 h after (r = 0.661) surgery. Our results demonstrated that 1.0 MAC and 1.5 MAC sevoflurane can exert a significant myocardial protective effect. BNP cannot be used to predict the myocardial protective effect of sevoflurane in OPCABG.

  1. Self-Admitted Pretensions of Mac Users on a Predominantly PC University Campus

    Science.gov (United States)

    Firmin, Michael W.; Wood, Whitney L. Muhlenkamp; Firmin, Ruth L.; Wood, Jordan C.

    2010-01-01

    The present qualitative research study addressed the overall research question of college students' pretention dynamics in the context of a university setting. Thirty-five Mac users were interviewed on a university campus that exclusively supports PC machines. Mac users shared four self-admitted pretensions related to using Macintosh computers.…

  2. THE EFFECT OF TEMPERATURE ON THE GROWTH OF MYCOBACTERIUM AVIUM COMPLEX (MAC) ORGANISMS

    Science.gov (United States)

    MAC organisms are able to grow, persist, and colonize in water distribution systems and may amplify in hospital hot water systems. This study examined the response of MAC organisms (M. avium, M. intracellulare, and MX) to a range of temperatures commonly associated with drinking...

  3. Self-Admitted Pretensions of Mac Users on a Predominantly PC University Campus

    Science.gov (United States)

    Firmin, Michael W.; Wood, Whitney L. Muhlenkamp; Firmin, Ruth L.; Wood, Jordan C.

    2010-01-01

    The present qualitative research study addressed the overall research question of college students' pretention dynamics in the context of a university setting. Thirty-five Mac users were interviewed on a university campus that exclusively supports PC machines. Mac users shared four self-admitted pretensions related to using Macintosh computers.…

  4. Poincaré-MacMillan Equations of Motion for a Nonlinear Nonholonomic Dynamical System

    Institute of Scientific and Technical Information of China (English)

    Amjad Hussain; Syed Tauseef Mohyud-Din; Ahmet Yildirim

    2012-01-01

    MacMillan's equations are extended to Poincaré's formalism,and MacMillan's equations for nonlinear nonholonomic systems are obtained in terms of Poincaré parameters.The equivalence of the results obtained here with other forms of equations of motion is demonstrated.An illustrative example of the theory is provided as well.

  5. On PHY and MAC Performance in Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sana Ullah

    2009-01-01

    Full Text Available This paper presents an empirical investigation on the performance of body implant communication using radio frequency (RF technology. In body implant communication, the electrical properties of the body influence the signal propagation in several ways. We use a Perspex body model (30 cm diameter, 80 cm height and 0.5 cm thickness filled with a liquid that mimics the electrical properties of the basic body tissues. This model is used to observe the effects of body tissue on the RF communication. We observe best performance at 3cm depth inside the liquid. We further present a simulation study of several low-power MAC protocols for an on-body sensor network and discuss the derived results. Also, the traditional preamble-based TMDA protocol is extended towards a beacon-based TDMA protocol in order to avoid preamble collision and to ensure low-power communication.

  6. Self and Otherness in Norman MacCaig’s Poetry

    Directory of Open Access Journals (Sweden)

    Dominique DELMAIRE

    2004-10-01

    Full Text Available No other Scottish poet has concerned himself more thoroughly than Norman MacCaig (1910-1996 — the author of such poems as “Ego,” “Other Self,” “Other self, same self,” and many more in the same vein — with the problematic issue of the subject and his relations to both reality and to his own multiple avatars or projections. “Other self” (Collected Poems 95 is such a case in point that it deserves full quoting:       My inmost creature, Caliban perhaps,      Perhaps St Francis (at least, a s...

  7. A Distributed MAC Protocol for Cooperation in Random Access Networks

    CERN Document Server

    Böcherer, Georg

    2008-01-01

    WLAN is one of the most successful applications of wireless communications in daily life because of low cost and ease of deployment. The enabling technique for this success is the use of random access schemes for the wireless channel. Random access requires minimal coordination between the nodes, which considerably reduces the cost of the infrastructure. Recently, cooperative communication in wireless networks has been of increasing interest because it promises higher rates and reliability. An additional MAC overhead is necessary to coordinate the nodes to allow cooperation and this overhead can possibly cancel out the cooperative benefits. In this work, a completely distributed protocol is proposed that allows nodes in the network to cooperate via Two-Hop and Decode-and-Forward for transmitting their data to a common gateway node. It is shown that high throughput gains are obtained in terms of the individual throughput that can be guaranteed to any node in the network. These results are validated by Monte Ca...

  8. Marielle Macé, Le genre littéraire

    OpenAIRE

    2012-01-01

    Pour des termes génériques associés à une longue tradition et plusieurs écoles de pensée, la collection Corpus s’engage à présenter un panorama de définitions. Tel a été le cas, entre autres notions, pour celles d’auteur, de lecteur… L’ouvrage de Marielle Macé traite lui aussi d’une notion clé qui est au cœur d’une histoire plus que millénaire de la réflexion littéraire, mais aussi philosophique, voire linguistique et rhétorique, exposée aux vagues successives de remise en cause de la moderni...

  9. [Materials for the substantiation of the biological MAC of benzene].

    Science.gov (United States)

    Ulanova, I P; Avilova, G G; Karpukhina, E A; Karimova, L K; Boĭko, V I; Makar'eva, L M

    1990-09-01

    Relatively great amount of benzene-originated phenol, the presence of a definite relationship between phenol amount in the urine and benzene content in the air indicate that it is reasonable to use a phenol sample as an exposure test. To determine the intensity of benzene exposure, data on phenol content in the urine of people working at some big-tonnage enterprises has been analyzed. On the basis of the national and foreign literature data on the correlation between the phenol urine concentration and the level of benzene exposure a regression equation was deduced, which has made it possible to calculate phenol content in the urine on the level of average working day benzene concentration adopted in the USSR. This value equals 15 mg/l, which was proposed as a biological benzene MAC.

  10. MacBurn's cylinder test problem

    Energy Technology Data Exchange (ETDEWEB)

    Shestakov, Aleksei I. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-02-29

    This note describes test problem for MacBurn which illustrates its performance. The source is centered inside a cylinder with axial-extent-to-radius ratio s.t. each end receives 1/4 of the thermal energy. The source (fireball) is modeled as either a point or as disk of finite radius, as described by Marrs et al. For the latter, the disk is divided into 13 equal area segments, each approximated as a point source and models a partially occluded fireball. If the source is modeled as a single point, one obtains very nearly the expected deposition, e.g., 1/4 of the flux on each end and energy is conserved. If the source is modeled as a disk, both conservation and energy fraction degrade. However, errors decrease if the source radius to domain size ratio decreases. Modeling the source as a disk increases run-times.

  11. Sabine MacCormack, On the Wings of Time. Rome,

    OpenAIRE

    Rey, Sarah

    2011-01-01

    Que vient faire une antiquisante sur les hauteurs andines ? Sabine MacCormack, spécialiste de l’art romain, n’a pas à se justifier. Dans cette étude, l’abondante littérature qu’elle offre au lecteur suffit à prouver l’intérêt de sa démarche qui consiste à quêter les formes, les mots et les images de l’Antiquité apposés sur l’espace inca au moment de sa découverte. L’historienne donne une suite à son étude de 1991, Religion in the Andes  : Vision and Imagination in Early Colonial Peru. Pour re...

