WorldWideScience

Sample records for machines possessing external

  1. 27 CFR 478.36 - Transfer or possession of machine guns.

    Science.gov (United States)

    2010-04-01

    ... machine guns. 478.36 Section 478.36 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... Administrative and Miscellaneous Provisions § 478.36 Transfer or possession of machine guns. No person shall transfer or possess a machine gun except: (a) A transfer to or by, or possession by or under the...

  2. Possessive Pronouns as Determiners in Japanese-to-English Machine Translation

    CERN Document Server

    Bond, F; Ikehara, S; Bond, Francis; Ogura, Kentaro; Ikehara, Satoru

    1996-01-01

    Possessive pronouns are used as determiners in English when no equivalent would be used in a Japanese sentence with the same meaning. This paper proposes a heuristic method of generating such possessive pronouns even when there is no equivalent in the Japanese. The method uses information about the use of possessive pronouns in English treated as a lexical property of nouns, in addition to contextual information about noun phrase referentiality and the subject and main verb of the sentence that the noun phrase appears in. The proposed method has been implemented in NTT Communication Science Laboratories' Japanese-to-English machine translation system ALT-J/E. In a test set of 6,200 sentences, the proposed method increased the number of noun phrases with appropriate possessive pronouns generated, by 263 to 609, at the cost of generating 83 noun phrases with inappropriate possessive pronouns.

  3. 27 CFR 479.105 - Transfer and possession of machine guns.

    Science.gov (United States)

    2010-04-01

    ... machine guns. 479.105 Section 479.105 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION MACHINE GUNS, DESTRUCTIVE DEVICES, AND CERTAIN OTHER FIREARMS Registration and Identification of Firearms Machine Guns § 479.105...

  4. Five-Phase Modular External Rotor PM Machines with Different Rotor Poles: A Comparative Simulation Study

    Directory of Open Access Journals (Sweden)

    A. S. Abdel-Khalik

    2012-01-01

    Full Text Available The performance of fault-tolerant modular permanent magnet machines depends on the proper selection of the pole and slot numbers which result in negligible coupling between phases. The preferred slot and pole number combinations eliminate the effect of low-order harmonics in the stator magnetomotive force and thereby the vibration and stray loss are reduced. In this paper, three external rotor machines with identical machine dimensions are designed with different slots per phase per pole ratios. A simulation study is carried out using finite element analysis to compare the performance of the three machines in terms of machine torque density, ripple torque, core loss, and machine efficiency. A mathematical model based on the conventional-phase-model approach is also used for the comparative study. The simulation study is extended to depict machine performance under fault conditions.

  5. Performance evaluation of a five-phase modular external rotor PM machine with different rotor poles

    Directory of Open Access Journals (Sweden)

    A.S. Abdel-Khalik

    2012-12-01

    Full Text Available The performance of fault-tolerant modular permanent magnet (PM machines depends on the proper selection of the pole and slot numbers which result in negligible coupling between phases. The preferred slot and pole number combinations eliminate the effect of low order harmonics in the stator magneto motive force and thereby the vibration and stray loss are reduced. In this paper, three external rotor machines with identical machine dimensions are designed with different slots per phase per pole (SPP ratios. A simulation study is carried out using finite element analysis to compare the performance of the three machines in terms of machine torque density, ripple torque, core loss, and machine efficiency. A mathematical model based on the conventional phase model approach is also used for the comparative study. The simulation study is extended to depict machine performance under fault conditions.

  6. Visual Servoing of a Conventional CNC Machine Using an External Axis Controller

    Directory of Open Access Journals (Sweden)

    Daniel Hanafi

    2003-04-01

    Full Text Available This paper presents the implementation of an external axis control system on a conventional CNC machine so that the machine can be actively controlled in response to sensors such as vision and force. The controller that runs on an external computer has direct access to the CNC controller for machine position sensing. The control signals to the machine are sent through purpose built circuitry via the machine's manual pulse generator (MPG inputs. To demonstrate the accuracy and performance of the control system, it was used to visually track the profile of a mandrel used for shear spinning. The implemented system eliminates the parallax error and the need to use an accurate pixel resolution. The raw tracking data is processed by a curvature detection algorithm that detects linear and circular segments and segment transitions. The results show that the visual tracking system provides accurate tracking results that are well within the tolerances used in the industry.

  7. Design Enhancement and Performance Examination of External Rotor Switched Flux Permanent Magnet Machine for Downhole Application

    Science.gov (United States)

    Kumar, R.; Sulaiman, E.; Soomro, H. A.; Jusoh, L. I.; Bahrim, F. S.; Omar, M. F.

    2017-08-01

    The recent change in innovation and employments of high-temperature magnets, permanent magnet flux switching machine (PMFSM) has turned out to be one of the suitable contenders for seaward boring, however, less intended for downhole because of high atmospheric temperature. Subsequently, this extensive review manages the design enhancement and performance examination of external rotor PMFSM for the downhole application. Preparatory, the essential design parameters required for machine configuration are computed numerically. At that point, the design enhancement strategy is actualized through deterministic technique. At last, preliminary and refined execution of the machine is contrasted and as a consequence, the yield torque is raised from 16.39Nm to 33.57Nm while depreciating the cogging torque and PM weight up to 1.77Nm and 0.79kg, individually. In this manner, it is inferred that purposed enhanced design of 12slot-22pole with external rotor is convenient for the downhole application.

  8. Development of Full Automatic External Welding Machine for Annular Welds of Pipeline

    Institute of Scientific and Technical Information of China (English)

    FengBiao; LiChunrun; TangDeyu; ZhangJianhu; ZhangTianli

    2004-01-01

    To meet the demands of rapid development of pipeline constructions in China, a complete set of full automatic external welding machine for annular welds of pipeline and welding procedure have been developed thereof. The system has been applied in the “West-East Pipeline Project” and its performance is proven. With this welding machine the welding parameters can be either preset before or adjusted in real time during the welding process, which avoids the blemishes of same type domestic and international products. Thus it is best propitious to in-situ construction conditions and workers' technical level in China. In this article the development of mechanical and control systems of this product is introduced and typical welding procedure parameters are provided.

  9. Vibration suppression in multi-tool ultrasonic machining to multi-external and parametric excitations

    Institute of Scientific and Technical Information of China (English)

    M.M.Kamel; W.A.A.El-Ganaini; Y.S.Hamed

    2009-01-01

    Ultrasonic machining (USM) is of particular interest for the machining of non-conductive, brittle mate-rials such as engineering ceramics, In this paper, a multi-tool technique is used in USM to reduce the vibration in the tool holder and have reasonable amplitude for the tools. This can be done via dynamic absorbers. The coupling of four non-linear oscillators of the tool holder and tools representing ultrasonic cutting process are investigated. This leads to a four-degree-of-freedom system subjected to multi-external and multi-parametric excitation forces. The aim of this work is to control the tool holder behavior at simultaneous pri-mary, sub-harmonic and internal resonance condition. Mul-tiple scale perturbation method is used to obtain the solution up to the second order approximations. The different reso-nance cases are reported and studied numerically. The stabil-ity of the system is investigated by using both phase-plane and frequency response techniques. The effects of the differ-ent parameters of the tools on the system behavior are studied numerically. Comparison with the available published work is reported.

  10. Machine Learning Techniques for the Detection of Shockable Rhythms in Automated External Defibrillators

    Science.gov (United States)

    Irusta, Unai; Morgado, Eduardo; Aramendi, Elisabete; Ayala, Unai; Wik, Lars; Kramer-Johansen, Jo; Eftestøl, Trygve; Alonso-Atienza, Felipe

    2016-01-01

    Early recognition of ventricular fibrillation (VF) and electrical therapy are key for the survival of out-of-hospital cardiac arrest (OHCA) patients treated with automated external defibrillators (AED). AED algorithms for VF-detection are customarily assessed using Holter recordings from public electrocardiogram (ECG) databases, which may be different from the ECG seen during OHCA events. This study evaluates VF-detection using data from both OHCA patients and public Holter recordings. ECG-segments of 4-s and 8-s duration were analyzed. For each segment 30 features were computed and fed to state of the art machine learning (ML) algorithms. ML-algorithms with built-in feature selection capabilities were used to determine the optimal feature subsets for both databases. Patient-wise bootstrap techniques were used to evaluate algorithm performance in terms of sensitivity (Se), specificity (Sp) and balanced error rate (BER). Performance was significantly better for public data with a mean Se of 96.6%, Sp of 98.8% and BER 2.2% compared to a mean Se of 94.7%, Sp of 96.5% and BER 4.4% for OHCA data. OHCA data required two times more features than the data from public databases for an accurate detection (6 vs 3). No significant differences in performance were found for different segment lengths, the BER differences were below 0.5-points in all cases. Our results show that VF-detection is more challenging for OHCA data than for data from public databases, and that accurate VF-detection is possible with segments as short as 4-s. PMID:27441719

  11. [Anesthetic machine leakage from vaporizer by external force derived from keyboard of electronic medical records].

    Science.gov (United States)

    Ikegami, Hiromi; Goto, Ryokichi; Sakamoto, Syotarou; Kohama, Hanako

    2012-11-01

    We experienced the leakage from the vaporizer of the anesthetic machine despite the normalities on performing the initial leak test. The vaporizer of the anesthetic machine was compressed by computer keyboard of EMR which caused a leak from vaporizer. After computer keyboard and the vaporizer were set at normal position, the leak stopped.

  12. Development of Bio-Machine Based on the Plant Response to External Stimuli

    Directory of Open Access Journals (Sweden)

    K. Aditya

    2011-01-01

    Full Text Available In the area of biorobotics, intense research work is being done based on plant intelligence. Any living cell continuously receives information from the environment. In this paper, research is conducted on the plant named descoingsii x haworthioides (Pepe obtaining the action potential signals and its responses to stimulations of different light modes. The plant electrical signal is the reaction of plant’s stimulation owing to various environmental conditions. Action potentials are responsible for signaling between plant cells and communication from the plants can be achieved through modulation of various parameters of the electrical signal in the plant tissue. The modulated signals are used for providing information to the microcontroller’s algorithm for working of the bio-machine. The changes of frequency of action potentials in plant are studied. Electromyography (EMG electrodes and needle-type conductive electrodes along with electronic modules are used to collect and transform the information from the plant. Inverse fast Fourier transform (IFFT is used to convert signal in frequency domain into voltage signal for real-time analysis. The changes in frequency of the plant action potentials to different light modes are used for the control of the bio-machine. This work has paved the way for an extensive research towards plant intelligence.

  13. Vibration suppression of thin-walled workpiece machining considering external damping properties based on magnetorheological fluids flexible fixture

    Institute of Scientific and Technical Information of China (English)

    Ma Junjin; Zhang Dinghua; Wu Baohai; Luo Ming; Chen Bing

    2016-01-01

    Milling of the thin-walled workpiece in the aerospace industry is a critical process due to the high flexibility of the workpiece. In this paper, a flexible fixture based on the magnetorheological (MR) fluids is designed to investigate the regenerative chatter suppression during the machining. Based on the analysis of typical structural components in the aerospace industry, a general complex thin-walled workpiece with fixture and damping constraint can be equivalent as a rectangular can-tilever beam. On the basis of the equivalent models, natural frequency and mode shape function of the thin-walled workpiece is obtained according to the Euler–Bernoulli beam assumptions. Then, the displacement response function of the bending vibration of the beam is represented by the pro-duct of all the mode shape function and the generalized coordinate. Furthermore, a dynamic equa-tion of the workpiece-fixture system considering the external damping factor is proposed using the Lagrangian method in terms of all the mode shape function and the generalized coordinate, and the response of system under the dynamic cutting force is calculated to evaluate the stability of the milling process under damping control. Finally, the feasibility and effectiveness of the proposed approach are validated by the impact hammer experiments and several machining tests.

  14. The Design of Crystal External Circular Multiple Cutting Machine%晶体外圆多刀切割机的设计

    Institute of Scientific and Technical Information of China (English)

    陈东晴; 单淑萍

    2016-01-01

    用外圆单刀切割机切割质地坚硬的晶体材料比较耗时,因此,在外圆单刀切割机的基础上设计一款多刀切割机,主要由底部支架、电机、皮带传动机构、切割刀片、位置调节器、卡槽和冷却装置等组成。用此设备可以一次将大块晶体材料切割成多块不同尺寸的晶体材料,不仅大大减少了切割时间,而且还可以通过调节刀片之间的距离来控制切割尺寸。%Using the external circular single-pole cutting machine only can cut a piece of crystal material at a time,single-pole outer circle cutting machine,therefore,on the basis of design a knife cutting machine,mainly from the bottom of the bracket,motor,belt transport de-vice,cutting blade,positioners,card slot and cooling device,etc.So cutting a large volume crystal material with the equipment will take a longer time.Based on the external circular single-pole cutting machine,we will design an external circular multiple cutting machine which can cut the crystal material into many pieces with the same time.We cut crystal materials with the external circular multiple cutting ma-chines not only the cutting time will be greatly reduced,but also the cutting size can be controlled by adjusting the distance of the blades.

  15. Techniques Exploring on Machining External Thread of Hard Alloy by Electric Discharge Machine%硬质合金外螺纹的电火花成型机加工工艺探讨

    Institute of Scientific and Technical Information of China (English)

    何兴会; 杨国英

    2012-01-01

    结合硬质合金的材料特性,将电火花成型电极加工内外螺纹的工艺差异进行对比,分析硬质合金外螺纹电火花加工工艺难点,并提出合理的改进措施.再以电火花成型电极加工YG6硬质合金外螺纹为实例,运用改进方法成功加工出较高质量的外螺纹.结果表明:选取合适的峰值电流,改进加工电极结构是保证外螺纹加工质量的关键技术.最后对单电极电火花加工外螺纹的可行性工艺方案进行详细说明.%Considering the material attribute of hard alloy, the technique difference between external thread and inner thread machined by electric discharge machine is compared, and then the difficulties in machining external thread of hard alloy by electric discharge machine is analyzed and a better solution can be proposed. Take a machined work piece of YG6 for example to illustrate the high quality validity of the solutions. The results show that better quality is obtained by selecting suitable peak current and redesigning the electrode in machining external thread.

  16. Machine to the Epidemiology characteristics of hand external injury%机械致手外伤的流行病学特点

    Institute of Scientific and Technical Information of China (English)

    刘景臣; 谭旭昌; 唐宏; 宋芳华

    2009-01-01

    目的 探讨机械致手外伤的流行病学特点.方法 分析深圳市宝安区西乡人民医院自2002年1月至2008年12月因机械致手外伤的7692例病史.根据致伤机械的类别、受伤特点,分析该群体的流行病学特征.结果 该类手外伤占手外科疾病的95%以上,外伤高发月为第一季度.每天以交接班前后为高发时段.最常见的致伤机械为模具,多指复合伤为其特点.结论 重视外企及国企的手外伤预防工作,是减少事故发生的有效方法.%Objective Inquiry into a machine to the Epidemiology characteristics of hand external inju-ry. Methods Analytical Anne from treasure in Shenzhen City area west villager people hospital from January, 2002 to December,2008 because of machine to 7692 histories of diseases of hand external injury. According to to harm mechanical of category, get hurt characteristics, analyze the Epidemiology characteristic of that community. Results That type of hand external injury shares hand surgery the paroxysm is above 95%, external injury Gao Fa Yue is the first quarter degree. Every day with hand over to take over shift duty before or after for Gan Fa's time. The most familiar of to harm machine is molding tool,point compound more to harm for its characteristics. Conclusion The hand external injury prevent froming that values outside Qi and state-owners enterprise is the effective method that reduces trouble occurrence.

  17. Comparison of Test Procedures and Energy Efficiency Criteria in Selected International Standards & Labeling Programs for Copy Machines, External Power Supplies, LED Displays, Residential Gas Cooktops and Televisions

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Nina [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Zhou, Nan [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-03-01

    This report presents a technical review of international minimum energy performance standards (MEPS), voluntary and mandatory energy efficiency labels and test procedures for five products being considered for new or revised MEPS in China: copy machines, external power supply, LED displays, residential gas cooktops and flat-screen televisions. For each product, an overview of the scope of existing international standards and labeling programs, energy values and energy performance metrics and description and detailed summary table of criteria and procedures in major test standards are presented.

  18. Strategies of Clausal Possession

    Science.gov (United States)

    Langacker, Ronald W.

    2003-01-01

    Across languages, clauses expressing possession, location, and existence exhibit many similarities. To capture their evident affinity, it is often claimed that possessives derive--synclironically or diaclironically--from expressions of location/existence. This localist account obscures a basic contrast between two broad classes of possessive…

  19. Nominalization of Possessive Sentences

    Science.gov (United States)

    Rugaleva, Anelja

    1977-01-01

    Nominalization of possessive sentences in Russian is discussed. It is maintained that all lexical surface items originate as terms in a situation model, and that their actualization as different parts of speech is language-specific. Language data are used to support a locative interpretation of the semantic model. (CHK)

  20. Schizophrenia or possession?

    Science.gov (United States)

    Irmak, M Kemal

    2014-06-01

    Schizophrenia is typically a life-long condition characterized by acute symptom exacerbations and widely varying degrees of functional disability. Some of its symptoms, such as delusions and hallucinations, produce great subjective psychological pain. The most common delusion types are as follows: "My feelings and movements are controlled by others in a certain way" and "They put thoughts in my head that are not mine." Hallucinatory experiences are generally voices talking to the patient or among themselves. Hallucinations are a cardinal positive symptom of schizophrenia which deserves careful study in the hope it will give information about the pathophysiology of the disorder. We thought that many so-called hallucinations in schizophrenia are really illusions related to a real environmental stimulus. One approach to this hallucination problem is to consider the possibility of a demonic world. Demons are unseen creatures that are believed to exist in all major religions and have the power to possess humans and control their body. Demonic possession can manifest with a range of bizarre behaviors which could be interpreted as a number of different psychotic disorders with delusions and hallucinations. The hallucination in schizophrenia may therefore be an illusion-a false interpretation of a real sensory image formed by demons. A local faith healer in our region helps the patients with schizophrenia. His method of treatment seems to be successful because his patients become symptom free after 3 months. Therefore, it would be useful for medical professions to work together with faith healers to define better treatment pathways for schizophrenia.

  1. Some Remarks on Portuguese Possessives

    Directory of Open Access Journals (Sweden)

    Małgorzata Wielgosz

    2013-01-01

    Full Text Available The linguistic description of possessives is controversial. In traditional grammar they are defined as carriers of the meaning of possession or belonging; however, this paper intends to prove that in many cases such a meaning does not appear, and therefore, the possessive semantics of adjectives and pronouns known as possessives is a myth. Moreover, this article’s aim is to show the importance of context in the interpretation of the real meaning of a possessive. in order to confirm these hypotheses, and given the scarcity of works concerning Portuguese possessives, studies on English, Spanish and Polish ones carried out by various authors have been analyzed. What is more, some data from Reference Corpus of Contemporary Portuguese (CRPC have been examined. First of all, two different classifications of possessives are presented. Then, some cases of possessor deletion are shown, special attention being paid to the forms of expressing inalienable possession. After that, some structural characteristics of possessives are described, as well as their function as determiners. Finally, the paper shows the role that cultural and situational contexts play in the interpretation of the meaning of possessives.

  2. Rhetoric, Possessive Individualism, and Beyond.

    Science.gov (United States)

    Hurlbert, C. Mark

    1988-01-01

    Traces the influence of late-capitalist political ideology on the rhetoric which formed the process/product distinction; notes their sharing of an ideology of "possessive individualism." Reveals "social individualism" as an emerging ideology which may adjudicate the disparity between the ideals of process pedagogy and its…

  3. 50 CFR 20.33 - Possession limit.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Possession limit. 20.33 Section 20.33... PLANTS (CONTINUED) MIGRATORY BIRD HUNTING Possession § 20.33 Possession limit. No person shall possess more migratory game birds taken in the United States than the possession limit or the...

  4. 50 CFR 648.145 - Possession limit.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Possession limit. 648.145 Section 648.145... Fishery § 648.145 Possession limit. (a) No person shall possess more than 25 black sea bass, in, or... that is not eligible for a black sea bass moratorium permit are subject to this possession limit....

  5. 50 CFR 648.125 - Possession limit.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Possession limit. 648.125 Section 648.125... § 648.125 Possession limit. (a) No person shall possess more than 10 scup in, or harvested from, the EEZ... moratorium permit are subject to this possession limit. The owner, operator, and crew of a charter or...

  6. When Machines Design Machines!

    DEFF Research Database (Denmark)

    2011-01-01

    Until recently we were the sole designers, alone in the driving seat making all the decisions. But, we have created a world of complexity way beyond human ability to understand, control, and govern. Machines now do more trades than humans on stock markets, they control our power, water, gas...... and food supplies, manage our elevators, microclimates, automobiles and transport systems, and manufacture almost everything. It should come as no surprise that machines are now designing machines. The chips that power our computers and mobile phones, the robots and commercial processing plants on which we...... depend, all are now largely designed by machines. So what of us - will be totally usurped, or are we looking at a new symbiosis with human and artificial intelligences combined to realise the best outcomes possible. In most respects we have no choice! Human abilities alone cannot solve any of the major...