  12. MACS low-background doubly focusing neutron monochromator

    CERN Document Server

    Smee, S A; Scharfstein, G A; Qiu, Y; Brand, P C; Anand, D K; Broholm, C L

    2002-01-01

    A novel doubly focusing neutron monochromator has been developed as part of the Multi-Analyzer Crystal Spectrometer (MACS) at the NIST Center for Neutron Research. The instrument utilizes a unique vertical focusing element that enables active vertical and horizontal focusing with a large, 357-crystal (1428 cm sup 2), array. The design significantly reduces the amount of structural material in the beam path as compared to similar instruments. Optical measurements verify the excellent focal performance of the device. Analytical and Monte Carlo simulations predict that, when mounted at the NIST cold-neutron source, the device should produce a monochromatic beam (DELTA E=0.2 meV) with flux phi>10 sup 8 n/cm sup 2 s. (orig.)

  13. Antimoulting Activity of Eremanthus erythropappus (DC. MacLeisch

    Directory of Open Access Journals (Sweden)

    Danielle Barbosa

    2012-06-01

    Resumo. Os extratos e metabólitos secundários de plantas podem agir como agentes tóxicos e inibidores do da alimentação e do desenvolvimento em insetos. Neste estudo foi utilizado Oncopeltus fasciatus (Dallas (Hemiptera como modelo experimental a fim de avaliar as atividades do extrato etanólico bruto e frações obtidos das flores ou caules de Eremanthus erythropappus (DC. MacLeisch (Asteraceae, na mortalidade e sobre o desenvolvimento do inseto. A fração butanólica obtida do extrato etanólico mostrou toxidade sobre as ninfas de O. fasciatus, bem como atividade de inibição do crescimento. Os resultados sugerem que a fração butanólica de E. erythropappus possui substâncias ativas sobre a fisiologia, crescimento e desenvolvimento de insetos.

  14. On PHY and MAC Performance in Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Higgins Henry

    2009-01-01

    Full Text Available Abstract This paper presents an empirical investigation on the performance of body implant communication using radio frequency (RF technology. In body implant communication, the electrical properties of the body influence the signal propagation in several ways. We use a Perspex body model (30 cm diameter, 80 cm height and 0.5 cm thickness filled with a liquid that mimics the electrical properties of the basic body tissues. This model is used to observe the effects of body tissue on the RF communication. We observe best performance at 3cm depth inside the liquid. We further present a simulation study of several low-power MAC protocols for an on-body sensor network and discuss the derived results. Also, the traditional preamble-based TMDA protocol is extended towards a beacon-based TDMA protocol in order to avoid preamble collision and to ensure low-power communication.

  15. MAC Protocols for GSP in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Maria Calle

    2008-06-01

    Full Text Available The Gossip-based Sleep Protocol (GSP is a routing protocol designed to save energy in Wireless Sensor Networks. This work presents two MAC protocols designed to complement the characteristics of GSP: MACGSP1 and MACGSP2 were evaluated in combination with GSP on square grids of 100, 400 and 900 simulated nodes. Both protocols show increased energy savings compared to GSP by itself. MACGSP1 provided the greatest energy savings, however MACGSP2 exhibited the best trade off between overhead, delay and packet reception probability. MACGSP2 reduces the duplicate packets generated by GSP, with no significant difference in end-to end delay and a reduced GSP packet reception probability of 10%.

  16. Interference Analysis Status and Plans for Aeronautical Mobile Airport Communications System (AeroMACS)

    Science.gov (United States)

    Kerczewski, Robert J.; Wilson, Jeffrey D.

    2010-01-01

    Interference issues related to the operation of an aeronautical mobile airport communications system (AeroMACS) in the C-Band (specifically 5091-5150 MHz) is being investigated. The issue of primary interest is co-channel interference from AeroMACS into mobile-satellite system (MSS) feeder uplinks. The effort is focusing on establishing practical limits on AeroMACS transmissions from airports so that the threshold of interference into MSS is not exceeded. The analyses are being performed with the software package Visualyse Professional, developed by Transfinite Systems Limited. Results with omni-directional antennas and plans to extend the models to represent AeroMACS more accurately will be presented. These models should enable realistic analyses of emerging AeroMACS designs to be developed from NASA Test Bed, RTCA 223, and European results.

  17. Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range

    Science.gov (United States)

    Choi, Woo-Yong

    2011-11-01

    In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

  18. The identification of MacSe in Streptococcus equi ssp. equi

    Institute of Scientific and Technical Information of China (English)

    Jiande YANG; Yanfei LIU; Jun XU; Jifei MA

    2009-01-01

    Streptococcus equi subsp, equi (S. equi ssp. equi) causes equine strangles, a highly contagious and widespread purulent lymphadenitis of the head and neck. We have identified MacSe, a novel protein of S. equi, by screening a phage library of 3-8 kb random DNA fragments of S. equi CF32. MacSe shares 62% and 67.5% amino acid homology with Mac5005 and Mac8345 of S. pyogenes respectively. Expression during infection was shown by strong reactivity of the protein with convalescent sera and mucosal wash IgA of ponies infected by commingling exposure. Release into the culture medium was detected during the log phase of growth. Dose dependent anti-phagocytic activity for equine neutrophils involved interaction of MacSe with C3 and neutrophils.

  19. Self-Adaptive and Energy-Efficient MAC Protocol Based on Event-Driven

    Directory of Open Access Journals (Sweden)

    Xin Hou

    2013-01-01

    Full Text Available Combined with WSN MAC layer protocol characteristics and design requirements, according to the characteristic of WSN monitoring application requirements, this paper puts forward a method based on event driven MAC protocol. The agreement algorithm is to solve the problem of network congestion and node energy unnecessary consumption cause by a large number of redundant monitoring data transceiver. It is a kind of adaptive low power consumption of the MAC layer protocol, which is pointed out based on theoretical foundation of S_MAC protocol, made use of the event driven mechanism system theory, combined with event driven mechanism and the characteristics of the WSN. It has the periodic dormancy mechanism of S_MAC protocol, in the premise of the reliability data, to reduce data redundancy and communication delay time, improve the overall network throughput, to ensure the safety and reliability of the network, which can greatly extends  the node of working time.

  20. Energy efficient TDMA-based MAC protocol associated with GAF for wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    XIAO Xiao; ZHENG Bao-yu; YAN Zhen-ya; CHEN Chao

    2007-01-01

    The design of media access control (MAC) protocol for wireless sensor networks (WSNs) with the idea of cross layer attracts more and more attention. People can improve the MAC protocol by obtaining certain information regarding the network layer and physical layer. This article synthesizes and optimizes certain cross-layer protocols which have existed. On the basis of the routing, topology information in the network layer, and transmission power information in the physical layer, the time slot assignment algorithm has been improved in the MAC layer.By using geographical adaptive fidelity algorithm (GAF) to divide the grids, controlling of transmission power and scheduling the work/sleep duty cycle for sensor nodes, a new MAC protocol has been proposed to decrease energy consumption and enlarge the lifetime of WSNs. Simulation results show that the MAC protocol functions well.