  7. Statistical-learning strategies generate only modestly performing predictive models for urinary symptoms following external beam radiotherapy of the prostate: A comparison of conventional and machine-learning methods

    Energy Technology Data Exchange (ETDEWEB)

    Yahya, Noorazrul, E-mail: noorazrul.yahya@research.uwa.edu.au [School of Physics, University of Western Australia, Western Australia 6009, Australia and School of Health Sciences, National University of Malaysia, Bangi 43600 (Malaysia); Ebert, Martin A. [School of Physics, University of Western Australia, Western Australia 6009, Australia and Department of Radiation Oncology, Sir Charles Gairdner Hospital, Western Australia 6008 (Australia); Bulsara, Max [Institute for Health Research, University of Notre Dame, Fremantle, Western Australia 6959 (Australia); House, Michael J. [School of Physics, University of Western Australia, Western Australia 6009 (Australia); Kennedy, Angel [Department of Radiation Oncology, Sir Charles Gairdner Hospital, Western Australia 6008 (Australia); Joseph, David J. [Department of Radiation Oncology, Sir Charles Gairdner Hospital, Western Australia 6008, Australia and School of Surgery, University of Western Australia, Western Australia 6009 (Australia); Denham, James W. [School of Medicine and Public Health, University of Newcastle, New South Wales 2308 (Australia)

    2016-05-15

    Purpose: Given the paucity of available data concerning radiotherapy-induced urinary toxicity, it is important to ensure derivation of the most robust models with superior predictive performance. This work explores multiple statistical-learning strategies for prediction of urinary symptoms following external beam radiotherapy of the prostate. Methods: The performance of logistic regression, elastic-net, support-vector machine, random forest, neural network, and multivariate adaptive regression splines (MARS) to predict urinary symptoms was analyzed using data from 754 participants accrued by TROG03.04-RADAR. Predictive features included dose-surface data, comorbidities, and medication-intake. Four symptoms were analyzed: dysuria, haematuria, incontinence, and frequency, each with three definitions (grade ≥ 1, grade ≥ 2 and longitudinal) with event rate between 2.3% and 76.1%. Repeated cross-validations producing matched models were implemented. A synthetic minority oversampling technique was utilized in endpoints with rare events. Parameter optimization was performed on the training data. Area under the receiver operating characteristic curve (AUROC) was used to compare performance using sample size to detect differences of ≥0.05 at the 95% confidence level. Results: Logistic regression, elastic-net, random forest, MARS, and support-vector machine were the highest-performing statistical-learning strategies in 3, 3, 3, 2, and 1 endpoints, respectively. Logistic regression, MARS, elastic-net, random forest, neural network, and support-vector machine were the best, or were not significantly worse than the best, in 7, 7, 5, 5, 3, and 1 endpoints. The best-performing statistical model was for dysuria grade ≥ 1 with AUROC ± standard deviation of 0.649 ± 0.074 using MARS. For longitudinal frequency and dysuria grade ≥ 1, all strategies produced AUROC>0.6 while all haematuria endpoints and longitudinal incontinence models produced AUROC<0.6. Conclusions

  8. Thermodynamic cost of external control

    Science.gov (United States)

    Barato, Andre C.; Seifert, Udo

    2017-07-01

    Artificial molecular machines are often driven by the periodic variation of an external parameter. This external control exerts work on the system of which a part can be extracted as output if the system runs against an applied load. Usually, the thermodynamic cost of the process that generates the external control is ignored. Here, we derive a refined second law for such small machines that include this cost, which is, for example, generated by free energy consumption of a chemical reaction that modifies the energy landscape for such a machine. In the limit of irreversible control, this refined second law becomes the standard one. Beyond this ideal limiting case, our analysis shows that due to a new entropic term unexpected regimes can occur: the control work can be smaller than the extracted work and the work required to generate the control can be smaller than this control work. Our general inequalities are illustrated by a paradigmatic three-state system.

  9. Machine Translation

    Institute of Scientific and Technical Information of China (English)

    张严心

    2015-01-01

    As a kind of ancillary translation tool, Machine Translation has been paid increasing attention to and received different kinds of study by a great deal of researchers and scholars for a long time. To know the definition of Machine Translation and to analyse its benefits and problems are significant for translators in order to make good use of Machine Translation, and helpful to develop and consummate Machine Translation Systems in the future.

  10. Sustainable machining

    CERN Document Server

    2017-01-01

    This book provides an overview on current sustainable machining. Its chapters cover the concept in economic, social and environmental dimensions. It provides the reader with proper ways to handle several pollutants produced during the machining process. The book is useful on both undergraduate and postgraduate levels and it is of interest to all those working with manufacturing and machining technology.

  11. POSSESSION, REVIEW FROM CULTURAL AND PSYCHIATRY

    Directory of Open Access Journals (Sweden)

    Ni Ketut Sri Diniari

    2013-03-01

    Full Text Available Possession is a culture related syndrome, commonly found in Indonesia including Bali. We can see this event in religion and cultural ceremony and at other times at school, home, and in society. This syndrome consist of temporary loss of self identification and environment awareness; in several events a person acts as if he/she was controlled by other being, magic force, spirit or ‘other forces’. There are still several different opinions about trance-possession, whether it is related to certain culture or is a part of mental disorder. DSM-IV-TR and PPDGJ-III defined trance-possession as mental disorder (dissociative for involuntary possession, if it is not a common activity, and if it is not a part of religion or cultural event. (MEDICINA 2012;43:37-40.

  12. On topological spaces possessing uniformly distributed sequences

    CERN Document Server

    Bogachev, V I

    2007-01-01

    Two classes of topological spaces are introduced on which every probability Radon measure possesses a uniformly distributed sequence or a uniformly tight uniformly distributed sequence. It is shown that these classes are stable under multiplication by completely regular Souslin spaces

  13. Subself theory and reincarnation/possession.

    Science.gov (United States)

    Lester, David

    2004-12-01

    A subself model of the mind is used to account for multiple personality, possession, the spirit controls of mediums, reincarnation, and the auditory hallucinations of schizophrenics, with suggestions for empirical research.

  14. Exorcism and possession in psychotherapy practice.

    Science.gov (United States)

    Henderson, J

    1982-03-01

    There has been an evolution in the layman's concept of mental disorder. Medieval belief in possession by demons and witches gave way to a 19th century medical model and more recently classical psychoanalytic formulations. Concurrently professional helping endeavor has moved increasingly from a more traditionally medical to psychotherapeutic process, and from a classical psychotherapeutic process wherein the therapist remained to a degree unresponsive and detached to a more modern emphasis on such qualities as empathy, sensitivity, reliability, and optimism as ingredients of successful psychotherapeutic practice. Freud's account of Haizmann's demonological neurosis usefully formulates the possession concept in psychological terms. However, recent developments in psychotherapeutic practice argue for a validity in the possession model of psychological distress. The possessing forces of object relations psychology are of course not the possessing demons and witches of medieval times but the possessing good and bad objects of early intrapsychic life set up through processes of introjection and incorporation in response to frustration in the early infant-mother relationship. Points of similarity in this comparison should not obscure features of contrast--ther is no place for histrionic manipulation nor for a moralistic attitude in the practice of psychotherapy. A case is described to illustrate these points.

  15. Simple machines

    CERN Document Server

    Graybill, George

    2007-01-01

    Just how simple are simple machines? With our ready-to-use resource, they are simple to teach and easy to learn! Chocked full of information and activities, we begin with a look at force, motion and work, and examples of simple machines in daily life are given. With this background, we move on to different kinds of simple machines including: Levers, Inclined Planes, Wedges, Screws, Pulleys, and Wheels and Axles. An exploration of some compound machines follows, such as the can opener. Our resource is a real time-saver as all the reading passages, student activities are provided. Presented in s

  16. The Failed Image and the Possessed

    DEFF Research Database (Denmark)

    Suhr, Christian

    2015-01-01

    This article asks if the recurrent queries regarding the value of images in visual anthropology could find new answers by exploring responses to visual media in neo-orthodox Islam. It proposes that the visual display of the photographic image shares a curious resemblance to the bodies of people...... possessed by invisible spirits called jinn. The image as a failed example or model of reality works like the possessed body as an amplifier of invisibility pointing towards that which cannot be seen, depicted visually, or represented in writing. This suggests a negative epistemology in which images obtain...

  17. POSSESSION VERSUS POSITION: STRATEGIC EVALUATION IN AFL

    Directory of Open Access Journals (Sweden)

    Darren M. O'Shaughnessy

    2006-12-01

    Full Text Available In sports like Australian Rules football and soccer, teams must battle to achieve possession of the ball in sufficient space to make optimal use of it. Ultimately the teams need to score, and to do that the ball must be brought into the area in front of goal - the place where the defence usually concentrates on shutting down space and opportunity time. Coaches would like to quantify the trade-offs between contested play in good positions and uncontested play in less promising positions, in order to inform their decision-making about where to put their players, and when to gamble on sending the ball to a contest rather than simply maintain possession. To evaluate football strategies, Champion Data has collected the on-ground locations of all 350,000 possessions and stoppages in the past two seasons of AFL (2004, 2005. By following each chain of play through to the next score, we can now reliably estimate the scoreboard "equity" of possessing the ball at any location, and measure the effect of having sufficient time to dispose of it effectively. As expected, winning the ball under physical pressure (through a "hard ball get" is far more difficult to convert into a score than winning it via a mark. We also analyse some equity gradients to show how getting the ball 20 metres closer to goal is much more important in certain areas of the ground than in others. We conclude by looking at the choices faced by players in possession wanting to maximise their likelihood of success

  18. Electric machine

    Science.gov (United States)

    El-Refaie, Ayman Mohamed Fawzi [Niskayuna, NY; Reddy, Patel Bhageerath [Madison, WI

    2012-07-17

    An interior permanent magnet electric machine is disclosed. The interior permanent magnet electric machine comprises a rotor comprising a plurality of radially placed magnets each having a proximal end and a distal end, wherein each magnet comprises a plurality of magnetic segments and at least one magnetic segment towards the distal end comprises a high resistivity magnetic material.

  19. The Machine within the Machine

    CERN Multimedia

    Katarina Anthony

    2014-01-01

    Although Virtual Machines are widespread across CERN, you probably won't have heard of them unless you work for an experiment. Virtual machines - known as VMs - allow you to create a separate machine within your own, allowing you to run Linux on your Mac, or Windows on your Linux - whatever combination you need.   Using a CERN Virtual Machine, a Linux analysis software runs on a Macbook. When it comes to LHC data, one of the primary issues collaborations face is the diversity of computing environments among collaborators spread across the world. What if an institute cannot run the analysis software because they use different operating systems? "That's where the CernVM project comes in," says Gerardo Ganis, PH-SFT staff member and leader of the CernVM project. "We were able to respond to experimentalists' concerns by providing a virtual machine package that could be used to run experiment software. This way, no matter what hardware they have ...

  20. Partial differential equations possessing Frobenius integrable decompositions

    Energy Technology Data Exchange (ETDEWEB)

    Ma, Wen-Xiu [Department of Mathematics, University of South Florida, Tampa, FL 33620-5700 (United States)]. E-mail: mawx@cas.usf.edu; Wu, Hongyou [Department of Mathematical Sciences, Northern Illinois University, DeKalb, IL 60115-2888 (United States)]. E-mail: wu@math.niu.edu; He, Jingsong [Department of Mathematics, University of Science and Technology of China, Hefei, Anhui 230026 (China)]. E-mail: jshe@ustc.edu.cn

    2007-04-16

    Frobenius integrable decompositions are introduced for partial differential equations. A procedure is provided for determining a class of partial differential equations of polynomial type, which possess specified Frobenius integrable decompositions. Two concrete examples with logarithmic derivative Baecklund transformations are given, and the presented partial differential equations are transformed into Frobenius integrable ordinary differential equations with cubic nonlinearity. The resulting solutions are illustrated to describe the solution phenomena shared with the KdV and potential KdV equations.

  1. Machine Learning

    CERN Document Server

    CERN. Geneva

    2017-01-01

    Machine learning, which builds on ideas in computer science, statistics, and optimization, focuses on developing algorithms to identify patterns and regularities in data, and using these learned patterns to make predictions on new observations. Boosted by its industrial and commercial applications, the field of machine learning is quickly evolving and expanding. Recent advances have seen great success in the realms of computer vision, natural language processing, and broadly in data science. Many of these techniques have already been applied in particle physics, for instance for particle identification, detector monitoring, and the optimization of computer resources. Modern machine learning approaches, such as deep learning, are only just beginning to be applied to the analysis of High Energy Physics data to approach more and more complex problems. These classes will review the framework behind machine learning and discuss recent developments in the field.

  2. Machine Learning

    Energy Technology Data Exchange (ETDEWEB)

    Chikkagoudar, Satish; Chatterjee, Samrat; Thomas, Dennis G.; Carroll, Thomas E.; Muller, George

    2017-04-21

    The absence of a robust and unified theory of cyber dynamics presents challenges and opportunities for using machine learning based data-driven approaches to further the understanding of the behavior of such complex systems. Analysts can also use machine learning approaches to gain operational insights. In order to be operationally beneficial, cybersecurity machine learning based models need to have the ability to: (1) represent a real-world system, (2) infer system properties, and (3) learn and adapt based on expert knowledge and observations. Probabilistic models and Probabilistic graphical models provide these necessary properties and are further explored in this chapter. Bayesian Networks and Hidden Markov Models are introduced as an example of a widely used data driven classification/modeling strategy.

  3. Predicative possession in Medieval Slavic Bible translations Predicative Possession in Early Biblical Slavic

    Directory of Open Access Journals (Sweden)

    Julia McAnallen

    2011-08-01

    Full Text Available Late Proto-Slavic (LPS had an inventory of three constructions for expressing predicative possession. Using the earliest Slavic Bible translations from Old Church Slavic (OCS, and to a lesser degree Old Czech, a number of conclusions can be drawn about the status of predicative possession for LPS. The verb iměti ‘have’ was the most frequent and least syntactically and semantically restricted predicative possessive construction (PPC. Existential PPCs with a dative possessor appear primarily with kinship relations, abstract possessums, and in a number of other fixed construction types; existential PPCs with the possessor in an u + genitive prepositional phrase primarily appear with concrete and countable possessums. Both existential PPCs call for an animate, most often pronominal, possessor. The u + genitive was the rarest type of PPC in LPS, though it had undoubtedly grammaticalized as a PPC.

  4. 50 CFR 20.38 - Possession of live birds.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Possession of live birds. 20.38 Section 20... WILDLIFE AND PLANTS (CONTINUED) MIGRATORY BIRD HUNTING Possession § 20.38 Possession of live birds. Every migratory game bird wounded by hunting and reduced to possession by the hunter shall be immediately...

  5. Process and Programming Analysis of Cylindrical External Thread Machining in NC Turning——Taking Fanuc0i System as An Example%数控车削圆柱外螺纹加工工艺及编程分析——以fanuc0i系统为例

    Institute of Scientific and Technical Information of China (English)

    苏兆兴; 陈之林

    2015-01-01

    圆柱形外螺纹是日常生活中常见的一种螺纹,在机械装备中应用比较广泛. 我们通常熟悉的螺纹加工方法很多,但最为常见的就是螺纹车削加工. 为了提高零件的加工速度和加工质量,现代化机械加工更多采用了数控车削螺纹的方式进行加工. 而基于fanuc0i系统的螺纹加工编程指令有G32、G92、G76三种,通过对圆柱外螺纹进行工艺分析,通过G32、G92、G76三种不同的编程比较,得出当加工螺距<3 mm的螺纹,采用G32指令加工的螺纹精度较高,而采用G92指令属于矩形循环加工方式,其程序简化;G76更适用于大螺距螺纹的加工,一般情况加工先采用G76指令粗加工后续采用G32指令或者G92指令精加工更为合理.%Cylindrical external thread is a common thread in daily life , and widely used in machinery and equip-ments.There are a lot of the common thread processing methods , in which the thread turning process is the most common.In order to improve the machining speed and machining quality of parts , in modern mechanical pro-cessing the numerical control turning method is more commonly used for thread turning processing .There are 3 thread process programming instructions G 32, G92, G76 for fanuc0i system.On the basis of analysis of cylindri-cal external thread machining process and comparison of the 3 different programming instructions , it was conclu-ded that for processing thread with pitch <3mm, thread machining precision with G32 instructions is better, and machining with G92 instructions belong to the rectangular loop processing method , and its programming is simpli-fied.Machining with G76 is more suitable for the large pitch screw thread processing , generally processing with G76 instruction for rough machining at first , and then finishing with G32 or G92 instructions is more reasonable .

  6. Machine testning

    DEFF Research Database (Denmark)

    De Chiffre, Leonardo

    This document is used in connection with a laboratory exercise of 3 hours duration as a part of the course GEOMETRICAL METROLOGY AND MACHINE TESTING. The exercise includes a series of tests carried out by the student on a conventional and a numerically controled lathe, respectively. This document...

  7. Representational Machines

    DEFF Research Database (Denmark)

    Petersson, Dag; Dahlgren, Anna; Vestberg, Nina Lager

    to the enterprises of the medium. This is the subject of Representational Machines: How photography enlists the workings of institutional technologies in search of establishing new iconic and social spaces. Together, the contributions to this edited volume span historical epochs, social environments, technological...

  8. e-Learning Application for Machine Maintenance Process using Iterative Method in XYZ Company

    Science.gov (United States)

    Nurunisa, Suaidah; Kurniawati, Amelia; Pramuditya Soesanto, Rayinda; Yunan Kurnia Septo Hediyanto, Umar

    2016-02-01

    XYZ Company is a company based on manufacturing part for airplane, one of the machine that is categorized as key facility in the company is Millac 5H6P. As a key facility, the machines should be assured to work well and in peak condition, therefore, maintenance process is needed periodically. From the data gathering, it is known that there are lack of competency from the maintenance staff to maintain different type of machine which is not assigned by the supervisor, this indicate that knowledge which possessed by maintenance staff are uneven. The purpose of this research is to create knowledge-based e-learning application as a realization from externalization process in knowledge transfer process to maintain the machine. The application feature are adjusted for maintenance purpose using e-learning framework for maintenance process, the content of the application support multimedia for learning purpose. QFD is used in this research to understand the needs from user. The application is built using moodle with iterative method for software development cycle and UML Diagram. The result from this research is e-learning application as sharing knowledge media for maintenance staff in the company. From the test, it is known that the application make maintenance staff easy to understand the competencies.

  9. Adding machine and calculating machine

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1642 the French mathematician Blaise Pascal(1623-1662) invented a machine;.that could add and subtract. It had.wheels that each had: 1 to 10 marked off along its circumference. When the wheel at the right, representing units, made one complete circle, it engaged the wheel to its left, represents tens, and moved it forward one notch.

  10. External Otitis (Swimmer's Ear)

    Science.gov (United States)

    ... to Pneumococcal Vaccine Additional Content Medical News External Otitis (Swimmer's Ear) By Bradley W. Kesser, MD, Associate ... the Outer Ear Ear Blockages Ear Tumors External Otitis (Swimmer's Ear) Malignant External Otitis Perichondritis External otitis ...

  11. Genesis machines

    CERN Document Server

    Amos, Martyn

    2014-01-01

    Silicon chips are out. Today's scientists are using real, wet, squishy, living biology to build the next generation of computers. Cells, gels and DNA strands are the 'wetware' of the twenty-first century. Much smaller and more intelligent, these organic computers open up revolutionary possibilities. Tracing the history of computing and revealing a brave new world to come, Genesis Machines describes how this new technology will change the way we think not just about computers - but about life itself.

  12. Investigating the Impact of Possession-Way of a Smartphone on Action Recognition †

    Science.gov (United States)

    Kim, Zae Myung; Jeong, Young-Seob; Oh, Hyung Rai; Oh, Kyo-Joong; Lim, Chae-Gyun; Iraqi, Youssef; Choi, Ho-Jin

    2016-01-01

    For the past few decades, action recognition has been attracting many researchers due to its wide use in a variety of applications. Especially with the increasing number of smartphone users, many studies have been conducted using sensors within a smartphone. However, a lot of these studies assume that the users carry the device in specific ways such as by hand, in a pocket, in a bag, etc. This paper investigates the impact of providing an action recognition system with the information of the possession-way of a smartphone, and vice versa. The experimental dataset consists of five possession-ways (hand, backpack, upper-pocket, lower-pocket, and shoulder-bag) and two actions (walking and running) gathered by seven users separately. Various machine learning models including recurrent neural network architectures are employed to explore the relationship between the action recognition and the possession-way recognition. The experimental results show that the assumption of possession-ways of smartphones do affect the performance of action recognition, and vice versa. The results also reveal that a good performance is achieved when both actions and possession-ways are recognized simultaneously. PMID:27271623

  13. Investigating the Impact of Possession-Way of a Smartphone on Action Recognition

    Directory of Open Access Journals (Sweden)

    Zae Myung Kim

    2016-06-01

    Full Text Available For the past few decades, action recognition has been attracting many researchers due to its wide use in a variety of applications. Especially with the increasing number of smartphone users, many studies have been conducted using sensors within a smartphone. However, a lot of these studies assume that the users carry the device in specific ways such as by hand, in a pocket, in a bag, etc. This paper investigates the impact of providing an action recognition system with the information of the possession-way of a smartphone, and vice versa. The experimental dataset consists of five possession-ways (hand, backpack, upper-pocket, lower-pocket, and shoulder-bag and two actions (walking and running gathered by seven users separately. Various machine learning models including recurrent neural network architectures are employed to explore the relationship between the action recognition and the possession-way recognition. The experimental results show that the assumption of possession-ways of smartphones do affect the performance of action recognition, and vice versa. The results also reveal that a good performance is achieved when both actions and possession-ways are recognized simultaneously.

  14. Simulating Turing machines on Maurer machines

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2008-01-01

    In a previous paper, we used Maurer machines to model and analyse micro-architectures. In the current paper, we investigate the connections between Turing machines and Maurer machines with the purpose to gain an insight into computability issues relating to Maurer machines. We introduce ways to

  15. Environmentally Friendly Machining

    CERN Document Server

    Dixit, U S; Davim, J Paulo

    2012-01-01

    Environment-Friendly Machining provides an in-depth overview of environmentally-friendly machining processes, covering numerous different types of machining in order to identify which practice is the most environmentally sustainable. The book discusses three systems at length: machining with minimal cutting fluid, air-cooled machining and dry machining. Also covered is a way to conserve energy during machining processes, along with useful data and detailed descriptions for developing and utilizing the most efficient modern machining tools. Researchers and engineers looking for sustainable machining solutions will find Environment-Friendly Machining to be a useful volume.