  1. Research on low-latency MAC protocols for wireless sensor networks

    Science.gov (United States)

    He, Chenguang; Sha, Xuejun; Lee, Chankil

    2007-11-01

    Energy-efficient should not be the only design goal in MAC protocols for wireless sensor networks, which involve the use of battery-operated computing and sensing devices. Low-latency operation becomes the same important as energy-efficient in the case that the traffic load is very heavy or the real-time constrain is used in applications like tracking or locating. This paper introduces some causes of traditional time delays which are inherent in a multi-hops network using existing WSN MAC protocols, illuminates the importance of low-latency MAC design for wireless sensor networks, and presents three MACs as examples of low-latency protocols designed specially for sleep delay, wait delay and wakeup delay in wireless sensor networks, respectively. The paper also discusses design trade-offs with emphasis on low-latency and points out their advantages and disadvantages, together with some design considerations and suggestions for MAC protocols for future applications and researches.

  2. An Energy-Efficient, Application-Oriented Control Algorithm for MAC Protocols in WSN

    Science.gov (United States)

    Li, Deliang; Peng, Fei; Qian, Depei

    Energy efficiency has been a main concern in wireless sensor networks where Medium Access Control (MAC) protocol plays an important role. However, current MAC protocols designed for energy saving have seldom considered multiple applications coexisting in WSN with variation of traffic load dynamics and different QoS requirements. In this paper, we propose an adaptive control algorithm at MAC layer to promote energy efficiency. We focus on the tradeoff relation between collisions and control overhead as a reflection of traffic load and propose to balance the tradeoff under the constraints of QoS options. We integrate the algorithm into S-MAC and verify it through NS-2 platform. The results demonstrate the algorithm achieves observable improvement in energy performance while meeting QoS requirement for different coexisting applications in comparison with S-MAC.

  3. MAQF/MAC:A New QoS Provisioning MAC Mechanism for MANET

    Institute of Scientific and Technical Information of China (English)

    YAOYinxion; WANGHaoxing; WANXiang

    2003-01-01

    QoS provisioning is not an easy problem under the time varying and dynamic environment of MANET.Based on MANET Adaptive QoS Framework(MAQF)and through improving the scheme of MACA/PR,a new mechanism MAQF/MAC that can provide MAC layer QoS guarantees for MANET has been presented.MAQF/MAC can measure the variation of resource in real time,change the channel access policy and adapt the amount of resource captured by trafflc.In addition,this paper also concerns some key components of MAQF/MAC,including reservation table(RT),QoS routing,resource compression algorithm and etc.Simulation result show that MAQF/MAC ls superior to MACA/PR in the aspects of multi-level trafflc QoS provisioning and resource utilization.

  4. MicMac GIS application: free open source

    Science.gov (United States)

    Duarte, L.; Moutinho, O.; Teodoro, A.

    2016-10-01

    The use of Remotely Piloted Aerial System (RPAS) for remote sensing applications is becoming more frequent as the technologies on on-board cameras and the platform itself are becoming a serious contender to satellite and airplane imagery. MicMac is a photogrammetric tool for image matching that can be used in different contexts. It is an open source software and it can be used as a command line or with a graphic interface (for each command). The main objective of this work was the integration of MicMac with QGIS, which is also an open source software, in order to create a new open source tool applied to photogrammetry/remote sensing. Python language was used to develop the application. This tool would be very useful in the manipulation and 3D modelling of a set of images. The main objective was to create a toolbar in QGIS with the basic functionalities with intuitive graphic interfaces. The toolbar is composed by three buttons: produce the points cloud, create the Digital Elevation Model (DEM) and produce the orthophoto of the study area. The application was tested considering 35 photos, a subset of images acquired by a RPAS in the Aguda beach area, Porto, Portugal. They were used in order to create a 3D terrain model and from this model obtain an orthophoto and the corresponding DEM. The code is open and can be modified according to the user requirements. This integration would be very useful in photogrammetry and remote sensing community combined with GIS capabilities.

  5. Mac-1 Regulates IL-13 Activity in Macrophages by Directly Interacting with IL-13Rα1.

    Science.gov (United States)

    Cao, Chunzhang; Zhao, Juanjuan; Doughty, Emily K; Migliorini, Mary; Strickland, Dudley K; Kann, Maricel G; Zhang, Li

    2015-08-28

    Mac-1 exhibits a unique inhibitory activity toward IL-13-induced JAK/STAT activation and thereby regulates macrophage to foam cell transformation. However, the underlying molecular mechanism is unknown. In this study, we report the identification of IL-13Rα1, a component of the IL-13 receptor (IL-13R), as a novel ligand of integrin Mac-1, using a co-evolution-based algorithm. Biochemical analyses demonstrated that recombinant IL-13Rα1 binds Mac-1 in a purified system and supports Mac-1-mediated cell adhesion. Co-immunoprecipitation experiments revealed that endogenous Mac-1 forms a complex with IL-13Rα1 in solution, and confocal fluorescence microscopy demonstrated that these two receptors co-localize with each other on the surface of macrophages. Moreover, we found that genetic inactivation of Mac-1 promotes IL-13-induced JAK/STAT activation in macrophages, resulting in enhanced polarization along the alternative activation pathway. Importantly, we observed that Mac-1(-/-) macrophages exhibit increased expression of foam cell differentiation markers including 15-lipoxygenase and lectin-type oxidized LDL receptor-1 both in vitro and in vivo. Indeed, we found that Mac-1(-/-)LDLR(-/-) mice develop significantly more foam cells than control LDLR(-/-) mice, using an in vivo model of foam cell formation. Together, our data establish for the first time a molecular mechanism by which Mac-1 regulates the signaling activity of IL-13 in macrophages. This newly identified IL-13Rα1/Mac-1-dependent pathway may offer novel targets for therapeutic intervention in the future.

  6. Mac-1 Regulates IL-13 Activity in Macrophages by Directly Interacting with IL-13Rα1*

    Science.gov (United States)

    Cao, Chunzhang; Zhao, Juanjuan; Doughty, Emily K.; Migliorini, Mary; Strickland, Dudley K.; Kann, Maricel G.; Zhang, Li

    2015-01-01

    Mac-1 exhibits a unique inhibitory activity toward IL-13-induced JAK/STAT activation and thereby regulates macrophage to foam cell transformation. However, the underlying molecular mechanism is unknown. In this study, we report the identification of IL-13Rα1, a component of the IL-13 receptor (IL-13R), as a novel ligand of integrin Mac-1, using a co-evolution-based algorithm. Biochemical analyses demonstrated that recombinant IL-13Rα1 binds Mac-1 in a purified system and supports Mac-1-mediated cell adhesion. Co-immunoprecipitation experiments revealed that endogenous Mac-1 forms a complex with IL-13Rα1 in solution, and confocal fluorescence microscopy demonstrated that these two receptors co-localize with each other on the surface of macrophages. Moreover, we found that genetic inactivation of Mac-1 promotes IL-13-induced JAK/STAT activation in macrophages, resulting in enhanced polarization along the alternative activation pathway. Importantly, we observed that Mac-1−/− macrophages exhibit increased expression of foam cell differentiation markers including 15-lipoxygenase and lectin-type oxidized LDL receptor-1 both in vitro and in vivo. Indeed, we found that Mac-1−/−LDLR−/− mice develop significantly more foam cells than control LDLR−/− mice, using an in vivo model of foam cell formation. Together, our data establish for the first time a molecular mechanism by which Mac-1 regulates the signaling activity of IL-13 in macrophages. This newly identified IL-13Rα1/Mac-1-dependent pathway may offer novel targets for therapeutic intervention in the future. PMID:26160172

  7. On the virtual desktop in the College of Architecture and applications%浅谈虚拟化桌面在高校的架构和应用

    Institute of Scientific and Technical Information of China (English)

    刘剑锋

    2012-01-01

    在云计算时代,虚拟化桌面是必然趋势。本文介绍了虚拟化桌面的相关技术。分析了虚拟化桌面应用于高校的益处并比较两种虚拟化方案的利弊。%In the era of cloud computing,virtualization desktop is an inevitable trend.This paper introduces a desktop virtualization technology.Analysis of the pros and cons of the benefits of virtualized desktops used in colleges and universities and compare the two virtualization programs.