  16. 20 CFR 404.1093 - Possession of the United States.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Possession of the United States. 404.1093... Income § 404.1093 Possession of the United States. In using the exclusions from gross income provided under section 931 of the Code (relating to income from sources within possessions of the United...

  17. 31 CFR 0.215 - Possession of weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Possession of weapons and explosives... OF THE TREASURY EMPLOYEE RULES OF CONDUCT Rules of Conduct § 0.215 Possession of weapons and explosives. (a) Employees shall not possess firearms, explosives, or other dangerous or deadly weapons...

  18. 50 CFR 20.39 - Termination of possession.

    Science.gov (United States)

    2010-10-01

    ... WILDLIFE AND PLANTS (CONTINUED) MIGRATORY BIRD HUNTING Possession § 20.39 Termination of possession. Subject to all other requirements of this part, the possession of birds taken by any hunter shall be... consigned for transport by the Postal Service or a common carrier to some person other than the hunter. ...

  19. Machine Transliteration

    CERN Document Server

    Knight, K; Knight, Kevin; Graehl, Jonathan

    1997-01-01

    It is challenging to translate names and technical terms across languages with different alphabets and sound inventories. These items are commonly transliterated, i.e., replaced with approximate phonetic equivalents. For example, "computer" in English comes out as "konpyuutaa" in Japanese. Translating such items from Japanese back to English is even more challenging, and of practical interest, as transliterated items make up the bulk of text phrases not found in bilingual dictionaries. We describe and evaluate a method for performing backwards transliterations by machine. This method uses a generative model, incorporating several distinct stages in the transliteration process.

  20. Machine Protection

    CERN Document Server

    Schmidt, R

    2014-01-01

    The protection of accelerator equipment is as old as accelerator technology and was for many years related to high-power equipment. Examples are the protection of powering equipment from overheating (magnets, power converters, high-current cables), of superconducting magnets from damage after a quench and of klystrons. The protection of equipment from beam accidents is more recent. It is related to the increasing beam power of high-power proton accelerators such as ISIS, SNS, ESS and the PSI cyclotron, to the emission of synchrotron light by electron–positron accelerators and FELs, and to the increase of energy stored in the beam (in particular for hadron colliders such as LHC). Designing a machine protection system requires an excellent understanding of accelerator physics and operation to anticipate possible failures that could lead to damage. Machine protection includes beam and equipment monitoring, a system to safely stop beam operation (e.g. dumping the beam or stopping the beam at low energy) and an ...

  1. Dissociative trance and spirit possession: Challenges for cultures in transition.

    Science.gov (United States)

    Bhavsar, Vishal; Ventriglio, Antonio; Bhugra, Dinesh

    2016-12-01

    The cross-cultural validity of dissociative possession and trance disorders is a matter of some debate, limiting research and meaningful interpretation of prevalence data. Intimate to these concerns is the status of spirit possession categories studied in the social sciences, particularly anthropology. These two categories are phenomenologically related and display similar epidemiological associations. In India, dissociative and conversion disorders are fairly common in clinical settings. There is no doubt that there are true cultural variations in possession and trance disorders. A new framework may enable clinicians to better understand possession states and spirit possession. © 2016 The Authors. Psychiatry and Clinical Neurosciences © 2016 Japanese Society of Psychiatry and Neurology.

  2. Analysis of machining and machine tools

    CERN Document Server

    Liang, Steven Y

    2016-01-01

    This book delivers the fundamental science and mechanics of machining and machine tools by presenting systematic and quantitative knowledge in the form of process mechanics and physics. It gives readers a solid command of machining science and engineering, and familiarizes them with the geometry and functionality requirements of creating parts and components in today’s markets. The authors address traditional machining topics, such as: single and multiple point cutting processes grinding components accuracy and metrology shear stress in cutting cutting temperature and analysis chatter They also address non-traditional machining, such as: electrical discharge machining electrochemical machining laser and electron beam machining A chapter on biomedical machining is also included. This book is appropriate for advanced undergraduate and graduate mechani cal engineering students, manufacturing engineers, and researchers. Each chapter contains examples, exercises and their solutions, and homework problems that re...

  3. Instructions to Adopt an External Focus Enhance Muscular Endurance

    Science.gov (United States)

    Marchant, David C.; Greig, Matt; Bullough, Jonathan; Hitchen, Daniel

    2011-01-01

    The influence of internal (movement focus) and external (outcome focus) attentional-focusing instructions on muscular endurance were investigated using three exercise protocols with experienced exercisers. Twenty-three participants completed a maximal repetition, assisted bench-press test on a Smith's machine. An external focus of attention…

  4. Automation of printing machine

    OpenAIRE

    Sušil, David

    2016-01-01

    Bachelor thesis is focused on the automation of the printing machine and comparing the two types of printing machines. The first chapter deals with the history of printing, typesettings, printing techniques and various kinds of bookbinding. The second chapter describes the difference between sheet-fed printing machines and offset printing machines, the difference between two representatives of rotary machines, technological process of the products on these machines, the description of the mac...

  5. Machine musicianship

    Science.gov (United States)

    Rowe, Robert

    2002-05-01

    The training of musicians begins by teaching basic musical concepts, a collection of knowledge commonly known as musicianship. Computer programs designed to implement musical skills (e.g., to make sense of what they hear, perform music expressively, or compose convincing pieces) can similarly benefit from access to a fundamental level of musicianship. Recent research in music cognition, artificial intelligence, and music theory has produced a repertoire of techniques that can make the behavior of computer programs more musical. Many of these were presented in a recently published book/CD-ROM entitled Machine Musicianship. For use in interactive music systems, we are interested in those which are fast enough to run in real time and that need only make reference to the material as it appears in sequence. This talk will review several applications that are able to identify the tonal center of musical material during performance. Beyond this specific task, the design of real-time algorithmic listening through the concurrent operation of several connected analyzers is examined. The presentation includes discussion of a library of C++ objects that can be combined to perform interactive listening and a demonstration of their capability.

  6. The External Degree.

    Science.gov (United States)

    Houle, Cyril O.

    This book examines the external degree in relation to the extremes of attitudes, myths, and data. Emphasis is placed on the emergence of the American external degree, foreign external-degree programs, the purpose of the external degree, the current scene, institutional issues, and problems of general policy. (MJM)

  7. Pre-Posed Possessive Constructions in Russian and Polish

    Science.gov (United States)

    Houle, Erik Richard

    2013-01-01

    In Contemporary Standard Russian (CSR) and Contemporary Standard Polish (CSP) nominal possession is conveyed by means of the adnominal genitive. In this construction the dependent follows the noun it modifies and is marked morphologically for possession in the genitive case. The head noun is marked morphologically for any one of the six…

  8. The Relationship between Social Capital and Weapon Possession on Campus

    Science.gov (United States)

    Messer, Rachel H.; Bradley, Kristopher I.; Calvi, Jessica L.; Kennison, Shelia M.

    2012-01-01

    The present research focused on the problem of how college officials might be able to predict weapon possession on college campuses. We hypothesized that measures of social capital (i.e., trust and participation in society) may be useful in identifying individuals who are likely to possess weapons on campuses. Prior research has shown that those…

  9. The Meaning of Cherished Personal Possessions for the Elderly

    Science.gov (United States)

    Sherman, Edmund; Newman, Evelyn S.

    1977-01-01

    In this exploratory study, 94 elderly persons, in seven senior service centers and one nursing home, were interviewed to identify and ascertain the meaning of cherished possessions in later years. Lack of cherished possessions was associated with low life satisfaction scores, a suggested indicator of poor adjustment to old age. (Author)

  10. 19 CFR 123.62 - Baggage in possession of traveler.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Baggage in possession of traveler. 123.62 Section 123.62 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT... traveler. For baggage arriving in the actual possession of a traveler, his declaration shall be accepted in...

  11. Electrical machines mathematical fundamentals of machine topologies

    CERN Document Server

    Gerling, Dieter

    2015-01-01

    Electrical Machines and Drives play a powerful role in industry with an ever increasing importance. This fact requires the understanding of machine and drive principles by engineers of many different disciplines. Therefore, this book is intended to give a comprehensive deduction of these principles. Special attention is given to the precise mathematical derivation of the necessary formulae to calculate machines and drives and to the discussion of simplifications (if applied) with the associated limits. The book shows how the different machine topologies can be deduced from general fundamentals, and how they are linked together. This book addresses graduate students, researchers, and developers of Electrical Machines and Drives, who are interested in getting knowledge about the principles of machine and drive operation and in detecting the mathematical and engineering specialties of the different machine and drive topologies together with their mutual links. The detailed - but nevertheless compact - mat...

  12. Laser machining of advanced materials

    CERN Document Server

    Dahotre, Narendra B

    2011-01-01

    Advanced materialsIntroductionApplicationsStructural ceramicsBiomaterials CompositesIntermetallicsMachining of advanced materials IntroductionFabrication techniquesMechanical machiningChemical Machining (CM)Electrical machiningRadiation machining Hybrid machiningLaser machiningIntroductionAbsorption of laser energy and multiple reflectionsThermal effectsLaser machining of structural ceramicsIntrodu

  13. Molecular machines open cell membranes

    Science.gov (United States)

    García-López, Víctor; Chen, Fang; Nilewski, Lizanne G.; Duret, Guillaume; Aliyan, Amir; Kolomeisky, Anatoly B.; Robinson, Jacob T.; Wang, Gufeng; Pal, Robert; Tour, James M.

    2017-08-01

    Beyond the more common chemical delivery strategies, several physical techniques are used to open the lipid bilayers of cellular membranes. These include using electric and magnetic fields, temperature, ultrasound or light to introduce compounds into cells, to release molecular species from cells or to selectively induce programmed cell death (apoptosis) or uncontrolled cell death (necrosis). More recently, molecular motors and switches that can change their conformation in a controlled manner in response to external stimuli have been used to produce mechanical actions on tissue for biomedical applications. Here we show that molecular machines can drill through cellular bilayers using their molecular-scale actuation, specifically nanomechanical action. Upon physical adsorption of the molecular motors onto lipid bilayers and subsequent activation of the motors using ultraviolet light, holes are drilled in the cell membranes. We designed molecular motors and complementary experimental protocols that use nanomechanical action to induce the diffusion of chemical species out of synthetic vesicles, to enhance the diffusion of traceable molecular machines into and within live cells, to induce necrosis and to introduce chemical species into live cells. We also show that, by using molecular machines that bear short peptide addends, nanomechanical action can selectively target specific cell-surface recognition sites. Beyond the in vitro applications demonstrated here, we expect that molecular machines could also be used in vivo, especially as their design progresses to allow two-photon, near-infrared and radio-frequency activation.

  14. The deleuzian abstract machines

    DEFF Research Database (Denmark)

    Werner Petersen, Erik

    2005-01-01

    production. In Kafka: Toward a Minor Literature, Deleuze and Guatari gave the most comprehensive explanation to the abstract machine in the work of art. Like the war-machines of Virilio, the Kafka-machine operates in three gears or speeds. Furthermore, the machine is connected to spatial diagrams...

  15. Social Ontology Documentation for Knowledge Externalization

    Science.gov (United States)

    Aranda-Corral, Gonzalo A.; Borrego-Díaz, Joaquín; Jiménez-Mavillard, Antonio

    Knowledge externalization and organization is a major challenge that companies must face. Also, they have to ask whether is possible to enhance its management. Mechanical processing of information represents a chance to carry out these tasks, as well as to turn intangible knowledge assets into real assets. Machine-readable knowledge provides a basis to enhance knowledge management. A promising approach is the empowering of Knowledge Externalization by the community (users, employees). In this paper, a social semantic tool (called OntoxicWiki) for enhancing the quality of knowledge is presented.

  16. Regulating multiple externalities

    DEFF Research Database (Denmark)

    Waldo, Staffan; Jensen, Frank; Nielsen, Max

    2016-01-01

    Open access is a well-known externality problem in fisheries causing excess capacity and overfishing. Due to global warming, externality problems from CO2 emissions have gained increased interest. With two externality problems, a first-best optimum can be achieved by using two regulatory instrume......Open access is a well-known externality problem in fisheries causing excess capacity and overfishing. Due to global warming, externality problems from CO2 emissions have gained increased interest. With two externality problems, a first-best optimum can be achieved by using two regulatory...

  17. Possession as an institute of civil law in Kosovo

    Directory of Open Access Journals (Sweden)

    Kaltrinë Haliti

    2016-03-01

    Full Text Available Social interest and main aim of this paper is to introduce a proper problematic of this institute, given that after the war in Kosovo, numerous usurpations have occurred. A vast number of related cases are pending to be solved which at first impression seem to be unimportant. However, having such cases unsolved which are deliberately categorized as proceedings of an urgent need by the legislator, frequently resulted with serious consequences as well as commission of major crimes. Today, the approach that obstruction of possession is a factual power over an item prevails, which provides a legal contribution pursuant to law and enjoys civil-legal protection. A crucial legal contribution of possession is its court protection in case of obstruction by unlawful self-judgment. Possession also enjoys independent protection of a right over an item. Given that possession itself is not a right whatsoever, herewith we may conclude that obstruction of possession constitutes infringement of no rights. However, should the obstruction to possession is committed violently, such possession constitutes the right’s infringement provided that every violent act is unlawful, and thus it is correctly protected by an interdict claim.

  18. ExternE National Implementation Finland

    Energy Technology Data Exchange (ETDEWEB)

    Pingoud, K.; Maelkki, H.; Wihersaari, M.; Pirilae, P. [VTT Energy, Espoo (Finland); Hongisto, M. [Imatran Voima Oy, Vantaa (Finland); Siitonen, S. [Ekono Energy Ltd, Espoo (Finland); Johansson, M. [Finnish Environment Institute, Helsinki (Finland)

    1999-07-01

    ExternE National Implementation is a continuation of the ExternE Project, funded in part by the European Commission's Joule III Programme. This study is the result of the ExternE National Implementation Project for Finland. Three fuel cycles were selected for the Finnish study: coal, peat and wood-derived biomass, which together are responsible for about 40% of total electricity generation in Finland and about 75% of the non-nuclear fuel based generation. The estimated external costs or damages were dominated by the global warming (GW) impacts in the coal and peat fuel cycles, but knowledge of the true GW impacts is still uncertain. From among other impacts that were valued in monetary terms the human health damages due to airborne emissions dominated in all the three fuel cycles. Monetary valuation for ecosystem impacts is not possible using the ExternE methodology at present. The Meri-Pori power station representing the coal fuel cycle is one of the world's cleanest and most efficient coal-fired power plants with a condensing turbine. The coal is imported mainly from Poland. The estimated health damages were about 4 mECU/kWh, crop damages an order of magnitude lower and damages caused to building materials two orders of magnitude lower. The power stations of the peat and biomass fuel cycles are of CHP type, generating electricity and heat for the district heating systems of two cities. Their fuels are of domestic origin. The estimated health damages allocated to electricity generation were about 5 and 6 mECU/kWh, respectively. The estimates were case-specific and thus an generalisation of the results to the whole electricity generation in Finland is unrealistic. Despite the uncertainties and limitations of the methodology, it is a promising tool in the comparison of similar kinds of fuel cycles, new power plants and pollution abatement technologies and different plant locations with each other. (orig.)

  19. Non-equilibrium quantum heat machines

    Science.gov (United States)

    Alicki, Robert; Gelbwaser-Klimovsky, David

    2015-11-01

    Standard heat machines (engine, heat pump, refrigerator) are composed of a system (working fluid) coupled to at least two equilibrium baths at different temperatures and periodically driven by an external device (piston or rotor) sometimes called the work reservoir. The aim of this paper is to go beyond this scheme by considering environments which are stationary but cannot be decomposed into a few baths at thermal equilibrium. Such situations are important, for example in solar cells, chemical machines in biology, various realizations of laser cooling or nanoscopic machines driven by laser radiation. We classify non-equilibrium baths depending on their thermodynamic behavior and show that the efficiency of heat machines powered by them is limited by the generalized Carnot bound.

  20. Molecular Dynamics of Materials Possessing High Energy Content.

    Science.gov (United States)

    1988-01-26

    I -RI90 634 MOLECULAR DYNAMICS OF MATERIALS POSSESSING HIGH ENERGY 1/1 r CONTENTCU) COLUMBIA UNIV MENd YORK N J TURRO 26 JAN GO I RFOSR-TR-88-0168...Bolling Air Force Base, D.C. 2 61102F_ 2303 I B2 11 T,TL.E (Inciuoe Security Classification) Molecular Dynamics of Materials Possessing High Energy...York 10027 (212) 280-2175 TITLE: MOLECULAR DYNAMICS OF MATERIALS POSSESSING HIGH ENERGY CONTENT .. 0 0 88 2 ... "" ’% ,i u , . .. .. ....... ŝ" ;! ,i

  1. Must an inventor "possess" an invention to patent it?

    Science.gov (United States)

    Woessner, Warren D; Chadwick, Robin A

    2014-09-18

    The requirements for patenting inventions relating to biotechnology have become increasingly strict and complicated in recent years. Despite early patent rulings that there is no need for an inventor to "reduce to practice" an invention, the courts are now ruling that an inventor must "possess" his or her invention before filing for patent. This review discusses what such "possession" may mean and describes decisions in which courts have found that an inventor has met or failed the possession test before filing for patent protection. Copyright © 2014 Cold Spring Harbor Laboratory Press; all rights reserved.

  2. ASH External Web Portal (External Portal) -

    Data.gov (United States)

    Department of Transportation — The ASH External Web Portal is a web-based portal that provides single sign-on functionality, making the web portal a single location from which to be authenticated...

  3. Isolation and synthesis of polyoxygenated dibenzofurans possessing biological activity.

    Science.gov (United States)

    Love, Brian E

    2015-06-01

    Reports from the past ten years describing the isolation and/or synthesis of bioactive dibenzofurans possessing three or more oxygen-containing substituents are reviewed. Dibenzofuranoquinones are included in the review.

  4. The concept possession hypothesis of self-consciousness.

    Science.gov (United States)

    Savanah, Stephane

    2012-06-01

    This paper presents the hypothesis that concept possession is sufficient and necessary for self-consciousness. If this is true it provides a yardstick for gauging the validity of different research paradigms in which claims for self-consciousness in animals or human infants are made: a convincing demonstration of concept possession in a research subject, such as a display of inferential reasoning, may be taken as conclusive evidence of self-consciousness. Intuitively, there appears to be a correlation between intelligence in animals (which presupposes concept possession) and the existence of self-consciousness. I present three discussions to support the hypothesis: an analogy between perception and conception, where both are self-specifying; an argument that any web of concepts will always include the self-concept; and a fresh interpretation of Bermũdez (1998) showing how his theory of non-conceptual content provides strong support for the concept possession hypothesis.

  5. 50 CFR 648.52 - Possession and landing limits.

    Science.gov (United States)

    2010-10-01

    ..., or possess more than 50 bu (17.6 hL) of in-shell scallops shoreward of the VMS Demarcation Line. Such....2 hL) of in-shell scallops seaward of the VMS demarcation line on a properly declared IFQ scallop... vessel may possess up to 50 bu (17.6 hL) of in-shell scallops seaward of the VMS demarcation line on...

  6. Machine tool structures

    CERN Document Server

    Koenigsberger, F

    1970-01-01

    Machine Tool Structures, Volume 1 deals with fundamental theories and calculation methods for machine tool structures. Experimental investigations into stiffness are discussed, along with the application of the results to the design of machine tool structures. Topics covered range from static and dynamic stiffness to chatter in metal cutting, stability in machine tools, and deformations of machine tool structures. This volume is divided into three sections and opens with a discussion on stiffness specifications and the effect of stiffness on the behavior of the machine under forced vibration c

  7. Music Emotion Detection Using Hierarchical Sparse Kernel Machines

    OpenAIRE

    Yu-Hao Chin; Chang-Hong Lin; Ernestasia Siahaan; Jia-Ching Wang

    2014-01-01

    For music emotion detection, this paper presents a music emotion verification system based on hierarchical sparse kernel machines. With the proposed system, we intend to verify if a music clip possesses happiness emotion or not. There are two levels in the hierarchical sparse kernel machines. In the first level, a set of acoustical features are extracted, and principle component analysis (PCA) is implemented to reduce the dimension. The acoustical features are utilized to generate the first-l...