  8. History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Affoua Thérèse Aby

    2016-06-01

    Full Text Available Wireless sensor networks (WSNs are increasingly used in environmental monitoring applications. They are designed to operate for several months by featuring low activity cycles in order to save energy. In this paper, we propose a Medium Access Control (MAC protocol for suchWSNs with very low duty-cycles of 1% and less. Nodes are activated randomly and use a history of previous successful frame exchanges to decide their next activation time. We study the choice of the history size, and we compare the performance of our protocol with other protocols from the literature. We show by simulations and real experiments that with a limited history size of only six entries, our protocol achieves better performance than other protocols from the literature, while keeping the advantages of fully asynchronous protocols.

  9. Environmental Assessment for Construction of Security Forces Facility/Demolition of Existing Building 528 MacDill AFB, Florida

    Science.gov (United States)

    2005-08-01

    Gennarro and Tish Maddy MacDill Air Force Base Environmental Restoration Program 7621 Hillsborough Loop Dr. MacDill AFB, FL 33621-5207 Bryan...MacDill Air Force Base Maddy, Tish Lead-based Paint and Asbestos Records, Building 528. Verbal correspondence, February 1, 2005. Naval

  10. 42 CFR 405.1140 - MAC review of ALJ decision in a case remanded by a Federal district court.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false MAC review of ALJ decision in a case remanded by a...) Medicare Appeals Council Review § 405.1140 MAC review of ALJ decision in a case remanded by a Federal... district court for further consideration and the MAC remands the case to an ALJ, a decision subsequently...

  11. 42 CFR 405.1062 - Applicability of local coverage determinations and other policies not binding on the ALJ and MAC.

    Science.gov (United States)

    2010-10-01

    ... other policies not binding on the ALJ and MAC. 405.1062 Section 405.1062 Public Health CENTERS FOR... of local coverage determinations and other policies not binding on the ALJ and MAC. (a) ALJs and the MAC are not bound by LCDs, LMRPs, or CMS program guidance, such as program memoranda and manual...

  12. Precise strong lensing mass profile of the CLASH galaxy cluster MACS 2129

    CERN Document Server

    Monna, A; Balestra, I; Rosati, P; Grillo, C; Halkola, A; Suyu, S H; Coe, D; Frye, B; Koekemoer, A; Mercurio, A; Postman, M

    2016-01-01

    We present a detailed strong lensing mass reconstruction of the core of the galaxy cluster MACSJ 2129.4-0741 ($\\rm z_{cl}=0.589$) obtained by combining high-resolution HST photometry from the CLASH survey with new spectroscopic observations from the CLASH-VLT survey. A background bright red passive galaxy at $\\rm z_{sp}=1.36$, sextuply lensed in the cluster core, has four radial lensed images located over the three central cluster members. Further 19 background lensed galaxies are spectroscopically confirmed by our VLT survey, including 3 additional multiple systems. A total of 27 multiple images are used in the lensing analysis. This allows us to trace with high precision the total mass profile of the cluster in its very inner region ($\\rm R<100$ kpc). Our final lensing mass model reproduces the multiple images systems identified in the cluster core with high accuracy of $0.4''$. This translates in an high precision mass reconstruction of MACS 2129, which is constrained at level of 3%. The cluster has Ein...

  13. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  14. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  15. A tale of two mitochondrial channels, MAC and PTP, in apoptosis.

    Science.gov (United States)

    Kinnally, Kathleen W; Antonsson, Bruno

    2007-05-01

    The crucial step in the intrinsic, or mitochondrial, apoptotic pathway is permeabilization of the mitochondrial outer membrane. Permeabilization triggers release of apoptogenic factors, such as cytochrome c, from the mitochondrial intermembrane space into the cytosol where these factors ensure propagation of the apoptotic cascade and execution of cell death. However, the mechanism(s) underlying permeabilization of the outer membrane remain controversial. Two mechanisms, involving opening of two different mitochondrial channels, have been proposed to be responsible for the permeabilization; the permeability transition pore (PTP) in the inner membrane and the mitochondrial apoptosis-induced channel (MAC) in the outer membrane. Opening of PTP would lead to matrix swelling, subsequent rupture of the outer membrane, and an unspecific release of intermembrane proteins into the cytosol. However, many believe PTP opening is a consequence of apoptosis and this channel is thought to principally play a role in necrosis, not apoptosis. Activation of MAC is exquisitely regulated by Bcl-2 family proteins, which are the sentinels of apoptosis. MAC provides specific pores in the outer membrane for the passage of intermembrane proteins, in particular cytochrome c, to the cytosol. The electrophysiological characteristics of MAC are very similar to Bax channels and depletion of Bax significantly diminishes MAC activity, suggesting that Bax is an essential constituent of MAC in some systems. The characteristics of various mitochondrial channels and Bax are compared. The involvement of MAC and PTP activities in apoptosis of disease and their pharmacology are discussed.

  16. A cross-layer duty cycle MAC protocol supporting a pipeline feature for wireless sensor networks.

    Science.gov (United States)

    Tong, Fei; Xie, Rong; Shu, Lei; Kim, Young-Chon

    2011-01-01

    Although the conventional duty cycle MAC protocols for Wireless Sensor Networks (WSNs) such as RMAC perform well in terms of saving energy and reducing end-to-end delivery latency, they were designed independently and require an extra routing protocol in the network layer to provide path information for the MAC layer. In this paper, we propose a new cross-layer duty cycle MAC protocol with data forwarding supporting a pipeline feature (P-MAC) for WSNs. P-MAC first divides the whole network into many grades around the sink. Each node identifies its grade according to its logical hop distance to the sink and simultaneously establishes a sleep/wakeup schedule using the grade information. Those nodes in the same grade keep the same schedule, which is staggered with the schedule of the nodes in the adjacent grade. Then a variation of the RTS/CTS handshake mechanism is used to forward data continuously in a pipeline fashion from the higher grade to the lower grade nodes and finally to the sink. No extra routing overhead is needed, thus increasing the network scalability while maintaining the superiority of duty-cycling. The simulation results in OPNET show that P-MAC has better performance than S-MAC and RMAC in terms of packet delivery latency and energy efficiency.

  17. Applications of Desktop Cloud Technology in Hospitals%桌面云在医疗行业中的应用

    Institute of Scientific and Technical Information of China (English)

    杨君; 郝泽余

    2016-01-01

    Facing increasing number of PC, the aging of terminal PC, the decreasing of system speed and the complicated operational works, the technology of desktop cloud brings a new situation for digital hospital building. In this paper, applications and features of desktop cloud technology in hospitals were discussed.%面对医院信息化建设过程中PC的数量的增加、PC终端的老化、系统运行速度的下降、运维工作的复杂化等问题,桌面云技术为数字化医院建设带来全新的局面,本文探讨了桌面云技术在医院的实施应用及特点。

  18. Haptic devices and objects, robots and mannequin simulation in a CAD-CAM software: eM-Virtual Desktop

    CERN Document Server

    Chablat, Damien; Hoessler, Bernard; Guibert, Matthieu

    2011-01-01

    This paper presents the development of a new software in order to manage objects, robots and mannequins in using the possibilities given by the haptic feedback of the Phantom desktop devices. The haptic device provides 6 positional degrees of freedom sensing but three degrees force feedback. This software called eM-Virtual Desktop is integrated in the Tecnomatix's solution called eM-Workplace. The eM-Workplace provides powerful solutions for planning and designing of complex assembly facilities, lines and workplaces. In the digital mockup context, the haptic interfaces can be used to reduce the development cycle of products. Three different loops are used to manage the graphic, the collision detection and the haptic feedback according to theirs own frequencies. The developed software is currently tested in industrial context by a European automotive constructor.

  19. Evaluation of usefulness and availability for orthopedic surgery using clavicle fracture model manufactured by desktop 3D printer

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Wang Kyun [Dept. of Diagnostic Radiology, Cheongju Medical Center, Cheongju (Korea, Republic of)

    2014-09-15

    Usefulness and clinical availability for surgery efficiency were evaluated by conducting pre-operative planning with a model manufactured by desktop 3D printer by using clavicle CT image. The patient-customized clavicle fracture model was manufactured by desktop 3D printer of FDM wire laminated processing method by converting the CT image into STL file in Open Source DICOM Viewer Osirix. Also, the model of the original shape before damaged was restored and manufactured by Mirror technique based on STL file of not fractured clavicle of the other side by using the symmetry feature of the human body. For the model, the position and size, degree of the fracture was equally printed out. Using the clavicle model directly manufactured with low cost and less time in Department of Radiology is considered to be useful because it can reduce secondary damage during surgery and increase surgery efficiency with Minimal invasive percutaneous plate osteosynthesis(MIPO)

  20. DLD-MAC:A Diffserv-based Low-delay MAC Protocol for WSNs%DLD-MAC:一种区分服务的低时延传感器网络MAC协议

    Institute of Scientific and Technical Information of China (English)

    舒俊浩; 白光伟; 沈航

    2012-01-01

    针对现有无线传感器网络MAC协议不能提供区分服务和传输时廷较大的问题,在经典多跳传输协议DW-MAC的基础上,提出了一种具有区分服务功能的低时延MAC协议—DLD-MAC(Diffserv-based Low-Delay MAC).其基本思路是让高优先级数据选择更小的竞争窗口,以降低时延和能耗.Markov建模分析表明,DLD-MAC能对不同优先级的业务流进行很好的服务区分,而且相较于传统的无线传感器网络MAC协议,其在时延性能上有显著优势,能更有效地保障服务质量.%Considering that most of the existing MAC protocols in wireless sensor networks do not support any priority scheme,this paper proposed a novel,Diffserv-based low-delay MAC mechanismCDLD-MAC),on the basis of the existing DW-MAC protocol. The main idea is that, by introducing differentiated services, the high priority data chooses smaller back-off window, so that it can achieve much more chance to be delivered, and its packet transmission latency and energy consumption can be reduced significantly compared with low priority data. On the other hand, a Markov chain model was designed in this work, to analyze and evaluate the mechanism performance. Our analytical analyses show that the proposed DLD-MAC can effectively make the high priority data achieve higher QoS over the low priority data, and achieve much lower transmission latency than traditional MAC protocol as well,which is adequate to serve delay-sensitive data flow.

  1. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    Science.gov (United States)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  2. An Economic Analysis of MAC Versus WALANT: A Trigger Finger Release Surgery Case Study.

    Science.gov (United States)

    Codding, Jason L; Bhat, Suneel B; Ilyas, Asif M

    2017-07-01

    There has been recent interest in wide awake hand surgery, also referred to as "wide awake local anesthesia with no tourniquet" (WALANT) surgery. Using a model of single trigger finger release (TFR) surgery, a hypothesis was made that WALANT would result in decreased hospital time and cost than patients receiving sedation with monitored anesthetic care (MAC). Consecutive cases of single TFR surgery with MAC were compared with WALANT. All surgeries were performed in the same manner, at the same facility, and by the same surgeon. Total operating room (OR) time, surgical time, recovery time, and anesthesia costs were analyzed. There were 78 patients: 31 MAC and 47 WALANT. The MAC group averaged 27.2 minutes of OR time; the WALANT group averaged 25.2 minutes. The MAC group surgical time was 10.2 minutes versus WALANT of 10.4 minutes. Post-operatively, the MAC group averaged 72.3 minutes in the recovery room compared with WALANT group of 30.2 minutes. Each case performed under MAC had a minimum of excess charges from anesthesia of approximately $105. Patients undergoing single TFR surgery under WALANT trended toward less time in the OR, had similar surgical times, and spent significantly less time in the recovery room, compared with MAC, thereby resulting in less indirect costs. Each MAC case also had minimum direct excess anesthesia charges of $105, which knowingly underestimates overall charges as it excludes material and fixed costs associated with the delivery of anesthesia. Avoiding sedation for high-volume procedures such as TFR may result in significant systemic savings to payers, and in the future with bundling and episode-based payments can become increasingly important to patients, facilities, and surgeons.

  3. PLEIOTROPHIN, A MULTIFUNCTIONAL CYTOKINE AND GROWTH FACTOR, INDUCES LEUKOCYTE RESPONSES THROUGH THE INTEGRIN MAC-1.

    Science.gov (United States)

    Shen, Di; Podolnikova, Nataly P; Yakubenko, Valentin P; Ardell, Christopher L; Balabiyev, Arnat; Ugarova, Tatiana P; Wang, Xu

    2017-09-22

    Pleiotrophin (PTN) is a multifunctional, cationic, glycosaminoglycan-binding cytokine and growth factor involved in numerous physiological and pathological processes, including tissue repair and inflammation-related diseases. PTN has been shown to promote leukocyte responses by inducing their migration and expression of inflammatory cytokines. However, the mechanisms through which PTN mediates these responses remain unclear. Here, we identified the integrin Mac-1 (αMβ2, CD11b/CD18) as the receptor mediating macrophage adhesion and migration to PTN. We also found that expression of Mac-1 on the surface of human embryonic kidney (HEK) 293 cells induced their adhesion and migration to PTN. Accordingly, PTN promoted Mac-1-dependent cell spreading and initiated intracellular signaling manifested in phosphorylation of Erk1/2. While binding to PTN, Mac-1 on Mac-1-expressing HEK293 cells appear to cooperate with cell-surface proteoglycans, since both anti-Mac-1 function-blocking mAb and heparin were required to block adhesion. Moreover, biolayer interferometry and NMR indicated a direct interaction between the αMI domain, the major ligand-binding region of Mac-1, and PTN. Using peptide libraries, we found that in PTN, the αMI domain bound sequences enriched in basic and hydrophobic residues, indicating that PTN conforms to the general principle of ligand-recognition specificity of the αMI domain toward cationic proteins/peptides. Finally, using recombinant PTN-derived fragments, we show that PTN contains two distinct Mac-1-binding sites in each of its constitutive domains. Collectively, these results identify PTN as a ligand for the integrin Mac-1 on the surface of leukocytes and suggest that this interaction may play a role in inflammatory responses. Copyright © 2017, The American Society for Biochemistry and Molecular Biology.