  8. Confined Chemical Etching for Electrochemical Machining with Nanoscale Accuracy.

    Science.gov (United States)

    Zhan, Dongping; Han, Lianhuan; Zhang, Jie; Shi, Kang; Zhou, Jian-Zhang; Tian, Zhao-Wu; Tian, Zhong-Qun

    2016-11-15

    In the past several decades, electrochemical machining (ECM) has enjoyed the reputation of a powerful technique in the manufacturing industry. Conventional ECM methods can be classified as electrolytic machining and electroforming: the former is based on anodic dissolution and the latter is based on cathodic deposition of metallic materials. Strikingly, ECM possesses several advantages over mechanical machining, such as high removal rate, the capability of making complex three-dimensional structures, and the practicability for difficult-to-cut materials. Additionally, ECM avoids tool wear and thermal or mechanical stress on machining surfaces. Thus, ECM is widely used for various industrial applications in the fields of aerospace, automobiles, electronics, etc. Nowadays, miniaturization and integration of functional components are becoming significant in ultralarge scale integration (ULSI) circuits, microelectromechanical systems (MEMS), and miniaturized total analysis systems (μ-TAS). As predicted by Moore's law, the feature size of interconnectors in ULSI circuits are down to several nanometers. In this Account, we present our perseverant research in the last two decades on how to "confine" the ECM processes to occur at micrometer or even nanometer scale, that is, to ensure ECM with nanoscale accuracy. We have been developing the confined etchant layer technique (CELT) to fabricate three-dimensional micro- and nanostructures (3D-MNS) on different metals and semiconductor materials since 1992. In general, there are three procedures in CELT: (1) generating the etchant on the surface of the tool electrode by electrochemical or photoelectrochemical reactions; (2) confining the etchant in a depleted layer with a thickness of micro- or nanometer scale; (3) feeding the tool electrode to etch the workpiece. Scavengers, which can react with the etchant, are usually adopted to form a confined etchant layer. Through the subsequent homogeneous reaction between the scavenger

  9. Design of Demining Machines

    CERN Document Server

    Mikulic, Dinko

    2013-01-01

    In constant effort to eliminate mine danger, international mine action community has been developing safety, efficiency and cost-effectiveness of clearance methods. Demining machines have become necessary when conducting humanitarian demining where the mechanization of demining provides greater safety and productivity. Design of Demining Machines describes the development and testing of modern demining machines in humanitarian demining.   Relevant data for design of demining machines are included to explain the machinery implemented and some innovative and inspiring development solutions. Development technologies, companies and projects are discussed to provide a comprehensive estimate of the effects of various design factors and to proper selection of optimal parameters for designing the demining machines.   Covering the dynamic processes occurring in machine assemblies and their components to a broader understanding of demining machine as a whole, Design of Demining Machines is primarily tailored as a tex...

  10. Applied machining technology

    CERN Document Server

    Tschätsch, Heinz

    2010-01-01

    Machining and cutting technologies are still crucial for many manufacturing processes. This reference presents all important machining processes in a comprehensive and coherent way. It includes many examples of concrete calculations, problems and solutions.

  11. Machining with abrasives

    CERN Document Server

    Jackson, Mark J

    2011-01-01

    Abrasive machining is key to obtaining the desired geometry and surface quality in manufacturing. This book discusses the fundamentals and advances in the abrasive machining processes. It provides a complete overview of developing areas in the field.

  12. Women, Men, and Machines.

    Science.gov (United States)

    Form, William; McMillen, David Byron

    1983-01-01

    Data from the first national study of technological change show that proportionately more women than men operate machines, are more exposed to machines that have alienating effects, and suffer more from the negative effects of technological change. (Author/SSH)

  13. Machine medical ethics

    CERN Document Server

    Pontier, Matthijs

    2015-01-01

    The essays in this book, written by researchers from both humanities and sciences, describe various theoretical and experimental approaches to adding medical ethics to a machine in medical settings. Medical machines are in close proximity with human beings, and getting closer: with patients who are in vulnerable states of health, who have disabilities of various kinds, with the very young or very old, and with medical professionals. In such contexts, machines are undertaking important medical tasks that require emotional sensitivity, knowledge of medical codes, human dignity, and privacy. As machine technology advances, ethical concerns become more urgent: should medical machines be programmed to follow a code of medical ethics? What theory or theories should constrain medical machine conduct? What design features are required? Should machines share responsibility with humans for the ethical consequences of medical actions? How ought clinical relationships involving machines to be modeled? Is a capacity for e...

  14. Brain versus Machine Control.

    Directory of Open Access Journals (Sweden)

    Jose M Carmena

    2004-12-01

    Full Text Available Dr. Octopus, the villain of the movie "Spiderman 2", is a fusion of man and machine. Neuroscientist Jose Carmena examines the facts behind this fictional account of a brain- machine interface

  15. The possessions at Loudun: tracking the discourse of dissociation.

    Science.gov (United States)

    Stephenson, Craig E

    2017-09-01

    Embedded in the history of dissociation is the best known case of possession in European history, the 17(th) century possessions at Loudun, France (1632-1638). The exorcisms and the trial drew crowds from all over Europe, the outcome prefiguring the direction in which the Western science of mind would be carried. The published debate about the possessed and obsessed Ursuline nuns of Loudun spans four centuries. One can track how theorizing about dissociation changed over time, with psychological contributions by Jean Martin Charcot, Georges Gilles de la Tourette, Pierre Janet, Michel Foucault and Michel de Certeau. Freud's psychoanalytic notion of demonological neurosis emphasized defensive strategies and a diabolic parody of adulthood. Jung's concepts of demonism and possession highlighted dissociated complexes that assimilate the ego and unseat the self, rendering a life 'provisional'. Dissociation as possession provides a through-line in Jung's Collected Works, from his 1902 dissertation to one of the last essays he wrote, in 1961. Within the context of psychotherapy, therapists and patients work towards psychological containment, consciously reorienting themselves to the presence of unconscious factors, personifying, embodying and thereby incorporating images of dissociated Otherness into the experience of selfhood. © 2017, The Society of Analytical Psychology.

  16. A Universal Reactive Machine

    DEFF Research Database (Denmark)

    Andersen, Henrik Reif; Mørk, Simon; Sørensen, Morten U.

    1997-01-01

    Turing showed the existence of a model universal for the set of Turing machines in the sense that given an encoding of any Turing machine asinput the universal Turing machine simulates it. We introduce the concept of universality for reactive systems and construct a CCS processuniversal...

  17. Provable data possession for securing the data from untrusted server

    Directory of Open Access Journals (Sweden)

    S.Karthikeyan

    2015-03-01

    Full Text Available The model described for the use of Provable data Possession which allow the client to access the stored data at an Untrusted server that the server possesses the original data without retrieving it. This model executes the probabilistic proof of possession by random set of blocks which is derived from the server that dramatically reduces the cost of I/O. Sometimes the Client maintenance the constant amount of data which is used to verify the proof. The response protocol can transmit a small amount of data, which can minimize network communication. The two provably –Securer PDP Schemes presents more efficient schemes than previous solution .Even when compared with schemes that achieve weaker guarantees. It is the widely distributed storage systems. Using the experiment we can implement and verify the practicality of PDP and we can revel that the performance of the PDP that is bounded by disk I/O and that cannot be determined by computation.

  18. Emotional regulation, attachment to possessions and hoarding symptoms.

    Science.gov (United States)

    Phung, Philip J; Moulding, Richard; Taylor, Jasmine K; Nedeljkovic, Maja

    2015-10-01

    This study aimed to test which particular facets of emotion regulation (ER) are most linked to symptoms of hoarding disorder, and whether beliefs about emotional attachment to possessions (EA) mediate this relationship. A non-clinical sample of 150 participants (108 females) completed questionnaires of emotional tolerance (distress tolerance, anxiety sensitivity, negative urgency - impulsivity when experiencing negative emotions), depressed mood, hoarding, and beliefs about emotional attachment to possessions. While all emotional tolerance measures related to hoarding, when considered together and controlling for depression and age, anxiety sensitivity and urgency were the significant predictors. Anxiety sensitivity was fully mediated, and urgency partially mediated, via beliefs regarding emotional attachment to possessions. These findings provide further support for (1) the importance of anxiety sensitivity and negative urgency for hoarding symptoms, and (2) the view that individuals with HD symptoms may rely on items for emotion regulation, leading to stronger beliefs that items are integral to emotional wellbeing.

  19. External radiation surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Antonio, E.J.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report describes how external radiation was measured, how surveys were performed, and the results of these measurements and surveys. External radiation exposure rates were measured at locations on and off the Hanford Site using thermoluminescent dosimeters (TLD). External radiation and contamination surveys were also performed with portable radiation survey instruments at locations on and around the Hanford Site.

  20. The Relationship Between Underage Alcohol Possession and Future Criminal Behavior

    Directory of Open Access Journals (Sweden)

    Chris Barnum

    2012-01-01

    Full Text Available This study examines the relationship between underage alcohol possession and criminal behavior through a cohort, age, and period analysis. Utilizing the Age–Period Cohort Characteristic (APCC models method and national arrest data, while controlling for age and period effects, this study examined single-year age cohorts and determines that strict enforcement of PULA (Possession Under Legal Age laws decreases the likelihood of strongly correlated vandalism and assaults as young adults. The analysis indicates an increase in assaults and vandalism as cohort size increases, but little effect from single parent, resource deprivation.

  1. Asynchronized synchronous machines

    CERN Document Server

    Botvinnik, M M

    1964-01-01

    Asynchronized Synchronous Machines focuses on the theoretical research on asynchronized synchronous (AS) machines, which are "hybrids” of synchronous and induction machines that can operate with slip. Topics covered in this book include the initial equations; vector diagram of an AS machine; regulation in cases of deviation from the law of full compensation; parameters of the excitation system; and schematic diagram of an excitation regulator. The possible applications of AS machines and its calculations in certain cases are also discussed. This publication is beneficial for students and indiv

  2. Quantum machine learning.

    Science.gov (United States)

    Biamonte, Jacob; Wittek, Peter; Pancotti, Nicola; Rebentrost, Patrick; Wiebe, Nathan; Lloyd, Seth

    2017-09-13

    Fuelled by increasing computer power and algorithmic advances, machine learning techniques have become powerful tools for finding patterns in data. Quantum systems produce atypical patterns that classical systems are thought not to produce efficiently, so it is reasonable to postulate that quantum computers may outperform classical computers on machine learning tasks. The field of quantum machine learning explores how to devise and implement quantum software that could enable machine learning that is faster than that of classical computers. Recent work has produced quantum algorithms that could act as the building blocks of machine learning programs, but the hardware and software challenges are still considerable.

  3. Precision machine design

    CERN Document Server

    Slocum, Alexander H

    1992-01-01

    This book is a comprehensive engineering exploration of all the aspects of precision machine design - both component and system design considerations for precision machines. It addresses both theoretical analysis and practical implementation providing many real-world design case studies as well as numerous examples of existing components and their characteristics. Fast becoming a classic, this book includes examples of analysis techniques, along with the philosophy of the solution method. It explores the physics of errors in machines and how such knowledge can be used to build an error budget for a machine, how error budgets can be used to design more accurate machines.

  4. 32 CFR 552.128 - Requirements for possession and use.

    Science.gov (United States)

    2010-07-01

    ... RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Control of Firearms, Ammunition and Other Dangerous Weapons on Fort Gordon § 552.128 Requirements for possession and use. All... installation, or after obtaining the weapon, except: (1) Firearms legally brought onto the installation for...

  5. The Feminist Thoughts Embodied in the Epics of Possession

    Institute of Scientific and Technical Information of China (English)

    吴艳玲

    2008-01-01

    In this paper,features of the feminist thoughts embodied in Possession analyzed and readers are led to a mythological world centered onthree female characters in three epics in order to state the feminist thoughys in the epics.Byatt's feminist thoughts are highlighted here.

  6. Dynamics of the spirit possession phenomenon in Eastern Tanzania

    Directory of Open Access Journals (Sweden)

    Marja-Liisa Swantz

    1976-01-01

    Full Text Available The discussion on the spirit possession phenomenon is related in this study to the more general question of the role of religious institutions as part in the development process of a people living in a limited geographical area of a wider national society. It is assumed that religion, like culture in general, has its specific institutional forms as result of the historical development of a society, but at the same time religion is a force shaping that history. People's cultural resources influence their social and economic development and form a potential creative element in it'. Some of the questions to be asked are: "How are specific religious practices related to the dynamics of change in the societies in question? What is the social and religious context in which the spirit possession phenomenon occurs in them? What social and economic relations get their expression in them? To what extent is spirit possession in this case a means of exerting values and creatively overcoming a crisis or conflict which the changing social and economic relations impose on the people? The established spirit possession cults are here seen as the institutional forms of religious experience. At the same time it becomes evident that there is institutionalization in process as well as deinstitutionalization of spirit possession where it occurs outside established institutional forms. Institution is taken as a socially shared form of behaviour the significance of which is commonly recognized by those who share it. By the term spirit possession cult is meant a ritual form of spirit possession of a group which is loosely organized and without strict membership. The context of the study is four ethnic groups in Eastern Tanzania, near the coast of the Indian Ocean. The general theme of the project is The Role of Culture in the Restructuring of Tanzanian Rural Areas. The restructuring refers to a villagisation programme carried out in the whole country. People are being

  7. Perspex machine: VII. The universal perspex machine

    Science.gov (United States)

    Anderson, James A. D. W.

    2006-01-01

    The perspex machine arose from the unification of projective geometry with the Turing machine. It uses a total arithmetic, called transreal arithmetic, that contains real arithmetic and allows division by zero. Transreal arithmetic is redefined here. The new arithmetic has both a positive and a negative infinity which lie at the extremes of the number line, and a number nullity that lies off the number line. We prove that nullity, 0/0, is a number. Hence a number may have one of four signs: negative, zero, positive, or nullity. It is, therefore, impossible to encode the sign of a number in one bit, as floating-point arithmetic attempts to do, resulting in the difficulty of having both positive and negative zeros and NaNs. Transrational arithmetic is consistent with Cantor arithmetic. In an extension to real arithmetic, the product of zero, an infinity, or nullity with its reciprocal is nullity, not unity. This avoids the usual contradictions that follow from allowing division by zero. Transreal arithmetic has a fixed algebraic structure and does not admit options as IEEE, floating-point arithmetic does. Most significantly, nullity has a simple semantics that is related to zero. Zero means "no value" and nullity means "no information." We argue that nullity is as useful to a manufactured computer as zero is to a human computer. The perspex machine is intended to offer one solution to the mind-body problem by showing how the computable aspects of mind and, perhaps, the whole of mind relates to the geometrical aspects of body and, perhaps, the whole of body. We review some of Turing's writings and show that he held the view that his machine has spatial properties. In particular, that it has the property of being a 7D lattice of compact spaces. Thus, we read Turing as believing that his machine relates computation to geometrical bodies. We simplify the perspex machine by substituting an augmented Euclidean geometry for projective geometry. This leads to a general

  8. Active vibration isolation of high precision machines

    CERN Document Server

    Collette, C; Artoos, K; Hauviller, C

    2010-01-01

    This paper provides a review of active control strategies used to isolate high precisionmachines (e.g. telescopes, particle colliders, interferometers, lithography machines or atomic force microscopes) from external disturbances. The objective of this review is to provide tools to develop the best strategy for a given application. Firstly, the main strategies are presented and compared, using single degree of freedom models. Secondly, the case of huge structures constituted of a large number of elements, like particle colliders or segmented telescopes, is considered.

  9. Support vector machine applied in QSAR modelling

    Institute of Scientific and Technical Information of China (English)

    MEI Hu; ZHOU Yuan; LIANG Guizhao; LI Zhiliang

    2005-01-01

    Support vector machine (SVM), partial least squares (PLS), and Back-Propagation artificial neural network (ANN) were employed to establish QSAR models of 2 dipeptide datasets. In order to validate predictive capabilities on external dataset of the resulting models, both internal and external validations were performed. The division of dataset into both training and test sets was carried out by D-optimal design. The results showed that support vector machine (SVM) behaved well in both calibration and prediction. For the dataset of 48 bitter tasting dipeptides (BTD), the results obtained by support vector regression (SVR) were superior to that by PLS in both calibration and prediction. When compared with BP artificial neural network, SVR showed less calibration power but more predictive capability. For the dataset of angiotensin-converting enzyme (ACE) inhibitors, the results obtained by support vector machine (SVM) regression were equivalent to those by PLS and BP artificial neural network. In both datasets, SVR using linear kernel function behaved well as that using radial basis kernel function. The results showed that there is wide prospect for the application of support vector machine (SVM) into QSAR modeling.

  10. Optical vs. chemical driving for molecular machines.

    Science.gov (United States)

    Astumian, R D

    2016-12-22

    Molecular machines use external energy to drive transport, to do mechanical, osmotic, or electrical work on the environment, and to form structure. In this paper the fundamental difference between the design principles necessary for a molecular machine to use light or external modulation of thermodynamic parameters as an energy source vs. the design principle for using an exergonic chemical reaction as a fuel will be explored. The key difference is that for catalytically-driven motors microscopic reversibility must hold arbitrarily far from equilibrium. Applying the constraints of microscopic reversibility assures that a coarse grained model is consistent with an underlying model for motion on a single time-independent potential energy surface. In contrast, light-driven processes, and processes driven by external modulation of the thermodynamic parameters of a system cannot in general be described in terms of motion on a single time-independent potential energy surface, and the rate constants are not constrained by microscopic reversibility. The results presented here call into question the value of the so-called power stroke model as an explanation of the function of autonomous chemically-driven molecular machines such as are commonly found in biology.

  11. Design of the Bruce and Darlington universal delivery machine heads

    Energy Technology Data Exchange (ETDEWEB)

    Gray, M.G. [GE Canada Nuclear Products, Peterborough, Ontario (Canada)]. E-mail: mike.gray@cdnnuc.ge.com; Brown, R. [OPG Inspection Services Div., Bruce Nuclear Power Development, Tiverton, Ontario (Canada)

    2003-07-01

    The Universal Delivery Machine was designed and supplied to reduce the time required to perform channel inspection services. The Bruce UDM was the first to be completed followed by Pickering and Darlington. The Bruce and Darlington machines are nearly identical. Design concepts applied include a rotating, multiple tool station magazine, a rigid chain driving telescoping rams, a common drive package, and an external support frame to meet seismic qualification requirements. (author)

  12. Universal delivery machine - design of the Bruce and Darlington heads

    Energy Technology Data Exchange (ETDEWEB)

    Gray, M.G. [GE Canada Nuclear Products, Peterborough, Ontario (Canada); Brown, R. [OPG Inspection Services Division and Bruce Nuclear Power Development, Toronto, Ontario (Canada)

    2003-12-01

    The Universal Delivery Machine (UDM) was designed and supplied to reduce the time required to perform channel inspection services. The Bruce UDM was the first to be completed followed by Pickering and Darlington. The Bruce and Darlington machines are nearly identical. Design concepts applied include a rotating, multiple tool station magazine, a rigid chain driving telescoping rams, a common drive package, and an external support frame to meet seismic qualification requirements. (author)

  13. STRUCTURAL THERMODYNAMIC ANALYSIS OF VAPOR COMPRESSION REFRIGERATION MACHINE

    OpenAIRE

    Д. Х. ХАРЛАМПИДИ; Тарасова, В. А.

    2014-01-01

    Reported about a method for conducting a structural analysis of the thermodynamic refrigerating machine on the basis of separation exergy of destruction on the external and internal independent parts, as well as removable and its components are inevitable. The methodology has allowed complex take into account the influence on the efficiency of the refrigerating machine thermal-hydraulic losses and estimates the components of the exergy destruction in the basic elements. The analysis of charac...

  14. The Regulation of the Possession of Weapons at Gatherings

    Directory of Open Access Journals (Sweden)

    Pieter du Toit

    2013-12-01

    Full Text Available The Dangerous Weapons Act 15 of 2013 provides for certain prohibitions and restrictions in respect of the possession of a dangerous weapon and it repeals the Dangerous Weapons Act 71 of 1968 as well as the different Dangerous Weapons Acts in operation in the erstwhile TBVC States. The Act also amends the Regulation of Gatherings Act 205 of 1993 to prohibit the possession of any dangerous weapon at a gathering or demonstration. The Dangerous Weapons Act provides for a uniform system of law governing the use of dangerous weapons for the whole of South Africa and it furthermore no longer places the onus on the individual charged with the offence of the possession of a dangerous weapon to show that he or she did not have any intention of using the firearm for an unlawful purpose. The Act also defines the meaning of a dangerous weapon. According to our court’s interpretation of the Dangerous Weapons Act 71 of 1968 a dangerous weapon was regarded as an object used or intended to be used as a weapon even if it had not been designed for use as a weapon. The Act, however, requires the object to be capable of causing death or inflicting serious bodily harm if it were used for an unlawful purpose. The possession of a dangerous weapon, in circumstances which may raise a reasonable suspicion that the person intends to use it for an unlawful purpose, attracts criminal liability. The Act also provides a useful set of guidelines to assist courts to determine if a person charged with the offence of the possession of a dangerous weapon had indeed intended to use the weapon for an unlawful purpose. It seems, however, that the Act prohibits the possession of a dangerous weapon at gatherings, even if the person carrying the weapon does not intend to use it for an unlawful purpose. The state will, however, have to prove that the accused had the necessary control over the object and the intention to exercise such control, as well as that the object is capable of

  15. Machinability of advanced materials

    CERN Document Server

    Davim, J Paulo

    2014-01-01

    Machinability of Advanced Materials addresses the level of difficulty involved in machining a material, or multiple materials, with the appropriate tooling and cutting parameters.  A variety of factors determine a material's machinability, including tool life rate, cutting forces and power consumption, surface integrity, limiting rate of metal removal, and chip shape. These topics, among others, and multiple examples comprise this research resource for engineering students, academics, and practitioners.

  16. Pattern recognition & machine learning

    CERN Document Server

    Anzai, Y

    1992-01-01

    This is the first text to provide a unified and self-contained introduction to visual pattern recognition and machine learning. It is useful as a general introduction to artifical intelligence and knowledge engineering, and no previous knowledge of pattern recognition or machine learning is necessary. Basic for various pattern recognition and machine learning methods. Translated from Japanese, the book also features chapter exercises, keywords, and summaries.

  17. Support vector machines applications

    CERN Document Server

    Guo, Guodong

    2014-01-01

    Support vector machines (SVM) have both a solid mathematical background and good performance in practical applications. This book focuses on the recent advances and applications of the SVM in different areas, such as image processing, medical practice, computer vision, pattern recognition, machine learning, applied statistics, business intelligence, and artificial intelligence. The aim of this book is to create a comprehensive source on support vector machine applications, especially some recent advances.

  18. Machining of titanium alloys

    CERN Document Server

    2014-01-01

    This book presents a collection of examples illustrating the resent research advances in the machining of titanium alloys. These materials have excellent strength and fracture toughness as well as low density and good corrosion resistance; however, machinability is still poor due to their low thermal conductivity and high chemical reactivity with cutting tool materials. This book presents solutions to enhance machinability in titanium-based alloys and serves as a useful reference to professionals and researchers in aerospace, automotive and biomedical fields.

  19. Possession and Immoveable Property: The History of Two Connected Concepts

    Directory of Open Access Journals (Sweden)

    César Carranza-Álvarez

    2010-11-01

    Full Text Available Possession and property are two different sides of the same coin. The two institutions have the same axis: the benefit, mainly economic, of a good. In countries like Colombia and Peru, important reforms have been introduced whose main effect has been the following one: the approach to these two institutions. In this article we will speak of these two institutions, today more than ever, connected.

  20. Rotating electrical machines

    CERN Document Server

    Le Doeuff, René

    2013-01-01

    In this book a general matrix-based approach to modeling electrical machines is promulgated. The model uses instantaneous quantities for key variables and enables the user to easily take into account associations between rotating machines and static converters (such as in variable speed drives).   General equations of electromechanical energy conversion are established early in the treatment of the topic and then applied to synchronous, induction and DC machines. The primary characteristics of these machines are established for steady state behavior as well as for variable speed scenarios. I

  1. Chaotic Boltzmann machines.

    Science.gov (United States)

    Suzuki, Hideyuki; Imura, Jun-ichi; Horio, Yoshihiko; Aihara, Kazuyuki

    2013-01-01

    The chaotic Boltzmann machine proposed in this paper is a chaotic pseudo-billiard system that works as a Boltzmann machine. Chaotic Boltzmann machines are shown numerically to have computing abilities comparable to conventional (stochastic) Boltzmann machines. Since no randomness is required, efficient hardware implementation is expected. Moreover, the ferromagnetic phase transition of the Ising model is shown to be characterised by the largest Lyapunov exponent of the proposed system. In general, a method to relate probabilistic models to nonlinear dynamics by derandomising Gibbs sampling is presented.

  2. Tribology in machine design

    CERN Document Server

    Stolarski, Tadeusz

    1999-01-01

    ""Tribology in Machine Design is strongly recommended for machine designers, and engineers and scientists interested in tribology. It should be in the engineering library of companies producing mechanical equipment.""Applied Mechanics ReviewTribology in Machine Design explains the role of tribology in the design of machine elements. It shows how algorithms developed from the basic principles of tribology can be used in a range of practical applications within mechanical devices and systems.The computer offers today's designer the possibility of greater stringen

  3. Debugging the virtual machine

    Energy Technology Data Exchange (ETDEWEB)

    Miller, P.; Pizzi, R.

    1994-09-02

    A computer program is really nothing more than a virtual machine built to perform a task. The program`s source code expresses abstract constructs using low level language features. When a virtual machine breaks, it can be very difficult to debug because typical debuggers provide only low level machine implementation in formation to the software engineer. We believe that the debugging task can be simplified by introducing aspects of the abstract design into the source code. We introduce OODIE, an object-oriented language extension that allows programmers to specify a virtual debugging environment which includes the design and abstract data types of the virtual machine.

  4. Electrical machines & drives

    CERN Document Server

    Hammond, P

    1985-01-01

    Containing approximately 200 problems (100 worked), the text covers a wide range of topics concerning electrical machines, placing particular emphasis upon electrical-machine drive applications. The theory is concisely reviewed and focuses on features common to all machine types. The problems are arranged in order of increasing levels of complexity and discussions of the solutions are included where appropriate to illustrate the engineering implications. This second edition includes an important new chapter on mathematical and computer simulation of machine systems and revised discussions o

  5. Machine learning with R

    CERN Document Server

    Lantz, Brett

    2013-01-01

    Written as a tutorial to explore and understand the power of R for machine learning. This practical guide that covers all of the need to know topics in a very systematic way. For each machine learning approach, each step in the process is detailed, from preparing the data for analysis to evaluating the results. These steps will build the knowledge you need to apply them to your own data science tasks.Intended for those who want to learn how to use R's machine learning capabilities and gain insight from your data. Perhaps you already know a bit about machine learning, but have never used R; or

  6. Induction machine handbook

    CERN Document Server

    Boldea, Ion

    2002-01-01

    Often called the workhorse of industry, the advent of power electronics and advances in digital control are transforming the induction motor into the racehorse of industrial motion control. Now, the classic texts on induction machines are nearly three decades old, while more recent books on electric motors lack the necessary depth and detail on induction machines.The Induction Machine Handbook fills industry's long-standing need for a comprehensive treatise embracing the many intricate facets of induction machine analysis and design. Moving gradually from simple to complex and from standard to

  7. Externally Verifiable Oblivious RAM

    Directory of Open Access Journals (Sweden)

    Gancher Joshua

    2017-04-01

    Full Text Available We present the idea of externally verifiable oblivious RAM (ORAM. Our goal is to allow a client and server carrying out an ORAM protocol to have disputes adjudicated by a third party, allowing for the enforcement of penalties against an unreliable or malicious server. We give a security definition that guarantees protection not only against a malicious server but also against a client making false accusations. We then give modifications of the Path ORAM [15] and Ring ORAM [9] protocols that meet this security definition. These protocols both have the same asymptotic runtimes as the semi-honest original versions and require the external verifier to be involved only when the client or server deviates from the protocol. Finally, we implement externally verified ORAM, along with an automated cryptocurrency contract to use as the external verifier.

  8. External Beam Therapy (EBT)

    Science.gov (United States)

    ... Esophageal Cancer Treatment Head and Neck Cancer Treatment Lung Cancer Treatment Prostate Cancer Treatment Brain Tumor Treatment Why is ... Radiation Oncology) Breast Cancer Treatment Esophageal Cancer Treatment Lung Cancer Treatment Images related to External Beam Therapy (EBT) Sponsored ...

  9. MALIGNANT EXTERNAL OTITIS

    OpenAIRE

    Massoud Moghaddam

    1993-01-01

    Two case reports of malignant external otitis in the elderly diabetics and their complications and management with regard to our experience at Amir Alam Hospital, Department of ENT will be discussed here.

  10. Checklists for external validity

    DEFF Research Database (Denmark)

    Dyrvig, Anne-Kirstine; Kidholm, Kristian; Gerke, Oke;

    2014-01-01

    RATIONALE, AIMS AND OBJECTIVES: The quality of the current literature on external validity varies considerably. An improved checklist with validated items on external validity would aid decision-makers in judging similarities among circumstances when transferring evidence from a study setting...... to an implementation setting. In this paper, currently available checklists on external validity are identified, assessed and used as a basis for proposing a new improved instrument. METHOD: A systematic literature review was carried out in Pubmed, Embase and Cinahl on English-language papers without time restrictions....... The retrieved checklist items were assessed for (i) the methodology used in primary literature, justifying inclusion of each item; and (ii) the number of times each item appeared in checklists. RESULTS: Fifteen papers were identified, presenting a total of 21 checklists for external validity, yielding a total...

  11. Expanding the Framework of Internal and External Validity in Quantitative Research.

    Science.gov (United States)

    Onwuegbuzie, Anthony J.

    An experiment is deemed to be valid, inasmuch as valid cause-effect relationships are established, if the results are due only to the manipulated independent variable (possess internal validity) and are generalizable to groups, environments, and contexts outside of the experimental settings (possess external validity). Consequently, all…

  12. Migration with fiscal externalities.

    Science.gov (United States)

    Hercowitz, Z; Pines, D

    1991-11-01

    "This paper analyses the distribution of a country's population among regions when migration involves fiscal externalities. The main question addressed is whether a decentralized decision making [by] regional governments can produce an optimal population distribution...or a centralized intervention is indispensable, as argued before in the literature.... It turns out that, while with costless mobility the fiscal externality is fully internalized by voluntary interregional transfers, with costly mobility, centrally coordinated transfers still remain indispensable for achieving the socially optimal allocation."

  13. Sen cycles and externalities

    OpenAIRE

    Piggins, Ashley; Salerno, Gillian

    2016-01-01

    It has long been understood that externalities of some kind are responsible for Sen’s (1970) theorem on the impossibility of a Paretian liberal. However, Saari and Petron (2006) show that for any social preference cycle generated by combining the weak Pareto principle and individual decisiveness, every decisive individual must suffer at least one strong negative externality. We show that this fundamental result only holds when individual preferences are strict. Building on their contribution,...

  14. Virtual machine vs Real Machine: Security Systems

    Directory of Open Access Journals (Sweden)

    Dr. C. Suresh Gnana Das

    2009-08-01

    Full Text Available This paper argues that the operating system and applications currently running on a real machine should relocate into a virtual machine. This structure enables services to be added below the operating system and to do so without trusting or modifying the operating system or applications. To demonstrate the usefulness of this structure, we describe three services that take advantage of it: secure logging, intrusion prevention and detection, and environment migration. In particular, we can provide services below the guest operating system without trusting or modifying it. We believe providing services at this layer are especially useful for enhancing security and mobility. This position paper describes the general benefits and challenges that arise from running most applications in a virtual machine, and then describes some example services and alternative ways to provide those services.

  15. Stirling machine operating experience

    Energy Technology Data Exchange (ETDEWEB)

    Ross, B. [Stirling Technology Co., Richland, WA (United States); Dudenhoefer, J.E. [Lewis Research Center, Cleveland, OH (United States)

    1994-09-01

    Numerous Stirling machines have been built and operated, but the operating experience of these machines is not well known. It is important to examine this operating experience in detail, because it largely substantiates the claim that stirling machines are capable of reliable and lengthy operating lives. The amount of data that exists is impressive, considering that many of the machines that have been built are developmental machines intended to show proof of concept, and are not expected to operate for lengthy periods of time. Some Stirling machines (typically free-piston machines) achieve long life through non-contact bearings, while other Stirling machines (typically kinematic) have achieved long operating lives through regular seal and bearing replacements. In addition to engine and system testing, life testing of critical components is also considered. The record in this paper is not complete, due to the reluctance of some organizations to release operational data and because several organizations were not contacted. The authors intend to repeat this assessment in three years, hoping for even greater participation.

  16. Perpetual Motion Machine

    Directory of Open Access Journals (Sweden)

    D. Tsaousis

    2008-01-01

    Full Text Available Ever since the first century A.D. there have been relative descriptions of known devices as well as manufactures for the creation of perpetual motion machines. Although physics has led, with two thermodynamic laws, to the opinion that a perpetual motion machine is impossible to be manufactured, inventors of every age and educational level appear to claim that they have invented something «entirely new» or they have improved somebody else’s invention, which «will function henceforth perpetually»! However the fact of the failure in manufacturing a perpetual motion machine till now, it does not mean that countless historical elements for these fictional machines become indifferent. The discussion on every version of a perpetual motion machine on the one hand gives the chance to comprehend the inventor’s of each period level of knowledge and his way of thinking, and on the other hand, to locate the points where this «perpetual motion machine» clashes with the laws of nature and that’s why it is impossible to have been manufactured or have functioned. The presentation of a new «perpetual motion machine» has excited our interest to locate its weak points. According to the designer of it the machine functions with the work produced by the buoyant force

  17. Machine Intelligence and Explication

    NARCIS (Netherlands)

    Wieringa, Roelf J.

    1987-01-01

    This report is an MA ("doctoraal") thesis submitted to the department of philosophy, university of Amsterdam. It attempts to answer the question whether machines can think by conceptual analysis. Ideally. a conceptual analysis should give plausible explications of the concepts of "machine" and "inte

  18. Microsoft Azure machine learning

    CERN Document Server

    Mund, Sumit

    2015-01-01

    The book is intended for those who want to learn how to use Azure Machine Learning. Perhaps you already know a bit about Machine Learning, but have never used ML Studio in Azure; or perhaps you are an absolute newbie. In either case, this book will get you up-and-running quickly.

  19. Reactive Turing machines

    NARCIS (Netherlands)

    Baeten, J.C.M.; Luttik, B.; Tilburg, P.J.A. van

    2013-01-01

    We propose reactive Turing machines (RTMs), extending classical Turing machines with a process-theoretical notion of interaction, and use it to define a notion of executable transition system. We show that every computable transition system with a bounded branching degree is simulated modulo diverge

  20. Machine Intelligence and Explication

    NARCIS (Netherlands)

    Wieringa, Roel

    1987-01-01

    This report is an MA ("doctoraal") thesis submitted to the department of philosophy, university of Amsterdam. It attempts to answer the question whether machines can think by conceptual analysis. Ideally. a conceptual analysis should give plausible explications of the concepts of "machine" and "inte

  1. Coordinate measuring machines

    DEFF Research Database (Denmark)

    De Chiffre, Leonardo

    This document is used in connection with three exercises of 2 hours duration as a part of the course GEOMETRICAL METROLOGY AND MACHINE TESTING. The exercises concern three aspects of coordinate measuring: 1) Measuring and verification of tolerances on coordinate measuring machines, 2) Traceability...

  2. Simple Machine Junk Cars

    Science.gov (United States)

    Herald, Christine

    2010-01-01

    During the month of May, the author's eighth-grade physical science students study the six simple machines through hands-on activities, reading assignments, videos, and notes. At the end of the month, they can easily identify the six types of simple machine: inclined plane, wheel and axle, pulley, screw, wedge, and lever. To conclude this unit,…

  3. Human Machine Learning Symbiosis

    Science.gov (United States)

    Walsh, Kenneth R.; Hoque, Md Tamjidul; Williams, Kim H.

    2017-01-01

    Human Machine Learning Symbiosis is a cooperative system where both the human learner and the machine learner learn from each other to create an effective and efficient learning environment adapted to the needs of the human learner. Such a system can be used in online learning modules so that the modules adapt to each learner's learning state both…

  4. Machine learning with R

    CERN Document Server

    Lantz, Brett

    2015-01-01

    Perhaps you already know a bit about machine learning but have never used R, or perhaps you know a little R but are new to machine learning. In either case, this book will get you up and running quickly. It would be helpful to have a bit of familiarity with basic programming concepts, but no prior experience is required.

  5. 15 CFR 700.31 - Metalworking machines.

    Science.gov (United States)

    2010-01-01

    ... Drilling and tapping machines Electrical discharge, ultrasonic and chemical erosion machines Forging..., power driven Machining centers and way-type machines Manual presses Mechanical presses, power...

  6. LHC Report: machine development

    CERN Multimedia

    Rogelio Tomás García for the LHC team

    2015-01-01

    Machine development weeks are carefully planned in the LHC operation schedule to optimise and further study the performance of the machine. The first machine development session of Run 2 ended on Saturday, 25 July. Despite various hiccoughs, it allowed the operators to make great strides towards improving the long-term performance of the LHC.   The main goals of this first machine development (MD) week were to determine the minimum beam-spot size at the interaction points given existing optics and collimation constraints; to test new beam instrumentation; to evaluate the effectiveness of performing part of the beam-squeezing process during the energy ramp; and to explore the limits on the number of protons per bunch arising from the electromagnetic interactions with the accelerator environment and the other beam. Unfortunately, a series of events reduced the machine availability for studies to about 50%. The most critical issue was the recurrent trip of a sextupolar corrector circuit –...

  7. Micro-machining.

    Science.gov (United States)

    Brinksmeier, Ekkard; Preuss, Werner

    2012-08-28

    Manipulating bulk material at the atomic level is considered to be the domain of physics, chemistry and nanotechnology. However, precision engineering, especially micro-machining, has become a powerful tool for controlling the surface properties and sub-surface integrity of the optical, electronic and mechanical functional parts in a regime where continuum mechanics is left behind and the quantum nature of matter comes into play. The surprising subtlety of micro-machining results from the extraordinary precision of tools, machines and controls expanding into the nanometre range-a hundred times more precise than the wavelength of light. In this paper, we will outline the development of precision engineering, highlight modern achievements of ultra-precision machining and discuss the necessity of a deeper physical understanding of micro-machining.

  8. Introduction to machine learning.

    Science.gov (United States)

    Baştanlar, Yalin; Ozuysal, Mustafa

    2014-01-01

    The machine learning field, which can be briefly defined as enabling computers make successful predictions using past experiences, has exhibited an impressive development recently with the help of the rapid increase in the storage capacity and processing power of computers. Together with many other disciplines, machine learning methods have been widely employed in bioinformatics. The difficulties and cost of biological analyses have led to the development of sophisticated machine learning approaches for this application area. In this chapter, we first review the fundamental concepts of machine learning such as feature assessment, unsupervised versus supervised learning and types of classification. Then, we point out the main issues of designing machine learning experiments and their performance evaluation. Finally, we introduce some supervised learning methods.

  9. ATST telescope mount: telescope of machine tool

    Science.gov (United States)

    Jeffers, Paul; Stolz, Günter; Bonomi, Giovanni; Dreyer, Oliver; Kärcher, Hans

    2012-09-01

    The Advanced Technology Solar Telescope (ATST) will be the largest solar telescope in the world, and will be able to provide the sharpest views ever taken of the solar surface. The telescope has a 4m aperture primary mirror, however due to the off axis nature of the optical layout, the telescope mount has proportions similar to an 8 meter class telescope. The technology normally used in this class of telescope is well understood in the telescope community and has been successfully implemented in numerous projects. The world of large machine tools has developed in a separate realm with similar levels of performance requirement but different boundary conditions. In addition the competitive nature of private industry has encouraged development and usage of more cost effective solutions both in initial capital cost and thru-life operating cost. Telescope mounts move relatively slowly with requirements for high stability under external environmental influences such as wind buffeting. Large machine tools operate under high speed requirements coupled with high application of force through the machine but with little or no external environmental influences. The benefits of these parallel development paths and the ATST system requirements are being combined in the ATST Telescope Mount Assembly (TMA). The process of balancing the system requirements with new technologies is based on the experience of the ATST project team, Ingersoll Machine Tools who are the main contractor for the TMA and MT Mechatronics who are their design subcontractors. This paper highlights a number of these proven technologies from the commercially driven machine tool world that are being introduced to the TMA design. Also the challenges of integrating and ensuring that the differences in application requirements are accounted for in the design are discussed.

  10. Environmental external effects from wind power based on the EU ExternE methodology

    DEFF Research Database (Denmark)

    Ibsen, Liselotte Schleisner; Nielsen, Per Sieverts

    1998-01-01

    The European Commission has launched a major study project, ExternE, to develop a methodology to quantify externalities. A “National Implementation Phase”, was started under the Joule II programme with the purpose of implementing the ExternE methodology in all member states. The main objective...

  11. Systematization of accuracy indices variance when modelling the forming external cylindrical turning process

    Science.gov (United States)

    Balabanov, I. P.; Simonova, L. A.; Balabanova, O. N.

    2015-06-01

    The article considers the problem of accuracy deviation systematization for external cylindrical turning, proposed a hierarchical approach to the evaluation of these deviations, an approach to the analysis of nesting accuracy metrics, as well as, the common scheme of identification of deviations of the accuracy metrics for party billets in external machining were proposed.

  12. Externality or sustainability economics?

    Energy Technology Data Exchange (ETDEWEB)

    Bergh, Jeroen C.J.M. van den [ICREA, Barcelona (Spain); Department of Economics and Economic History and Institute for Environmental Science and Technology, Universitat Autonoma de Barcelona (Spain)

    2010-09-15

    In an effort to develop 'sustainability economics' Baumgaertner and Quaas (2010) neglect the central concept of environmental economics-'environmental externality'. This note proposes a possible connection between the concepts of environmental externality and sustainability. In addition, attention is asked for other aspects of 'sustainability economics', namely the distinction weak/strong sustainability, spatial sustainability and sustainable trade, distinctive sustainability policy, and the ideas of early 'sustainability economists'. I argue that both sustainability and externalities reflect a systems perspective and propose that effective sustainability solutions require that more attention is given to system feedbacks, notably other-regarding preferences and social interactions, and energy and environmental rebound. The case of climate change and policy is used to illustrate particular statements. As a conclusion, a list of 20 insights and suggestions for research is offered. (author)

  13. Metasurface external cavity laser

    Energy Technology Data Exchange (ETDEWEB)

    Xu, Luyao, E-mail: luyaoxu.ee@ucla.edu; Curwen, Christopher A.; Williams, Benjamin S. [Department of Electrical Engineering, University of California, Los Angeles, California 90095 (United States); California NanoSystems Institute, University of California, Los Angeles, California 90095 (United States); Hon, Philip W. C.; Itoh, Tatsuo [Department of Electrical Engineering, University of California, Los Angeles, California 90095 (United States); Chen, Qi-Sheng [Northrop Grumman Aerospace Systems, Redondo Beach, California 90278 (United States)

    2015-11-30

    A vertical-external-cavity surface-emitting-laser is demonstrated in the terahertz range, which is based upon an amplifying metasurface reflector composed of a sub-wavelength array of antenna-coupled quantum-cascade sub-cavities. Lasing is possible when the metasurface reflector is placed into a low-loss external cavity such that the external cavity—not the sub-cavities—determines the beam properties. A near-Gaussian beam of 4.3° × 5.1° divergence is observed and an output power level >5 mW is achieved. The polarized response of the metasurface allows the use of a wire-grid polarizer as an output coupler that is continuously tunable.