  4. Generation of orientation tools for automated zebrafish screening assays using desktop 3D printing

    Science.gov (United States)

    2014-01-01

    Background The zebrafish has been established as the main vertebrate model system for whole organism screening applications. However, the lack of consistent positioning of zebrafish embryos within wells of microtiter plates remains an obstacle for the comparative analysis of images acquired in automated screening assays. While technical solutions to the orientation problem exist, dissemination is often hindered by the lack of simple and inexpensive ways of distributing and duplicating tools. Results Here, we provide a cost effective method for the production of 96-well plate compatible zebrafish orientation tools using a desktop 3D printer. The printed tools enable the positioning and orientation of zebrafish embryos within cavities formed in agarose. Their applicability is demonstrated by acquiring lateral and dorsal views of zebrafish embryos arrayed within microtiter plates using an automated screening microscope. This enables the consistent visualization of morphological phenotypes and reporter gene expression patterns. Conclusions The designs are refined versions of previously demonstrated devices with added functionality and strongly reduced production costs. All corresponding 3D models are freely available and digital design can be easily shared electronically. In combination with the increasingly widespread usage of 3D printers, this provides access to the developed tools to a wide range of zebrafish users. Finally, the design files can serve as templates for other additive and subtractive fabrication methods. PMID:24886511

  5. CLOUD-BASED VS DESKTOP-BASED PROPERTY MANAGEMENT SYSTEMS IN HOTEL

    Directory of Open Access Journals (Sweden)

    Mustafa\tGULMEZ

    2015-06-01

    Full Text Available Even though keeping up with the modern developments in IT sector is crucial for the success and competitiveness of a hotel, it is usually very hard for new technologies to be accepted and implemented. This is the case with the cloud technology for which the opinions between hoteliers are divided on those who think that it is just another fashion trend, unnecessary to be taken into consideration and those that believe that it helps in performing daily operations more easily, leaving space for more interaction with guests both in virtual and real world. Usage of cloud technology in hotels is still in its beginning phase and hoteliers still have to learn more about its advantages and adequate usage for the benefit of overall hotel operating. On the example of hotel property management system (PMS and comparison between features of its older desktop-version and new web-based programs, this research aims at finding out at which stage and how effective is usage of cloud technology in hotels. For this, qualitative research with semi-structured interviews with hotel mangers that use one of these programs was conducted. Reasons for usage and advantages of each version are discussed.

  6. A desktop system of virtual morphometric globes for Mars and the Moon

    Science.gov (United States)

    Florinsky, I. V.; Filippov, S. V.

    2017-03-01

    Global morphometric models can be useful for earth and planetary studies. Virtual globes - programs implementing interactive three-dimensional (3D) models of planets - are increasingly used in geo- and planetary sciences. We describe the development of a desktop system of virtual morphometric globes for Mars and the Moon. As the initial data, we used 15'-gridded global digital elevation models (DEMs) extracted from the Mars Orbiter Laser Altimeter (MOLA) and the Lunar Orbiter Laser Altimeter (LOLA) gridded archives. For two celestial bodies, we derived global digital models of several morphometric attributes, such as horizontal curvature, vertical curvature, minimal curvature, maximal curvature, and catchment area. To develop the system, we used Blender, the free open-source software for 3D modeling and visualization. First, a 3D sphere model was generated. Second, the global morphometric maps were imposed to the sphere surface as textures. Finally, the real-time 3D graphics Blender engine was used to implement rotation and zooming of the globes. The testing of the developed system demonstrated its good performance. Morphometric globes clearly represent peculiarities of planetary topography, according to the physical and mathematical sense of a particular morphometric variable.

  7. VRLane: a desktop virtual safety management program for underground coal mine

    Science.gov (United States)

    Li, Mei; Chen, Jingzhu; Xiong, Wei; Zhang, Pengpeng; Wu, Daozheng

    2008-10-01

    VR technologies, which generate immersive, interactive, and three-dimensional (3D) environments, are seldom applied to coal mine safety work management. In this paper, a new method that combined the VR technologies with underground mine safety management system was explored. A desktop virtual safety management program for underground coal mine, called VRLane, was developed. The paper mainly concerned about the current research advance in VR, system design, key techniques and system application. Two important techniques were introduced in the paper. Firstly, an algorithm was designed and implemented, with which the 3D laneway models and equipment models can be built on the basis of the latest mine 2D drawings automatically, whereas common VR programs established 3D environment by using 3DS Max or the other 3D modeling software packages with which laneway models were built manually and laboriously. Secondly, VRLane realized system integration with underground industrial automation. VRLane not only described a realistic 3D laneway environment, but also described the status of the coal mining, with functions of displaying the run states and related parameters of equipment, per-alarming the abnormal mining events, and animating mine cars, mine workers, or long-wall shearers. The system, with advantages of cheap, dynamic, easy to maintenance, provided a useful tool for safety production management in coal mine.

  8. SNAVI: Desktop application for analysis and visualization of large-scale signaling networks

    Directory of Open Access Journals (Sweden)

    Purushothaman Sudarshan P

    2009-01-01

    Full Text Available Abstract Background Studies of cellular signaling indicate that signal transduction pathways combine to form large networks of interactions. Viewing protein-protein and ligand-protein interactions as graphs (networks, where biomolecules are represented as nodes and their interactions are represented as links, is a promising approach for integrating experimental results from different sources to achieve a systematic understanding of the molecular mechanisms driving cell phenotype. The emergence of large-scale signaling networks provides an opportunity for topological statistical analysis while visualization of such networks represents a challenge. Results SNAVI is Windows-based desktop application that implements standard network analysis methods to compute the clustering, connectivity distribution, and detection of network motifs, as well as provides means to visualize networks and network motifs. SNAVI is capable of generating linked web pages from network datasets loaded in text format. SNAVI can also create networks from lists of gene or protein names. Conclusion SNAVI is a useful tool for analyzing, visualizing and sharing cell signaling data. SNAVI is open source free software. The installation may be downloaded from: http://snavi.googlecode.com. The source code can be accessed from: http://snavi.googlecode.com/svn/trunk

  9. Desktop Software for Patch-Clamp Raw Binary Data Conversion and Preprocessing

    Directory of Open Access Journals (Sweden)

    Ning Zhang

    2011-01-01

    Full Text Available Since raw data recorded by patch-clamp systems are always stored in binary format, electrophysiologists may experience difficulties with patch clamp data preprocessing especially when they want to analyze by custom-designed algorithms. In this study, we present desktop software, called PCDReader, which could be an effective and convenient solution for patch clamp data preprocessing for daily laboratory use. We designed a novel class module, called clsPulseData, to directly read the raw data along with the parameters recorded from HEKA instruments without any other program support. By a graphical user interface, raw binary data files can be converted into several kinds of ASCII text files for further analysis, with several preprocessing options. And the parameters can also be viewed, modified and exported into ASCII files by a user-friendly Explorer style window. The real-time data loading technique and optimized memory management programming makes PCDReader a fast and efficient tool. The compiled software along with the source code of the clsPulseData class module is freely available to academic and nonprofit users.

  10. Prototype Implementation of Web and Desktop Applications for ALMA Science Verification Data and the Lessons Learned

    Science.gov (United States)

    Eguchi, S.; Kawasaki, W.; Shirasaki, Y.; Komiya, Y.; Kosugi, G.; Ohishi, M.; Mizumoto, Y.

    2013-10-01

    ALMA is estimated to generate TB scale data during only one observation; astronomers need to identify which part of the data they are really interested in. We have been developing new GUI software for this purpose utilizing the VO interface: ALMA Web Quick Look System (ALMAWebQL) and ALMA Desktop Application (Vissage). The former is written in JavaScript and HTML5 generated from Java code by the Google Web Toolkit, and the latter is in pure Java. An essential point of our approach is how to reduce network traffic: we prepare, in advance, “compressed” FITS files of 2x2x1 (horizontal, vertical, and spectral directions, respectively) binning, 2 x 2 x 2 binning, 4 x 4 x 2 binning data, and so on. These files are hidden from users, and Web QL automatically chooses the proper one for each user operation. Through this work, we find that network traffic in our system is still a bottleneck towards TB scale data distribution. Hence we have to develop alternative data containers for much faster data processing. In this paper, we introduce our data analysis systems, and describe what we learned through the development.

  11. A Unified Algorithm for Virtual Desktops Placement in Distributed Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jiangtao Zhang

    2016-01-01

    Full Text Available Distributed cloud has been widely adopted to support service requests from dispersed regions, especially for large enterprise which requests virtual desktops for multiple geodistributed branch companies. The cloud service provider (CSP aims to deliver satisfactory services at the least cost. CSP selects proper data centers (DCs closer to the branch companies so as to shorten the response time to user request. At the same time, it also strives to cut cost considering both DC level and server level. At DC level, the expensive long distance inter-DC bandwidth consumption should be reduced and lower electricity price is sought. Inside each tree-like DC, servers are trying to be used as little as possible so as to save equipment cost and power. In nature, there is a noncooperative relation between the DC level and server level in the selection. To attain these objectives and capture the noncooperative relation, multiobjective bilevel programming is used to formulate the problem. Then a unified genetic algorithm is proposed to solve the problem which realizes the selection of DC and server simultaneously. The extensive simulation shows that the proposed algorithm outperforms baseline algorithm in both quality of service guaranteeing and cost saving.

  12. Prototype Implementation of Web and Desktop Applications for ALMA Science Verification Data and the Lessons Learned

    CERN Document Server

    Eguchi, Satoshi; Shirasaki, Yuji; Komiya, Yutaka; Kosugi, George; Ohishi, Masatoshi; Mizumoto, Yoshihiko

    2012-01-01

    ALMA is estimated to generate TB scale data during only one observation; astronomers manage to identify which part of the data they are really interested in. Now we have been developing new GUI software for this purpose utilizing the VO interface: ALMA Web Quick Look System (ALMAWebQL) and ALMA Desktop Application (Vissage). The former is written in JavaScript and HTML5 generated from Java codes by Google Web Toolkit, and the latter is in pure Java. An essential point of our approach is how to reduce network traffic: we prepare, in advance, "compressed" FITS files of 2x2x1 (horizontal, vertical, and spectral directions, respectively) binning, 2x2x2 binning, 4x4x2 binning data, and so on. These files are hidden from users, and Web QL automatically choose proper one by each user operation. Through this work, we find that network traffic in our system is still a bottleneck towards TB scale data distribution. Hence we have to develop alternative data containers for much faster data processing. In this paper, I in...

  13. Deep Unsupervised Learning on a Desktop PC: A Primer for Cognitive Scientists.

    Science.gov (United States)

    Testolin, Alberto; Stoianov, Ivilin; De Filippo De Grazia, Michele; Zorzi, Marco

    2013-01-01

    Deep belief networks hold great promise for the simulation of human cognition because they show how structured and abstract representations may emerge from probabilistic unsupervised learning. These networks build a hierarchy of progressively more complex distributed representations of the sensory data by fitting a hierarchical generative model. However, learning in deep networks typically requires big datasets and it can involve millions of connection weights, which implies that simulations on standard computers are unfeasible. Developing realistic, medium-to-large-scale learning models of cognition would therefore seem to require expertise in programing parallel-computing hardware, and this might explain why the use of this promising approach is still largely confined to the machine learning community. Here we show how simulations of deep unsupervised learning can be easily performed on a desktop PC by exploiting the processors of low cost graphic cards (graphic processor units) without any specific programing effort, thanks to the use of high-level programming routines (available in MATLAB or Python). We also show that even an entry-level graphic card can outperform a small high-performance computing cluster in terms of learning time and with no loss of learning quality. We therefore conclude that graphic card implementations pave the way for a widespread use of deep learning among cognitive scientists for modeling cognition and behavior.

  14. AS COMPOSIÇÕES DA ESCUTA E A INTERNET: OS DJ'S DE DESKTOP

    Directory of Open Access Journals (Sweden)

    Rodrigo Fonseca e Rodrigues

    2006-12-01

    Full Text Available O texto aborda questões emergentes das ocasiões de experiência que, ativadas pelo uso idiossincrático das máquinas em rede, passam a contagiar circunstâncias e práticas genuínas de composição musical, bem como de outras disposições da escuta. Isto se passa quando os "dj's produtores de desktop" remodulam forças latentes nos enunciados musicais da cultura corporativa para revelarem, a partir da prática do remix, outros eventos, instaurando regimes singulares para a sensação. Seria preciso pensar tais poéticas da escuta em rede como implicações conjuntas de conexões não apenas de materiais musicais, mas também de universos incorporais, de forças insonoras, amparando-se, para tanto, nas direções conceituais deleuzianas acerca das questões do virtual e do acontecimento na sensação musical.

  15. Unique Methodologies for Nano/Micro Manufacturing Job Training Via Desktop Supercomputer Modeling and Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Kimball, Clyde [Northern Illinois Univ., DeKalb, IL (United States); Karonis, Nicholas [Northern Illinois Univ., DeKalb, IL (United States); Lurio, Laurence [Northern Illinois Univ., DeKalb, IL (United States); Piot, Philippe [Northern Illinois Univ., DeKalb, IL (United States); Xiao, Zhili [Northern Illinois Univ., DeKalb, IL (United States); Glatz, Andreas [Northern Illinois Univ., DeKalb, IL (United States); Pohlman, Nicholas [Northern Illinois Univ., DeKalb, IL (United States); Hou, Minmei [Northern Illinois Univ., DeKalb, IL (United States); Demir, Veysel [Northern Illinois Univ., DeKalb, IL (United States); Song, Jie [Northern Illinois Univ., DeKalb, IL (United States); Duffin, Kirk [Northern Illinois Univ., DeKalb, IL (United States); Johns, Mitrick [Northern Illinois Univ., DeKalb, IL (United States); Sims, Thomas [Northern Illinois Univ., DeKalb, IL (United States); Yin, Yanbin [Northern Illinois Univ., DeKalb, IL (United States)

    2012-11-21

    This project establishes an initiative in high speed (Teraflop)/large-memory desktop supercomputing for modeling and simulation of dynamic processes important for energy and industrial applications. It provides a training ground for employment of current students in an emerging field with skills necessary to access the large supercomputing systems now present at DOE laboratories. It also provides a foundation for NIU faculty to quantum leap beyond their current small cluster facilities. The funding extends faculty and student capability to a new level of analytic skills with concomitant publication avenues. The components of the Hewlett Packard computer obtained by the DOE funds create a hybrid combination of a Graphics Processing System (12 GPU/Teraflops) and a Beowulf CPU system (144 CPU), the first expandable via the NIU GAEA system to ~60 Teraflops integrated with a 720 CPU Beowulf system. The software is based on access to the NVIDIA/CUDA library and the ability through MATLAB multiple licenses to create additional local programs. A number of existing programs are being transferred to the CPU Beowulf Cluster. Since the expertise necessary to create the parallel processing applications has recently been obtained at NIU, this effort for software development is in an early stage. The educational program has been initiated via formal tutorials and classroom curricula designed for the coming year. Specifically, the cost focus was on hardware acquisitions and appointment of graduate students for a wide range of applications in engineering, physics and computer science.