  14. CHRISTIAN SYMBOLISM IN FYODOR DOSTOEVSKY'S NOVEL "THE POSSESSED" ("DEMONS"

    Directory of Open Access Journals (Sweden)

    Sergei Leonidovich Sharakov

    2013-11-01

    Full Text Available The article raises a question of Christian symbolism in Fyodor Dostoevsky’s novel The Possessed (Demons. The introductory part identifies the purpose of a symbol in Christian poetics through the parallel with ancient symbolism. The author makes a conclusion that the functional role of a symbol in the ancient world and Christian tradition is different. Therefore, the ancient symbol involves a number of interrelated categories, such as fate, intuition or conjecture, inspiration, and predictions. Christian symbolism is based on the idea of redemption and moral innocence. Methodologically, the article is based on a cultural and historical approach, as well as on the comparative academic tradition. The overview of Dostoyevsky’s pre-materials for The Possessed (Demons enables us to suggest the use of Christian symbolism in this novel. Hence, the objective of the study is to investigate a composition of images and symbols in this piece of writing, with a special focus on the image of a chronicler since the storyline of the novel is developed through his perception. We make a supposition that there are several levels of Gospel perception in the artistic vision or consciousness of the chronicler, that form the basis of the symbolical composition of the novel. The article sequentially examines the examples of Christian symbolism, including the connection of ideas, characters and storylines of the novel with the Gospel. Then it gives evidence and reasons for the thesis that the Gospel gives the characters of the novel the grounds for shaping their destiny.

  15. Do individuals with Williams syndrome possess absolute pitch?

    Science.gov (United States)

    Martínez-Castilla, Pastora; Sotillo, María; Campos, Ruth

    2013-01-01

    Although absolute pitch (AP) is a rare skill in typical development, individuals with Williams syndrome (WS) are often referred to as possessing this musical ability. However, there is paucity of research on the topic. In this article, 2 studies were conducted to evaluate AP in WS. In Study 1, seven musically trained individuals with WS, 14 musically trained typically developing controls matched for chronological age, and 2 experienced musicians with AP completed a pitch-identification task. Although the task was a classical assessment of AP, it required participants to have musical knowledge, and the availability and accessibility of musically trained individuals with WS is very low. In Study 2, a paradigm suitable for evaluating AP in individuals without musical training was used, which made it possible to evaluate a larger group of participants with WS. A pitch memory test for isolated tones was presented to 27 individuals with WS, 54 typically developing peers matched for chronological age, and the 2 musicians with AP. Both individuals with WS and their controls obtained low results in the two studies. They showed an arbitrary pattern of response, and their performance was far from that of musicians with AP. Therefore, participants with WS did not appear to possess AP. Unlike what is usually claimed, results suggest that AP is not a remarkable ability in WS and that, as in the typically developing population, this musical ability is also rare in individuals with WS.

  16. Machine Learning and Radiology

    Science.gov (United States)

    Wang, Shijun; Summers, Ronald M.

    2012-01-01

    In this paper, we give a short introduction to machine learning and survey its applications in radiology. We focused on six categories of applications in radiology: medical image segmentation, registration, computer aided detection and diagnosis, brain function or activity analysis and neurological disease diagnosis from fMR images, content-based image retrieval systems for CT or MRI images, and text analysis of radiology reports using natural language processing (NLP) and natural language understanding (NLU). This survey shows that machine learning plays a key role in many radiology applications. Machine learning identifies complex patterns automatically and helps radiologists make intelligent decisions on radiology data such as conventional radiographs, CT, MRI, and PET images and radiology reports. In many applications, the performance of machine learning-based automatic detection and diagnosis systems has shown to be comparable to that of a well-trained and experienced radiologist. Technology development in machine learning and radiology will benefit from each other in the long run. Key contributions and common characteristics of machine learning techniques in radiology are discussed. We also discuss the problem of translating machine learning applications to the radiology clinical setting, including advantages and potential barriers. PMID:22465077

  17. The basic anaesthesia machine.

    Science.gov (United States)

    Gurudatt, Cl

    2013-09-01

    After WTG Morton's first public demonstration in 1846 of use of ether as an anaesthetic agent, for many years anaesthesiologists did not require a machine to deliver anaesthesia to the patients. After the introduction of oxygen and nitrous oxide in the form of compressed gases in cylinders, there was a necessity for mounting these cylinders on a metal frame. This stimulated many people to attempt to construct the anaesthesia machine. HEG Boyle in the year 1917 modified the Gwathmey's machine and this became popular as Boyle anaesthesia machine. Though a lot of changes have been made for the original Boyle machine still the basic structure remains the same. All the subsequent changes which have been brought are mainly to improve the safety of the patients. Knowing the details of the basic machine will make the trainee to understand the additional improvements. It is also important for every practicing anaesthesiologist to have a thorough knowledge of the basic anaesthesia machine for safe conduct of anaesthesia.

  18. The basic anaesthesia machine

    Directory of Open Access Journals (Sweden)

    C L Gurudatt

    2013-01-01

    Full Text Available After WTG Morton′s first public demonstration in 1846 of use of ether as an anaesthetic agent, for many years anaesthesiologists did not require a machine to deliver anaesthesia to the patients. After the introduction of oxygen and nitrous oxide in the form of compressed gases in cylinders, there was a necessity for mounting these cylinders on a metal frame. This stimulated many people to attempt to construct the anaesthesia machine. HEG Boyle in the year 1917 modified the Gwathmey′s machine and this became popular as Boyle anaesthesia machine. Though a lot of changes have been made for the original Boyle machine still the basic structure remains the same. All the subsequent changes which have been brought are mainly to improve the safety of the patients. Knowing the details of the basic machine will make the trainee to understand the additional improvements. It is also important for every practicing anaesthesiologist to have a thorough knowledge of the basic anaesthesia machine for safe conduct of anaesthesia.

  19. Part Machinability Evaluation System

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    In the early design period, estimation of the part or the whole product machinability is useful to consider the function and process request of the product at the same time so as to globally optimize the design decision. This paper presents a part machinability evaluation system, discusses the general restrictions of part machinability, and realizes the inspection of these restrictions with the relation between tool scan space and part model. During the system development, the expansibility and understandability were considered, and an independent restriction algorithm library and a general function library were set up. Additionally, the system has an interpreter and a knowledge manager.

  20. Fundamentals of machine design

    CERN Document Server

    Karaszewski, Waldemar

    2011-01-01

    A forum of researchers, educators and engineers involved in various aspects of Machine Design provided the inspiration for this collection of peer-reviewed papers. The resultant dissemination of the latest research results, and the exchange of views concerning the future research directions to be taken in this field will make the work of immense value to all those having an interest in the topics covered. The book reflects the cooperative efforts made in seeking out the best strategies for effecting improvements in the quality and the reliability of machines and machine parts and for extending

  1. Machine Tool Software

    Science.gov (United States)

    1988-01-01

    A NASA-developed software package has played a part in technical education of students who major in Mechanical Engineering Technology at William Rainey Harper College. Professor Hack has been using (APT) Automatically Programmed Tool Software since 1969 in his CAD/CAM Computer Aided Design and Manufacturing curriculum. Professor Hack teaches the use of APT programming languages for control of metal cutting machines. Machine tool instructions are geometry definitions written in APT Language to constitute a "part program." The part program is processed by the machine tool. CAD/CAM students go from writing a program to cutting steel in the course of a semester.

  2. Analysis of synchronous machines

    CERN Document Server

    Lipo, TA

    2012-01-01

    Analysis of Synchronous Machines, Second Edition is a thoroughly modern treatment of an old subject. Courses generally teach about synchronous machines by introducing the steady-state per phase equivalent circuit without a clear, thorough presentation of the source of this circuit representation, which is a crucial aspect. Taking a different approach, this book provides a deeper understanding of complex electromechanical drives. Focusing on the terminal rather than on the internal characteristics of machines, the book begins with the general concept of winding functions, describing the placeme

  3. Database machine performance

    Energy Technology Data Exchange (ETDEWEB)

    Cesarini, F.; Salza, S.

    1987-01-01

    This book is devoted to the important problem of database machine performance evaluation. The book presents several methodological proposals and case studies, that have been developed within an international project supported by the European Economic Community on Database Machine Evaluation Techniques and Tools in the Context of the Real Time Processing. The book gives an overall view of the modeling methodologies and the evaluation strategies that can be adopted to analyze the performance of the database machine. Moreover, it includes interesting case studies and an extensive bibliography.

  4. Virtual Machine Introspection

    Directory of Open Access Journals (Sweden)

    S C Rachana

    2014-06-01

    Full Text Available Cloud computing is an Internet-based computing solution which provides the resources in an effective manner. A very serious issue in cloud computing is security which is a major obstacle for the adoption of cloud. The most important threats of cloud computing are Multitenancy, Availability, Loss of control, Loss of Data, outside attacks, DOS attacks, malicious insiders, etc. Among many security issues in cloud, the Virtual Machine Security is one of the very serious issues. Thus, monitoring of virtual machine is essential. The paper proposes a Virtual Network Introspection [VMI] System to secure the Virtual machines from Distributed Denial of Service [DDOS] and Zombie attacks.

  5. Virtual Machine Introspection

    Directory of Open Access Journals (Sweden)

    S C Rachana

    2015-11-01

    Full Text Available Cloud computing is an Internet-based computing solution which provides the resources in an effective manner. A very serious issue in cloud computing is security which is a major obstacle for the adoption of cloud. The most important threats of cloud computing are Multitenancy, Availability, Loss of control, Loss of Data, outside attacks, DOS attacks, malicious insiders, etc. Among many security issues in cloud, the Virtual Machine Security is one of the very serious issues. Thus, monitoring of virtual machine is essential. The paper proposes a Virtual Network Introspection [VMI] System to secure the Virtual machines from Distributed Denial of Service [DDOS] and Zombie attacks.

  6. Machine Learning for Hackers

    CERN Document Server

    Conway, Drew

    2012-01-01

    If you're an experienced programmer interested in crunching data, this book will get you started with machine learning-a toolkit of algorithms that enables computers to train themselves to automate useful tasks. Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through a series of hands-on case studies, instead of a traditional math-heavy presentation. Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you'll learn how to analyz

  7. Soft Machines and the Design of Perception

    DEFF Research Database (Denmark)

    Christiansen, Steen Ledet

    We humans have become soft machines in the way we extend our bodies and abilities into technological devices. I have a hard time remembering phone numbers since getting a cell phone; it remembers them for me. Likewise, much of my academic work is externalized through blogging it. This external, (im......)material form of my thought is my blog, which is not part of me. My mind is no longer confined to my body, my though process becomes virtual, so is it still me? Gray Kochar-Lindgren writes in TechnoLogics that we, as free ideal beings, are not captured against our will to be machine-assemblages but that today...... daily life consists of being cyborg. But there is more to this situation than the discussion of a cyborg existence. More important is the fact that the design of technology determines to a large extent how we as humans can use it. As David Porush argues in his book The Soft Machine, technology...

  8. Adducin family proteins possess different nuclear export potentials.

    Science.gov (United States)

    Liu, Chia-Mei; Hsu, Wen-Hsin; Lin, Wan-Yi; Chen, Hong-Chen

    2017-05-10

    The adducin (ADD) family proteins, namely ADD1, ADD2, and ADD3, are actin-binding proteins that play important roles in the stabilization of membrane cytoskeleton and cell-cell junctions. All the ADD proteins contain a highly conserved bipartite nuclear localization signal (NLS) at the carboxyl termini, but only ADD1 can localize to the nucleus. The reason for this discrepancy is not clear. To avoid the potential effect of cell-cell junctions on the distribution of ADD proteins, HA epitope-tagged ADD proteins and mutants were transiently expressed in NIH3T3 fibroblasts and their distribution in the cytoplasm and nucleus was examined by immunofluorescence staining. Several nuclear proteins were identified to interact with ADD1 by mass spectrometry, which were further verified by co-immunoprecipitation. In this study, we found that ADD1 was detectable both in the cytoplasm and nucleus, whereas ADD2 and ADD3 were detected only in the cytoplasm. However, ADD2 and ADD3 were partially (~40%) sequestered in the nucleus by leptomycin B, a CRM1/exportin1 inhibitor. Upon the removal of leptomycin B, ADD2 and ADD3 re-distributed to the cytoplasm. These results indicate that ADD2 and ADD3 possess functional NLS and are quickly transported to the cytoplasm upon entering the nucleus. Indeed, we found that ADD2 and ADD3 possess much higher potential to counteract the activity of the NLS derived from Simian virus 40 large T-antigen than ADD1. All the ADD proteins appear to contain multiple nuclear export signals mainly in their head and neck domains. However, except for the leucine-rich motif ((377)FEALMRMLDWLGYRT(391)) in the neck domain of ADD1, no other classic nuclear export signal was identified in the ADD proteins. In addition, the nuclear retention of ADD1 facilitates its interaction with RNA polymerase II and zinc-finger protein 331. Our results suggest that ADD2 and ADD3 possess functional NLS and shuttle between the cytoplasm and nucleus. The discrepancy in the

  9. A newly conceived cylinder measuring machine and methods that eliminate the spindle errors

    OpenAIRE

    Vissiere, Alain; Nouira, H; Damak, Mohamed; Gibaru, Olivier; David, Jean-Marie

    2012-01-01

    International audience; Advanced manufacturing processes require improving dimensional metrology applications to reach a nanometric accuracy level. Such measurements may be carried out using conventional highly accurate roundness measuring machines. On these machines, the metrology loop goes through the probing and the mechanical guiding elements. Hence, external forces, strain and thermal expansion are transmitted to the metrological structure through the supporting structure, thereby reduci...

  10. Stochastic Control - External Models

    DEFF Research Database (Denmark)

    Poulsen, Niels Kjølstad

    2005-01-01

    This note is devoted to control of stochastic systems described in discrete time. We are concerned with external descriptions or transfer function model, where we have a dynamic model for the input output relation only (i.e.. no direct internal information). The methods are based on LTI systems...

  11. Productivity Change and Externalities

    DEFF Research Database (Denmark)

    Kravtsova, Victoria

    2014-01-01

    firms and the economy as a whole. The approach used in the current research accounts for different internal as well as external factors that individual firms face and evaluates the effect on changes in productivity, technology as well as the efficiency of domestic firms. The empirical analysis focuses...... change in different types of firms and sectors of the economy...

  12. Multiple external root resorption.

    Science.gov (United States)

    Yusof, W Z; Ghazali, M N

    1989-04-01

    Presented is an unusual case of multiple external root resorption. Although the cause of this resorption was not determined, several possibilities are presented. Trauma from occlusion, periodontal and pulpal inflammation, and resorption of idiopathic origin are all discussed as possible causes.

  13. The Effect of Fatigued External Rotator Muscles of the Shoulder on the Shoulder Position Sense

    OpenAIRE

    Naoya Iida; Fuminari Kaneko; Nobuhiro Aoki; Yoshinari Sakaki

    2011-01-01

    This study aimed to investigate the effect of fatigue in shoulder external rotator muscles on position sense of shoulder abduction, internal rotation, and external rotation. The study included 10 healthy subjects. Shoulder position sense was measured before and after a fatigue task involving shoulder external rotator muscles. The fatigue task was performed using an isokinetic machine. To confirm the muscle fatigue, electromyography (EMG) was recorded, and an integrated EMG and median power fr...

  14. Influence of machining parameters on cutting tool life while machining aluminum alloy fly ash composite

    Science.gov (United States)

    Rao, C. R. Prakash; chandra, Poorna; Kiran, R.; Asha, P. B.

    2016-09-01

    Metal matrix composites containing fly ash as reinforcement are primarily preferred because these materials possess lower density and higher strength to weight ratio. The metal matrix composites possess hetrogeneous microstructure which is due to the presence of hard ceramic particles. While turning composites, the catastrophic failure of cutting tools is attributed to the presence of hard particles. Selection of optimal cutting conditions for a given machining process and grade of cutting tools are of utmost importance to enhance the tool life during turning operation. Thus the research work was aimed at the experimental investigation of the cutting tool life while machining aluminum alloy composite containing 0-15% fly-ash. The experiments carried out following ISO3685 standards. The carbide inserts of grade K10 and style CGGN120304 were the turning tools. The cutting speed selected was between 200m/min to 500m/min in step of 100m/min, feed of 0.08 & 0.16 mm/revolution and constant depth of cut of 1.0 mm. The experimental results revealed that the performance of K10 grade carbide insert found better while machining composite containing 5% filler, at all cutting speeds and 0.08mm/revolution feed. The failures of carbide tools are mainly due to notch wear followed by built up edge and edge chipping.

  15. Why all stars should possess circumstellar temperature inversions

    Science.gov (United States)

    Scudder, Jack D.

    1992-01-01

    The paper shows that the circumstellar temperature inversions possessed by all stars are the consequence of the 'velocity filtration' process described by Scudder (1992), according to which a stellar envelope is hotter than its underlying layers. The filtration scenario relies on the theoretically predicted and experimentally determined non-Maxwellian velocity distributions of ions and/or electrons in other sampled astrophysical plasmas and the transition region. The most immediate consequence is that the temperature and quasi-neutral plasma density become anticorrelated with increasing radius in a thin transition region, leaving the temperature profile inverted in excess of 10 exp 6 K up into a corona, without depositing a wave of magnetic field energy into the gas above the base of the transition region.

  16. Aromatic Polyurea Possessing High Electrical Energy Density and Low Loss

    Science.gov (United States)

    Thakur, Yash; Lin, Minren; Wu, Shan; Zhang, Q. M.

    2016-10-01

    We report the development of a dielectric polymer, poly (ether methyl ether urea) (PEMEU), which possesses a dielectric constant of 4 and is thermally stable up to 150°C. The experimental results show that the ether units are effective in softening the rigid polymer and making it thermally processable, while the high dipole moment of urea units and glass structure of the polymer leads to a low dielectric loss and low conduction loss. As a result, PEMEU high quality thin films can be fabricated which exhibit exceptionally high breakdown field of >1.5 GV/m, and a low conduction loss at fields up to the breakdown. Consequently, the PEMEU films exhibit a high charge-discharge efficiency of 90% and a high discharged energy density of 36 J/cm3.

  17. The Mirrored Hand Illusion: I Control, So I Possess?

    Science.gov (United States)

    Zhou, Aibao; Zhang, Yanchi; Yin, Yulong; Yang, Yang

    2015-01-01

    Certain situations may not only cause people to misjudge external information but also distort people's perception of themselves. The present study is the first to report the mirrored hand illusion which could be generated when the experimenter imitated the fist-clenching movements of the subject synchronously. The subjects formed the illusion that the experimenter's hand was "something I can control" when being imitated synchronously. In addition, a sense of ownership over the alien hand was established by integrating multisensory signals and comparing these signals with preexisting body presentations. This method might represent a new avenue for research on the formation of self-consciousness.

  18. Some relations between quantum Turing machines and Turing machines

    CERN Document Server

    Sicard, A; Sicard, Andrés; Vélez, Mario

    1999-01-01

    For quantum Turing machines we present three elements: Its components, its time evolution operator and its local transition function. The components are related with deterministic Turing machines, the time evolution operator is related with reversible Turing machines and the local transition function is related with probabilistic and reversible Turing machines.

  19. Machining of hard-to-machine materials

    OpenAIRE

    2016-01-01

    Bakalářská práce se zabývá studiem obrábění těžkoobrobitelných materiálů. V první části jsou rozděleny těžkoobrobitelné materiály a následuje jejich analýza. V další části se práce zaměřuje na problematiku obrobitelnosti jednotlivých slitin. Závěrečná část práce je věnovaná experimentu, jeho statistickému zpracování a nakonec následnému vyhodnocení. This bachelor thesis studies the machining of hard-to-machine materials. The first part of the thesis considers hard-to-machine materials and ...

  20. RNautophagy/DNautophagy possesses selectivity for RNA/DNA substrates.

    Science.gov (United States)

    Hase, Katsunori; Fujiwara, Yuuki; Kikuchi, Hisae; Aizawa, Shu; Hakuno, Fumihiko; Takahashi, Shin-Ichiro; Wada, Keiji; Kabuta, Tomohiro

    2015-07-27

    Lysosomes can degrade various biological macromolecules, including nucleic acids, proteins and lipids. Recently, we identified novel nucleic acid-degradation systems termed RNautophagy/DNautophagy (abbreviated as RDA), in which RNA and DNA are directly taken up by lysosomes in an ATP-dependent manner and degraded. We also found that a lysosomal membrane protein, LAMP2C, the cytoplasmic region of which binds to RNA and DNA, functions, at least in part, as an RNA/DNA receptor in the process of RDA. However, it has been unclear whether RDA possesses selectivity for RNA/DNA substrates and the RNA/DNA sequences that are recognized by LAMP2C have not been determined. In the present study, we found that the cytosolic region of LAMP2C binds to poly-G/dG, but not to poly-A/dA, poly-C/dC, poly-dT or poly-U. Consistent with this binding activity, poly-G/dG was transported into isolated lysosomes via RDA, while poly-A/dA, poly-C/dC, poly-dT and poly-U were not. GGGGGG or d(GGGG) sequences are essential for the interaction between poly-G/dG and LAMP2C. In addition to poly-G/dG, G/dG-rich sequences, such as a repeated GGGGCC sequence, interacted with the cytosolic region of LAMP2C. Our findings indicate that RDA does possess selectivity for RNA/DNA substrates and that at least some consecutive G/dG sequence(s) can mediate RDA. © The Author(s) 2015. Published by Oxford University Press on behalf of Nucleic Acids Research.

  1. Machine (bulk) harvest

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This is a summary of machine harvesting activities on Neal Smith National Wildlife Refuge between 1991 and 2008. Information is provided for each year about...