  16. H-Trust:A Group Trust Management System for Peer-to-Peer Desktop Grid

    Institute of Scientific and Technical Information of China (English)

    Huanyu Zhao; Xiaolin Li

    2009-01-01

    Peer-to-Peer Desktop Grid(P2PDG)has emerged as a pervasive cyber-infrastructure tackling many largescale applications with high impacts.As a burgeoning research area,P2PDG can support numerous applications,including scientific computing,file sharing,web services,and virtual organization for collaborative activities and projects.To handle trustworthiness issues of these services.trust and reputation schemes are proposed to establish trust among peers in P2PDG.In this paper,we propose a robust group trust management system,called H-Trust,inspired by the H-index aggregation technique.Leveraging the robustness of the H-index algorithm under incomplete and uncertain circumstances.H-Trust offers a robust personalized reputation evaluation mechanism for both individual and group trusts with minimal communication and computation overheads.We present the H-Trust scheme in five phases,including trust recording,local trust evaluation,trust query phase,spatiai-temporal update phase,and group reputation evaluation phases.The rationale for its design,the analysis of the algorithm are further investigated.To validate the performance of H-Trust scheme.we designed the H-Trust simulator HTrust-Sim to conduct multi-agent-based simulations.Simulation results demonstrate that H-Trust is robust and can identify and isolate malicious peers in large scale systems even when a large portion of peers are malicious.

  17. Effects of Local-Lag Mechanism on Task Performance in a Desktop CVE System

    Institute of Scientific and Technical Information of China (English)

    Hong Chen; Ling Chen; Gen-Cai Chen

    2005-01-01

    Consistency maintenance is a kernel problem in Collaborative Virtual Environment (CVE) research. The approaches used in Networked Virtual Environments (e.g., DR algorithm) could not be used in CVEs, for they could not prevent short-term inconsistency. Therefore, local-lag mechanism has been proposed to eliminate short-term inconsistency in CVEs. Choosing a proper lag value is a key problem in local-lag mechanism. This paper studied the effects of lag value (0ms-900ms) on task performance in a desktop CVE system. Experimental results indicate that the effect of lag value on task performance is not linear. The effect could be separated into four segments by three dividing points: 150ms, 300ms and 600ms. Lag has no effect on task performance while ranging from 0ms to 150ms. From 150ms to 300ms, lag slightly affects task performance. Lag deteriorates task performance seriously while ranging from 300ms to 600ms. When lag is longer than 600ms, the task cannot be accomplished sometimes.

  18. Deep unsupervised learning on a desktop PC: A primer for cognitive scientists

    Directory of Open Access Journals (Sweden)

    Alberto eTestolin

    2013-05-01

    Full Text Available Deep belief networks hold great promise for the simulation of human cognition because they show how structured and abstract representations may emerge from probabilistic unsupervised learning. These networks build a hierarchy of progressively more complex distributed representations of the sensory data by fitting a hierarchical generative model. However, learning in deep networks typically requires big datasets and it can involve millions of connection weights, which implies that simulations on standard computers are unfeasible. Developing realistic, medium-to-large-scale learning models of cognition would therefore seem to require expertise in programming parallel-computing hardware, and this might explain why the use of this promising approach is still largely confined to the machine learning community. Here we show how simulations of deep unsupervised learning can be easily performed on a desktop PC by exploiting the processors of low-cost graphic cards (GPUs without any specific programming effort, thanks to the use of high-level programming routines (available in MATLAB or Python. We also show that even an entry-level graphic card can outperform a small high-performance computing cluster in terms of learning time and with no loss of learning quality. We therefore conclude that graphic card implementations pave the way for a widespread use of deep learning among cognitive scientists for modeling cognition and behavior.

  19. Development and deployment of a Desktop and Mobile application on grid for GPS studie

    Science.gov (United States)

    Ntumba, Patient; Lotoy, Vianney; Djungu, Saint Jean; Fleury, Rolland; Petitdidier, Monique; Gemünd, André; Schwichtenberg, Horst

    2013-04-01

    GPS networks for scientific studies are developed all other the world and large databases, regularly updated, like IGS are also available. Many GPS have been installed in West and Central Africa during AMMA (African Monsoon Multiplidisciplinary Analysis), IHY (International heliophysical Year)and many other projects since 2005. African scientists have been educated to use those data especially for meteorological and ionospheric studies. The annual variations of ionospheric parameters for a given station or map of a given region are very intensive computing. Then grid or cloud computing may be a solution to obtain results in a relatively short time. Real time At the University of Kinshasa the chosen solution is a grid of several PCs. It has been deployed by using Globus Toolkit on a Condor pool in order to support the processing of GPS data for ionospheric studies. To be user-friendly, graphical user interfaces(GUI) have been developed to help the user to prepare and submit jobs. One is a java GUI for desktop client, the other is an Android GUI for mobile client. The interest of a grid is the possibility to send a bunch of jobs with an adequate agent control in order to survey the job execution and result storage. After the feasibility study the grid will be extended to a larger number of PCs. Other solutions will be in parallel explored.

  20. Low Cost Desktop Image Analysis Workstation With Enhanced Interactive User Interface

    Science.gov (United States)

    Ratib, Osman M.; Huang, H. K.

    1989-05-01

    A multimodality picture archiving and communication system (PACS) is in routine clinical use in the UCLA Radiology Department. Several types workstations are currently implemented for this PACS. Among them, the Apple Macintosh II personal computer was recently chosen to serve as a desktop workstation for display and analysis of radiological images. This personal computer was selected mainly because of its extremely friendly user-interface, its popularity among the academic and medical community and its low cost. In comparison to other microcomputer-based systems the Macintosh II offers the following advantages: the extreme standardization of its user interface, file system and networking, and the availability of a very large variety of commercial software packages. In the current configuration the Macintosh II operates as a stand-alone workstation where images are imported from a centralized PACS server through an Ethernet network using a standard TCP-IP protocol, and stored locally on magnetic disk. The use of high resolution screens (1024x768 pixels x 8bits) offer sufficient performance for image display and analysis. We focused our project on the design and implementation of a variety of image analysis algorithms ranging from automated structure and edge detection to sophisticated dynamic analysis of sequential images. Specific analysis programs were developed for ultrasound images, digitized angiograms, MRI and CT tomographic images and scintigraphic images.