  2. Machine Vision Handbook

    CERN Document Server

    2012-01-01

    The automation of visual inspection is becoming more and more important in modern industry as a consistent, reliable means of judging the quality of raw materials and manufactured goods . The Machine Vision Handbook  equips the reader with the practical details required to engineer integrated mechanical-optical-electronic-software systems. Machine vision is first set in the context of basic information on light, natural vision, colour sensing and optics. The physical apparatus required for mechanized image capture – lenses, cameras, scanners and light sources – are discussed followed by detailed treatment of various image-processing methods including an introduction to the QT image processing system. QT is unique to this book, and provides an example of a practical machine vision system along with extensive libraries of useful commands, functions and images which can be implemented by the reader. The main text of the book is completed by studies of a wide variety of applications of machine vision in insp...

  3. Tests of Machine Intelligence

    CERN Document Server

    Legg, Shane

    2007-01-01

    Although the definition and measurement of intelligence is clearly of fundamental importance to the field of artificial intelligence, no general survey of definitions and tests of machine intelligence exists. Indeed few researchers are even aware of alternatives to the Turing test and its many derivatives. In this paper we fill this gap by providing a short survey of the many tests of machine intelligence that have been proposed.

  4. Metalworking and machining fluids

    Science.gov (United States)

    Erdemir, Ali; Sykora, Frank; Dorbeck, Mark

    2010-10-12

    Improved boron-based metal working and machining fluids. Boric acid and boron-based additives that, when mixed with certain carrier fluids, such as water, cellulose and/or cellulose derivatives, polyhydric alcohol, polyalkylene glycol, polyvinyl alcohol, starch, dextrin, in solid and/or solvated forms result in improved metalworking and machining of metallic work pieces. Fluids manufactured with boric acid or boron-based additives effectively reduce friction, prevent galling and severe wear problems on cutting and forming tools.

  5. mlpy: Machine Learning Python

    CERN Document Server

    Albanese, Davide; Merler, Stefano; Riccadonna, Samantha; Jurman, Giuseppe; Furlanello, Cesare

    2012-01-01

    mlpy is a Python Open Source Machine Learning library built on top of NumPy/SciPy and the GNU Scientific Libraries. mlpy provides a wide range of state-of-the-art machine learning methods for supervised and unsupervised problems and it is aimed at finding a reasonable compromise among modularity, maintainability, reproducibility, usability and efficiency. mlpy is multiplatform, it works with Python 2 and 3 and it is distributed under GPL3 at the website http://mlpy.fbk.eu.

  6. Human-machine interactions

    Science.gov (United States)

    Forsythe, J. Chris; Xavier, Patrick G.; Abbott, Robert G.; Brannon, Nathan G.; Bernard, Michael L.; Speed, Ann E.

    2009-04-28

    Digital technology utilizing a cognitive model based on human naturalistic decision-making processes, including pattern recognition and episodic memory, can reduce the dependency of human-machine interactions on the abilities of a human user and can enable a machine to more closely emulate human-like responses. Such a cognitive model can enable digital technology to use cognitive capacities fundamental to human-like communication and cooperation to interact with humans.

  7. Machine Learning with Distances

    Science.gov (United States)

    2015-02-16

    and demonstrated their usefulness in experiments. 1 Introduction The goal of machine learning is to find useful knowledge behind data. Many machine...212, 172]. However, direct divergence approximators still suffer from the curse of dimensionality. A possible cure for this problem is to combine them...obtain the global optimal solution or even a good local solution without any prior knowledge . For this reason, we decided to introduce the unit-norm

  8. mlpy: Machine Learning Python

    OpenAIRE

    Albanese, Davide; Visintainer, Roberto; Merler, Stefano; Riccadonna, Samantha; Jurman, Giuseppe; Furlanello, Cesare

    2012-01-01

    mlpy is a Python Open Source Machine Learning library built on top of NumPy/SciPy and the GNU Scientific Libraries. mlpy provides a wide range of state-of-the-art machine learning methods for supervised and unsupervised problems and it is aimed at finding a reasonable compromise among modularity, maintainability, reproducibility, usability and efficiency. mlpy is multiplatform, it works with Python 2 and 3 and it is distributed under GPL3 at the website http://mlpy.fbk.eu.

  9. Dynamic behavior analysis for a six axis industrial machining robot

    CERN Document Server

    Bisu, Claudiu-Florinel; Gérard, Alain; K'Nevez, Jean-Yves

    2012-01-01

    The six axis robots are widely used in automotive industry for their good repeatability (as defined in the ISO92983) (painting, welding, mastic deposition, handling etc.). In the aerospace industry, robot starts to be used for complex applications such as drilling, riveting, fiber placement, NDT, etc. Given the positioning performance of serial robots, precision applications require usually external measurement device with complexes calibration procedure in order to reach the precision needed. New applications in the machining field of composite material (aerospace, naval, or wind turbine for example) intend to use off line programming of serial robot without the use of calibration or external measurement device. For those applications, the position, orientation and path trajectory precision of the tool center point of the robot are needed to generate the machining operation. This article presents the different conditions that currently limit the development of robots in robotic machining applications. We ana...

  10. EVALUATION OF MACHINE TOOL QUALITY

    Directory of Open Access Journals (Sweden)

    Ivan Kuric

    2011-12-01

    Full Text Available Paper deals with aspects of quality and accuracy of machine tools. As the accuracy of machine tools has key factor for product quality, it is important to know the methods for evaluation of quality and accuracy of machine tools. Several aspects of diagnostics of machine tools are described, such as aspects of reliability.

  11. An HTS machine laboratory prototype

    DEFF Research Database (Denmark)

    Mijatovic, Nenad; Jensen, Bogi Bech; Træholt, Chresten

    2012-01-01

    This paper describes Superwind HTS machine laboratory setup which is a small scale HTS machine designed and build as a part of the efforts to identify and tackle some of the challenges the HTS machine design may face. One of the challenges of HTS machines is a Torque Transfer Element (TTE) which...

  12. Machining of fiber reinforced composites

    Science.gov (United States)

    Komanduri, Ranga; Zhang, Bi; Vissa, Chandra M.

    Factors involved in machining of fiber-reinforced composites are reviewed. Consideration is given to properties of composites reinforced with boron filaments, glass fibers, aramid fibers, carbon fibers, and silicon carbide fibers and to polymer (organic) matrix composites, metal matrix composites, and ceramic matrix composites, as well as to the processes used in conventional machining of boron-titanium composites and of composites reinforced by each of these fibers. Particular attention is given to the methods of nonconventional machining, such as laser machining, water jet cutting, electrical discharge machining, and ultrasonic assisted machining. Also discussed are safety precautions which must be taken during machining of fiber-containing composites.

  13. ExternE transport methodology for external cost evaluation of air pollution

    DEFF Research Database (Denmark)

    Jensen, S. S.; Berkowicz, R.; Brandt, J.

    The report describes how the human exposure estimates based on NERI's human exposure modelling system (AirGIS) can improve the Danish data used for exposure factors in the ExternE Transport methodology. Initially, a brief description of the ExternE Tranport methodology is given and it is summaris...

  14. The External Mind

    DEFF Research Database (Denmark)

    The External Mind: an Introduction by Riccardo Fusaroli, Claudio Paolucci pp. 3-31 The sign of the Hand: Symbolic Practices and the Extended Mind by Massimiliano Cappuccio, Michael Wheeler pp. 33-55 The Overextended Mind by Shaun Gallagher pp. 57-68 The "External Mind": Semiotics, Pragmatism......, Extended Mind and Distributed Cognition by Claudio Paolucci pp. 69-96 The Social Horizon of Embodied Language and Material Symbols by Riccardo Fusaroli pp. 97-123 Semiotics and Theories of Situated/Distributed Action and Cognition: a Dialogue and Many Intersections by Tommaso Granelli pp. 125-167 Building...... Action in Public Environments with Diverse Semiotic Resources by Charles Goodwin pp. 169-182 How Marking in Dance Constitutes Thinking with the Body by David Kirsh pp. 183-214 Ambiguous Coordination: Collaboration in Informal Science Education Research by Ivan Rosero, Robert Lecusay, Michael Cole pp. 215-240...

  15. External-Memory Multimaps

    CERN Document Server

    Angelino, Elaine; Mitzenmacher, Michael; Thaler, Justin

    2011-01-01

    Many data structures support dictionaries, also known as maps or associative arrays, which store and manage a set of key-value pairs. A \\emph{multimap} is generalization that allows multiple values to be associated with the same key. For example, the inverted file data structure that is used prevalently in the infrastructure supporting search engines is a type of multimap, where words are used as keys and document pointers are used as values. We study the multimap abstract data type and how it can be implemented efficiently online in external memory frameworks, with constant expected I/O performance. The key technique used to achieve our results is a combination of cuckoo hashing using buckets that hold multiple items with a multiqueue implementation to cope with varying numbers of values per key. Our external-memory results are for the standard two-level memory model.

  16. Machining of Metal Matrix Composites

    CERN Document Server

    2012-01-01

    Machining of Metal Matrix Composites provides the fundamentals and recent advances in the study of machining of metal matrix composites (MMCs). Each chapter is written by an international expert in this important field of research. Machining of Metal Matrix Composites gives the reader information on machining of MMCs with a special emphasis on aluminium matrix composites. Chapter 1 provides the mechanics and modelling of chip formation for traditional machining processes. Chapter 2 is dedicated to surface integrity when machining MMCs. Chapter 3 describes the machinability aspects of MMCs. Chapter 4 contains information on traditional machining processes and Chapter 5 is dedicated to the grinding of MMCs. Chapter 6 describes the dry cutting of MMCs with SiC particulate reinforcement. Finally, Chapter 7 is dedicated to computational methods and optimization in the machining of MMCs. Machining of Metal Matrix Composites can serve as a useful reference for academics, manufacturing and materials researchers, manu...

  17. Non-conventional electrical machines

    CERN Document Server

    Rezzoug, Abderrezak

    2013-01-01

    The developments of electrical machines are due to the convergence of material progress, improved calculation tools, and new feeding sources. Among the many recent machines, the authors have chosen, in this first book, to relate the progress in slow speed machines, high speed machines, and superconducting machines. The first part of the book is dedicated to materials and an overview of magnetism, mechanic, and heat transfer.

  18. Panic attacks and possession by djinns: lessons from ethnopsychiatry.

    Science.gov (United States)

    Bragazzi, Nicola Luigi; Del Puente, Giovanni

    2012-01-01

    This clinical case report shows how important it is for a psychiatrist to have a knowledge of the cultural and religious context of the patient, in order to understand fully his or her complaints. Culture and religion, in fact, are not neutral, but convey symbols, meanings, and myths that should be properly explored to shed light on the patient's inner world. Patient D was a 19-year-old Muslim Italo-Tunisian girl, who consulted a psychiatrist for anxiety and panic attacks, and reported being possessed by djinns (ie, "evil creatures", as described in the Qur'an). A culturally informed interview was carried out, together with administration of psychometric scales, including the Symptom Checklist-90 Revised and Psychological Measure of Islamic Religiousness. Based on her scores and the results of this multidimensional assessment, patient D was treated with transcultural psychotherapy and fluoxetine. After a year of follow-up, she reported no further episodes of panic disorder. For proper assessment and treatment, a combined anthropological, sociological, and psychopathological approach was necessary.

  19. Dynamic Data Possession Checking for Secure Cloud Storage Service

    Directory of Open Access Journals (Sweden)

    Wenzhe Jiao

    2013-12-01

    Full Text Available Using cloud storage service, data owners can access their data anywhere at any time and enjoy the on-demand high quality applications and services, without the burden of local data storage and maintenance. Meanwhile, the risk of losing data stored with any untrustworthy service provider is the key barrier to widely adopt cloud storage service. To verify the integrity of data stored in cloud and relieve the security concerns of customers, a privacy-preserving data possession checking (DPC scheme is presented. This scheme uses Merkle Hash Tree to support fully dynamic data operations. To achieve robustness, forward error-correcting codes can be combined with the proposed DPC scheme, which can recover the data when a small amount of file has been corrupted. The scheme allows unlimited times verification without the need for the verifier to compare against the original data, which reduces the communication and computation complexity dramatically and preserves the privacy of the data. Extensive security analysis and simulation show that the proposed scheme is highly provably secure.

  20. Machinability evaluation of machinable ceramics with fuzzy theory

    Institute of Scientific and Technical Information of China (English)

    YU Ai-bing; ZHONG Li-jun; TAN Ye-fa

    2005-01-01

    The property parameters and machining output parameters were selected for machinability evaluation of machinable ceramics. Based on fuzzy evaluation theory, two-stage fuzzy evaluation approach was applied to consider these parameters. Two-stage fuzzy comprehensive evaluation model was proposed to evaluate machinability of machinable ceramic materials. Ce-ZrO2/CePO4 composites were fabricated and machined for evaluation of machinable ceramics. Material removal rates and specific normal grinding forces were measured. The parameters concerned with machinability were selected as alternative set. Five grades were chosen for the machinability evaluation of machnable ceramics. Machinability grades of machinable ceramics were determined through fuzzy operation. Ductile marks are observed on Ce-ZrO2/CePO4 machined surface. Five prepared Ce-ZrO2/CePO4 composites are classified as three machinability grades according to the fuzzy comprehensive evaluation results. The machinability grades of Ce-ZrO2/CePO4 composites are concerned with CePO4 content.

  1. MACHINE MOTION EQUATIONS

    Directory of Open Access Journals (Sweden)

    Florian Ion Tiberiu Petrescu

    2015-09-01

    Full Text Available This paper presents the dynamic, original, machine motion equations. The equation of motion of the machine that generates angular speed of the shaft (which varies with position and rotation speed is deduced by conservation kinetic energy of the machine. An additional variation of angular speed is added by multiplying by the coefficient dynamic D (generated by the forces out of mechanism and or by the forces generated by the elasticity of the system. Kinetic energy conservation shows angular speed variation (from the shaft with inertial masses, while the dynamic coefficient introduces the variation of w with forces acting in the mechanism. Deriving the first equation of motion of the machine one can obtain the second equation of motion dynamic. From the second equation of motion of the machine it determines the angular acceleration of the shaft. It shows the distribution of the forces on the mechanism to the internal combustion heat engines. Dynamic, the velocities can be distributed in the same way as forces. Practically, in the dynamic regimes, the velocities have the same timing as the forces. Calculations should be made for an engine with a single cylinder. Originally exemplification is done for a classic distribution mechanism, and then even the module B distribution mechanism of an Otto engine type.

  2. Speed Regulator for Permanent Magnet DC Boring Machine

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    In this paper a variable-speed system for a loaded permanent magnet direct current boring machine (PMDCBM) is described in details. The voltage adjustment of PMDCBM is accomplished by means of solid state switch with a high gain Darlington transistor. The device designed possesses good variable speed characteristic and Iow loss at low speed. The speed can be regulated automatically to hold at an ideal value according to the load.

  3. Dynamics of cyclic machines

    CERN Document Server

    Vulfson, Iosif

    2015-01-01

    This book focuses on modern methods of oscillation analysis in machines, including cyclic action mechanisms (linkages, cams, steppers, etc.). It presents schematization techniques and mathematical descriptions of oscillating systems, taking into account the variability of the parameters and nonlinearities, engineering evaluations of dynamic errors, and oscillation suppression methods. The majority of the book is devoted to the development of new methods of dynamic analysis and synthesis for cyclic machines that form regular oscillatory systems with multiple duplicate modules.  There are also sections examining aspects of general engineering interest (nonlinear dissipative forces, systems with non-stationary constraints, impacts and pseudo-impacts in clearances, etc.)  The examples in the book are based on the widely used results of theoretical and experimental studies as well as engineering calculations carried out in relation to machines used in the textile, light, polygraphic and other industries. Particu...

  4. Chatter and machine tools

    CERN Document Server

    Stone, Brian

    2014-01-01

    Focussing on occurrences of unstable vibrations, or Chatter, in machine tools, this book gives important insights into how to eliminate chatter with associated improvements in product quality, surface finish and tool wear. Covering a wide range of machining processes, including turning, drilling, milling and grinding, the author uses his research expertise and practical knowledge of vibration problems to provide solutions supported by experimental evidence of their effectiveness. In addition, this book contains links to supplementary animation programs that help readers to visualise the ideas detailed in the text. Advancing knowledge in chatter avoidance and suggesting areas for new innovations, Chatter and Machine Tools serves as a handbook for those desiring to achieve significant reductions in noise, longer tool and grinding wheel life and improved product finish.

  5. Machines and Metaphors

    Directory of Open Access Journals (Sweden)

    Ángel Martínez García-Posada

    2016-10-01

    Full Text Available The edition La ley del reloj. Arquitectura, máquinas y cultura moderna (Cátedra, Madrid, 2016 registers the useful paradox of the analogy between architecture and technique. Its author, the architect Eduardo Prieto, also a philosopher, professor and writer, acknowledges the obvious distance from machines to buildings, so great that it can only be solved using strange comparisons, since architecture does not move nor are the machines habitable, however throughout the book, from the origin of the metaphor of the machine, with clarity in his essay and enlightening erudition, he points out with certainty some concomitances of high interest, drawing throughout history a beautiful cartography of the fruitful encounter between organics and mechanics.

  6. Machine Learning Markets

    CERN Document Server

    Storkey, Amos

    2011-01-01

    Prediction markets show considerable promise for developing flexible mechanisms for machine learning. Here, machine learning markets for multivariate systems are defined, and a utility-based framework is established for their analysis. This differs from the usual approach of defining static betting functions. It is shown that such markets can implement model combination methods used in machine learning, such as product of expert and mixture of expert approaches as equilibrium pricing models, by varying agent utility functions. They can also implement models composed of local potentials, and message passing methods. Prediction markets also allow for more flexible combinations, by combining multiple different utility functions. Conversely, the market mechanisms implement inference in the relevant probabilistic models. This means that market mechanism can be utilized for implementing parallelized model building and inference for probabilistic modelling.

  7. Machine Learning for Security

    CERN Document Server

    CERN. Geneva

    2015-01-01

    Applied statistics, aka ‘Machine Learning’, offers a wealth of techniques for answering security questions. It’s a much hyped topic in the big data world, with many companies now providing machine learning as a service. This talk will demystify these techniques, explain the math, and demonstrate their application to security problems. The presentation will include how-to’s on classifying malware, looking into encrypted tunnels, and finding botnets in DNS data. About the speaker Josiah is a security researcher with HP TippingPoint DVLabs Research Group. He has over 15 years of professional software development experience. Josiah used to do AI, with work focused on graph theory, search, and deductive inference on large knowledge bases. As rules only get you so far, he moved from AI to using machine learning techniques identifying failure modes in email traffic. There followed digressions into clustered data storage and later integrated control systems. Current ...

  8. Advanced Analysis of Nontraditional Machining

    CERN Document Server

    Tsai, Hung-Yin

    2013-01-01

    Nontraditional machining utilizes thermal, chemical, electrical, mechanical and optical sources of energy to form and cut materials. Advanced Analysis of Nontraditional Machining explains in-depth how each of these advanced machining processes work, their machining system components, and process variables and industrial applications, thereby offering advanced knowledge and scientific insight. This book also documents the latest and frequently cited research results of a few key nonconventional machining processes for the most concerned topics in industrial applications, such as laser machining, electrical discharge machining, electropolishing of die and mold, and wafer processing for integrated circuit manufacturing. This book also: Fills the gap of the advanced knowledge of nonconventional machining between industry and research Documents latest and frequently cited research of key nonconventional machining processes for the most sought after topics in industrial applications Demonstrates advanced multidisci...

  9. Machining strategy choice: performance VIEWER

    CERN Document Server

    Tapie, Laurent; Anselmetti, Bernard

    2009-01-01

    Nowadays high speed machining (HSM) machine tool combines productivity and part quality. So mould and die maker invested in HSM. Die and mould features are more and more complex shaped. Thus, it is difficult to choose the best machining strategy according to part shape. Geometrical analysis of machining features is not sufficient to make an optimal choice. Some research show that security, technical, functional and economical constrains must be taken into account to elaborate a machining strategy. During complex shape machining, production system limits induce feed rate decreases, thus loss of productivity, in some part areas. In this paper we propose to analyse these areas by estimating tool path quality. First we perform experiments on HSM machine tool to determine trajectory impact on machine tool behaviour. Then, we extract critical criteria and establish models of performance loss. Our work is focused on machine tool kinematical performance and numerical controller unit calculation capacity. We implement...

  10. Medication possession ratio predicts antiretroviral regimens persistence in Peru.

    Directory of Open Access Journals (Sweden)

    Jorge L Salinas

    Full Text Available OBJECTIVES: In developing nations, the use of operational parameters (OPs in the prediction of clinical care represents a missed opportunity to enhance the care process. We modeled the impact of multiple measurements of antiretroviral treatment (ART adherence on antiretroviral treatment outcomes in Peru. DESIGN AND METHODS: Retrospective cohort study including ART naïve, non-pregnant, adults initiating therapy at Hospital Nacional Cayetano Heredia, Lima-Peru (2006-2010. Three OPs were defined: 1 Medication possession ratio (MPR: days with antiretrovirals dispensed/days on first-line therapy; 2 Laboratory monitory constancy (LMC: proportion of 6 months intervals with ≥1 viral load or CD4 reported; 3 Clinic visit constancy (CVC: proportion of 6 months intervals with ≥1 clinic visit. Three multi-variable Cox proportional hazard (PH models (one per OP were fit for (1 time of first-line ART persistence and (2 time to second-line virologic failure. All models were adjusted for socio-demographic, clinical and laboratory variables. RESULTS: 856 patients were included in first-line persistence analyses, median age was 35.6 years [29.4-42.9] and most were male (624; 73%. In multivariable PH models, MPR (per 10% increase HR=0.66; 95%CI=0.61-0.71 and LMC (per 10% increase 0.83; 0.71-0.96 were associated with prolonged time on first-line therapies. Among 79 individuals included in time to second-line virologic failure analyses, MPR was the only OP independently associated with prolonged time to second-line virologic failure (per 10% increase 0.88; 0.77-0.99. CONCLUSIONS: The capture and utilization of program level parameters such as MPR can provide valuable insight into patient-level treatment outcomes.

  11. The Physics and Physical Chemistry of Molecular Machines.

    Science.gov (United States)

    Astumian, R Dean; Mukherjee, Shayantani; Warshel, Arieh

    2016-06-17

    The concept of a "power stroke"-a free-energy releasing conformational change-appears in almost every textbook that deals with the molecular details of muscle, the flagellar rotor, and many other biomolecular machines. Here, it is shown by using the constraints of microscopic reversibility that the power stroke model is incorrect as an explanation of how chemical energy is used by a molecular machine to do mechanical work. Instead, chemically driven molecular machines operating under thermodynamic constraints imposed by the reactant and product concentrations in the bulk function as information ratchets in which the directionality and stopping torque or stopping force are controlled entirely by the gating of the chemical reaction that provides the fuel for the machine. The gating of the chemical free energy occurs through chemical state dependent conformational changes of the molecular machine that, in turn, are capable of generating directional mechanical motions. In strong contrast to this general conclusion for molecular machines driven by catalysis of a chemical reaction, a power stroke may be (and often is) an essential component for a molecular machine driven by external modulation of pH or redox potential or by light. This difference between optical and chemical driving properties arises from the fundamental symmetry difference between the physics of optical processes, governed by the Bose-Einstein relations, and the constraints of microscopic reversibility for thermally activated processes. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  12. Regularization by External Variables

    DEFF Research Database (Denmark)

    Bossolini, Elena; Edwards, R.; Glendinning, P. A.

    2016-01-01

    Regularization was a big topic at the 2016 CRM Intensive Research Program on Advances in Nonsmooth Dynamics. There are many open questions concerning well known kinds of regularization (e.g., by smoothing or hysteresis). Here, we propose a framework for an alternative and important kind of regula...... of regularization, by external variables that shadow either the state or the switch of the original system. The shadow systems are derived from and inspired by various applications in electronic control, predator-prey preference, time delay, and genetic regulation....

  13. Electrical machines diagnosis

    CERN Document Server

    Trigeassou, Jean-Claude

    2013-01-01

    Monitoring and diagnosis of electrical machine faults is a scientific and economic issue which is motivated by objectives for reliability and serviceability in electrical drives.This book provides a survey of the techniques used to detect the faults occurring in electrical drives: electrical, thermal and mechanical faults of the electrical machine, faults of the static converter and faults of the energy storage unit.Diagnosis of faults occurring in electrical drives is an essential part of a global monitoring system used to improve reliability and serviceability. This diagnosis is perf

  14. Refrigerating machine oil

    Energy Technology Data Exchange (ETDEWEB)

    Nozawa, K.

    1981-03-17

    Refrigerating machine oil to be filled in a sealed motorcompressor unit constituting a refrigerating cycle system including an electric refrigerator, an electric cold-storage box, a small-scaled electric refrigerating show-case, a small-scaled electric cold-storage show-case and the like, is arranged to have a specifically enhanced property, in which smaller initial driving power consumption of the sealed motor-compressor and easier supply of the predetermined amount of the refrigerating machine oil to the refrigerating system are both guaranteed even in a rather low environmental temperature condition.

  15. Machine shop basics

    CERN Document Server

    Miller, Rex

    2004-01-01

    Use the right tool the right wayHere, fully updated to include new machines and electronic/digital controls, is the ultimate guide to basic machine shop equipment and how to use it. Whether you're a professional machinist, an apprentice, a trade student, or a handy homeowner, this fully illustrated volume helps you define tools and use them properly and safely. It's packed with review questions for students, and loaded with answers you need on the job.Mark Richard Miller is a Professor and Chairman of the Industrial Technology Department at Texas A&M University in Kingsville, T

  16. Electrical machines & their applications

    CERN Document Server

    Hindmarsh, J

    1984-01-01

    A self-contained, comprehensive and unified treatment of electrical machines, including consideration of their control characteristics in both conventional and semiconductor switched circuits. This new edition has been expanded and updated to include material which reflects current thinking and practice. All references have been updated to conform to the latest national (BS) and international (IEC) recommendations and a new appendix has been added which deals more fully with the theory of permanent-magnets, recognising the growing importance of permanent-magnet machines. The text is so arra

  17. Clojure for machine learning

    CERN Document Server

    Wali, Akhil

    2014-01-01

    A book that brings out the strengths of Clojure programming that have to facilitate machine learning. Each topic is described in substantial detail, and examples and libraries in Clojure are also demonstrated.This book is intended for Clojure developers who want to explore the area of machine learning. Basic understanding of the Clojure programming language is required, but thorough acquaintance with the standard Clojure library or any libraries are not required. Familiarity with theoretical concepts and notation of mathematics and statistics would be an added advantage.

  18. Perpetual Motion Machine

    OpenAIRE

    D. Tsaousis

    2008-01-01

    Ever since the first century A.D. there have been relative descriptions of known devices as well as manufactures for the creation of perpetual motion machines. Although physics has led, with two thermodynamic laws, to the opinion that a perpetual motion machine is impossible to be manufactured, inventors of every age and educational level appear to claim that they have invented something «entirely new» or they have improved somebody else’s invention, which «will function henceforth perpetuall...

  19. Man - Machine Communication

    CERN Document Server

    Petersen, Peter; Nielsen, Henning

    1984-01-01

    This report describes a Man-to-Machine Communication module which together with a STAC can take care of all operator inputs from the touch-screen, tracker balls and mechanical buttons. The MMC module can also contain a G64 card which could be a GPIB driver but many other G64 cards could be used. The soft-ware services the input devices and makes the results accessible from the CAMAC bus. NODAL functions for the Man Machine Communication is implemented in the STAC and in the ICC.

  20. Machine Fault Signature Analysis

    Directory of Open Access Journals (Sweden)

    Pratesh Jayaswal

    2008-01-01

    Full Text Available The objective of this paper is to present recent developments in the field of machine fault signature analysis with particular regard to vibration analysis. The different types of faults that can be identified from the vibration signature analysis are, for example, gear fault, rolling contact bearing fault, journal bearing fault, flexible coupling faults, and electrical machine fault. It is not the intention of the authors to attempt to provide a detailed coverage of all the faults while detailed consideration is given to the subject of the rolling element bearing fault signature analysis.

  1. METHODS OF DEFINITION OF COMPLEX MACHINE GRAINS’ AND SEEDS’ TRAUMATIZING

    Directory of Open Access Journals (Sweden)

    Pekhalskiy I. A.

    2016-06-01

    Full Text Available Damage of grain and seeds by machines makes essential negative impact on sowing qualities of seeds and processing properties of grain. While processing of grain a lot of various cars and actions differently injure weevils. To exclude traumatizing of grains in the course of mechanical preparation is not obviously possible, as working bodies of cars are a source of mechanical and thermomechanical damages. Besides, injured weevils on the physical-mechanical properties practically do not differ from whole, i.e. they do not possess signs for machine division. To reduce traumatizing of weevils is possible with the help of application of optimum technologies of machining, selection of the conforming technological modes, using as a part of actions of constructional stuffs with a low elastic modulus, perfection of their design data. For definition of injuring ability of various machines and actions through which takes place grain lots, have developed a procedure which allows with high degree of reliance to estimate complex traumatizing of weevils (namely, their outside integuments and intrinsic frames machines and the actions which are a part of aggregates and complexes for machine preparation of grain and seeds. The developed procedure bases on a basis of the standard documents regulating test methods of agricultural machinery and together with it allows to consider connatural heterogeneity of the grain lots arriving for processing

  2. Design of rotating electrical machines

    CERN Document Server

    Pyrhonen , Juha; Hrabovcova , Valeria

    2013-01-01

    In one complete volume, this essential reference presents an in-depth overview of the theoretical principles and techniques of electrical machine design. This timely new edition offers up-to-date theory and guidelines for the design of electrical machines, taking into account recent advances in permanent magnet machines as well as synchronous reluctance machines. New coverage includes: Brand new material on the ecological impact of the motors, covering the eco-design principles of rotating electrical machinesAn expanded section on the design of permanent magnet synchronous machines, now repo

  3. Machine speech and speaking about machines

    Energy Technology Data Exchange (ETDEWEB)

    Nye, A. [Univ. of Wisconsin, Whitewater, WI (United States)

    1996-12-31

    Current philosophy of language prides itself on scientific status. It boasts of being no longer contaminated with queer mental entities or idealist essences. It theorizes language as programmable variants of formal semantic systems, reimaginable either as the properly epiphenomenal machine functions of computer science or the properly material neural networks of physiology. Whether or not such models properly capture the physical workings of a living human brain is a question that scientists will have to answer. I, as a philosopher, come at the problem from another direction. Does contemporary philosophical semantics, in its dominant truth-theoretic and related versions, capture actual living human thought as it is experienced, or does it instead reflect, regardless of (perhaps dubious) scientific credentials, pathology of thought, a pathology with a disturbing social history.

  4. Possession of first aid basic knowledge by specific population groups

    Directory of Open Access Journals (Sweden)

    Georgios Argyriou

    2011-04-01

    Full Text Available The term 'first aid' refers to the preliminary care that is given to patients or injured individuals. The main objective of first aid is to offer effective assistance to victims until a more qualified professional becomes available to provide for further care. Purpose: The purpose of this study was to investigate whether specific populations possess the basic knowledge and skills that are necessary to offer this initial phase of treatment. Material-Method: The studied population consisted of 1387 individuals, of which 57.9% (N = 803 were male. Data was collected through the creation and administration of a questionnaire composed of 28 questions. The data analysis was performed using the statistical program SPSS (version 16 (SPSS Inc., Chicago, IL. Results: Almost half of the sample, 764 individuals (55.1% never attended a 'first aid' seminar, while 623 (44.9% did. The latter group could be further divided in accordance to the duration of the seminars that they partook in. 405 (29.2% attended for 12 to 24 hours, 88 (6.3% for 2-3 weeks, 50 (3.6% for one month, and 81 (5.8% for more than a month. Health professionals were 3.1 times more likely to have attended a seminar than the other respondents (N: 1.144, OR: 3.138, 95% CI: 1.508-6.528, p: 0.002. 67.6% of the studied sample would react correctly in a situation where an unconscious child would be carried out from sea, while 63.7% would do the Heimlich maneuver on a person who felt breathlessness while choking during a meal. Nine hundred and six people (65.3% would give an unconscious diabetic something sweet to eat. People who had graduated from an institute were 1.4 times more likely to properly deal with a diabetic who was in a critical condition (OR: 1.401, 95% CI: 1.060-1.853, p: 0.018 Conclusions: First aid training is a vital asset for all population groups. It is therefore all the more important to make such education programs accessible to the wider population. Furthermore the

  5. Hybrid machining processes perspectives on machining and finishing

    CERN Document Server

    Gupta, Kapil; Laubscher, R F

    2016-01-01

    This book describes various hybrid machining and finishing processes. It gives a critical review of the past work based on them as well as the current trends and research directions. For each hybrid machining process presented, the authors list the method of material removal, machining system, process variables and applications. This book provides a deep understanding of the need, application and mechanism of hybrid machining processes.

  6. Cybernetic anthropomorphic machine systems

    Science.gov (United States)

    Gray, W. E.

    1974-01-01

    Functional descriptions are provided for a number of cybernetic man machine systems that augment the capacity of normal human beings in the areas of strength, reach or physical size, and environmental interaction, and that are also applicable to aiding the neurologically handicapped. Teleoperators, computer control, exoskeletal devices, quadruped vehicles, space maintenance systems, and communications equipment are considered.

  7. ARM : abstract rewriting machine

    NARCIS (Netherlands)

    J.F.T. Kamperman; H.R. Walters (Pum)

    1993-01-01

    textabstractTerm rewriting is frequently used as implementation technique for algebraic specifications. In this paper we present the abstract term rewriting machine (ARM), which has an extremely compact instruction set and imposes no restrictions on the implemented TRSs. Apart from standard

  8. A "Living" Machine

    Institute of Scientific and Technical Information of China (English)

    N.R.Bogatyrev

    2004-01-01

    Biomimetics (or bionics) is the engineering discipline that constructs artificial systems using biological principles. The ideal final result in biomimetics is to create a living machine. But what are the desirable and non-desirable properties of biomimetic product? Where can natural prototypes be found? How can technical solutions be transferred from nature to technology? Can we use living nature like LEGO bricks for construction our machines? How can biology help us? What is a living machine? In biomimetic practice only some "part" (organ, part of organ, tissue) of the observed whole organism is utilized. A possible template for future super-organism extension for biomimetic methods might be drawn from experiments in holistic ecological agriculture (ecological design, permaculture, ecological engineering, etc. ). The necessary translation of these rules to practical action can be achieved with the Russian Theory of Inventive Problem Solving (TRIZ), specifically adjusted to biology. Thus, permaculture, reinforced by a TRIZ conceptual framework, might provide the basis for Super-Organismic Bionics, which is hypothesized as necessary for effective ecological engineering. This hypothesis is supported by a case study-the design of a sustainable artificial nature reserve for wild pollinators as a living machine.

  9. Of machines and men ...

    CERN Multimedia

    CERN; Daniel Boileau

    1990-01-01

    Engineering and construction at LEP. Committed work and physicists motivation to work on this type of machine. With Guido Altarelli Theory Division Physicist, Ugo Amaldi Delphi Experiment Spokesman, Oscar Barbalat Head of Industry and Technology Liaison Office, Jonathan Ellis Head of Theory Division.

  10. Technology Time Machine 2012

    DEFF Research Database (Denmark)

    Lehner, Wolfgang; Fettweis, Gerhard; Fitzek, Frank

    2013-01-01

    The IEEE Technology Time Machine (TTM) is a unique event for industry leaders, academics, and decision making government officials who direct R&D activities, plan research programs or manage portfolios of research activities. This report covers the main topics of the 2nd Symposium of future...

  11. Training Restricted Boltzmann Machines

    DEFF Research Database (Denmark)

    Fischer, Asja

    Restricted Boltzmann machines (RBMs) are probabilistic graphical models that can also be interpreted as stochastic neural networks. Training RBMs is known to be challenging. Computing the likelihood of the model parameters or its gradient is in general computationally intensive. Thus, training...

  12. Laser machining of explosives

    Science.gov (United States)

    Perry, Michael D.; Stuart, Brent C.; Banks, Paul S.; Myers, Booth R.; Sefcik, Joseph A.

    2000-01-01

    The invention consists of a method for machining (cutting, drilling, sculpting) of explosives (e.g., TNT, TATB, PETN, RDX, etc.). By using pulses of a duration in the range of 5 femtoseconds to 50 picoseconds, extremely precise and rapid machining can be achieved with essentially no heat or shock affected zone. In this method, material is removed by a nonthermal mechanism. A combination of multiphoton and collisional ionization creates a critical density plasma in a time scale much shorter than electron kinetic energy is transferred to the lattice. The resulting plasma is far from thermal equilibrium. The material is in essence converted from its initial solid-state directly into a fully ionized plasma on a time scale too short for thermal equilibrium to be established with the lattice. As a result, there is negligible heat conduction beyond the region removed resulting in negligible thermal stress or shock to the material beyond a few microns from the laser machined surface. Hydrodynamic expansion of the plasma eliminates the need for any ancillary techniques to remove material and produces extremely high quality machined surfaces. There is no detonation or deflagration of the explosive in the process and the material which is removed is rendered inert.

  13. Electrical Discharge Machining.

    Science.gov (United States)

    Montgomery, C. M.

    The manual is for use by students learning electrical discharge machining (EDM). It consists of eight units divided into several lessons, each designed to meet one of the stated objectives for the unit. The units deal with: introduction to and advantages of EDM, the EDM process, basic components of EDM, reaction between forming tool and workpiece,…

  14. The Answer Machine.

    Science.gov (United States)

    Feldman, Susan

    2000-01-01

    Discusses information retrieval systems and the need to have them adapt to user needs, integrate information in any format, reveal patterns and trends in information, and answer questions. Topics include statistics and probability; natural language processing; intelligent agents; concept mapping; machine-aided indexing; text mining; filtering;…

  15. Massively collaborative machine learning

    NARCIS (Netherlands)

    Rijn, van J.N.

    2016-01-01

    Many scientists are focussed on building models. We nearly process all information we perceive to a model. There are many techniques that enable computers to build models as well. The field of research that develops such techniques is called Machine Learning. Many research is devoted to develop comp

  16. Recent Advances on Permanent Magnet Machines

    Institute of Scientific and Technical Information of China (English)

    诸自强

    2012-01-01

    This paper overviews advances on permanent magnet(PM) brushless machines over last 30 years,with particular reference to new and novel machine topologies.These include current states and trends for surface-mounted and interior PM machines,electrically and mechanically adjusted variable flux PM machines including memory machine,hybrid PM machines which uniquely integrate PM technology into induction machines,switched and synchronous reluctance machines and wound field machines,Halbach PM machines,dual-rotor PM machines,and magnetically geared PM machines,etc.The paper highlights their features and applications to various market sectors.

  17. Motherhood and the Machine

    Directory of Open Access Journals (Sweden)

    Miglena Nikolchina

    2014-12-01

    Full Text Available In her conceptualization of the human as defined by the capacity for revolt Kristeva unavoidably touches upon issues of robotization, technology, and the virtual. The concepts of animal and machine, however, although they do appear occasionally and in important ways, are never at the focus of her inquiries and are absent in her “New Forms of Revolt.” Yet these two concepts to a large extent define the field of contemporary philosophical debates of the human giving rise to three major theoretical orientations. On the one hand, there is the trend which tries to come to terms with technological novelties and the merging of human and machine that they imply. This trend unfolds under the rubric of “transhuman” or “posthuman” and of the “enhancement” of man. The second trend predominates in animal studies. Mostly in an ethical perspective but also ontologically, this trend, to which Derrida’s later writing made a significant contribution, questions the idea of the “human exception” and the rigorous distinction between man and animal on which this exception rests. While apparently antagonistic, both trends align the human with the animal and oppose it to technology. The third trend collapses the distinctions on which the previous two rely through the lens of biopolitics: drawing on Heidegger, Kojève, and Foucault, it regards contemporary technological transformations as amounting to the animalization of man.  The human disappears in the animal, in the machine, or in the indistinguishability of the two, confirming what Agamben has described as the inoperativeness of the anthropological machine. The present text turns to Kristeva’s conceptions of motherhood and revolt as introducing a powerful inflection in this tripartite field. Remarkably, it is precisely new sagas of rebellious machines like Battlestar “Galactica” that foreground the relevance of Kristeva’s approach.

  18. Are symptoms of spirit possessed patients covered by the DSM-IV or DSM-5 criteria for possession trance disorder? A mixed-method explorative study in Uganda

    NARCIS (Netherlands)

    van Duijl, M.; Kleyn, W.; de Jong, J.

    2013-01-01

    Introduction and aims As in many cultures, spirit possession is a common idiom of distress in Uganda. The DSM-IV contains experimental research criteria for dissociative and possession trance disorder (DTD and PTD), which are under review for the DSM-5. In the current proposed categories of the DSM-

  19. Development and experiment on solid forming machine with planetary wheel style internal and external taper roller flat die%行星轮式内外锥辊固体燃料平模成型机研制与试验

    Institute of Scientific and Technical Information of China (English)

    张喜瑞; 甘声豹; 李粤; 梁栋; 郑侃

    2014-01-01

    . For now, biomass fuels are the main screw extrusion molding equipment, piston-type and roller die stamping. Roll mode compacted biomass molding machines are most widely used for it has a simple structure, being both compact and easy to use. Flat molding machines are one of the biomass briquetting machines. Flat molding machines applied on the market currently are mostly single pairs of straight rollers, using pulleys and gears for a 2-stage-transmission, and are mainly used with woody biomass, wheat straw, corn stalks, forestry waste and other raw materials. But there is not much research on the use of molding machines for solid fuel made of mixed raw materials such as tropical crop residues, including banana stalks, coconut shell, and sugarcane leaves. In the existing operation processes of die-cutting (flat molding) machines, the vertical rollers (straight press roller) have a more serious abrasion. And in order to achieve a greater transmission ratio, the 2-stage-transmission system applied will make the size of the complete machine too large. To solve the above problems, this paper research designed a tapered roller planetary wheel and an outside molding machine solid fuel level and describes the main components of the aircraft structure. This paper also focuses on the motion analysis and stress analysis of the roll device and determines the optimum value of the key parameter. Performance test results show that:In the case when motor power is 45 kW, cone roll revolution speed is 190 r/min and rotation speed is 543 r/min and the feed conveyor means is 3 kW. The production rate is 850 kg/h, pellet fuel forming rate is 96.5%, particle mass density is 1.25 g/cm3, and the moisture content of the particles after forming is 2.82%, mechanical durability is 96.74%, comply with the requirements of biomass pellet fuel molding. The whole working process with low noise and smooth operation, it has significant economic and ecological benefits and provides a reference for China

  20. Machine learning in image steganalysis

    CERN Document Server

    Schaathun, Hans Georg

    2012-01-01

    "The only book to look at steganalysis from the perspective of machine learning theory, and to apply the common technique of machine learning to the particular field of steganalysis; ideal for people working in both disciplines"--

  1. New Applications of Learning Machines

    DEFF Research Database (Denmark)

    Larsen, Jan

    * Machine learning framework for sound search * Genre classification * Music separation * MIMO channel estimation and symbol detection......* Machine learning framework for sound search * Genre classification * Music separation * MIMO channel estimation and symbol detection...

  2. New Applications of Learning Machines

    DEFF Research Database (Denmark)

    Larsen, Jan

    * Machine learning framework for sound search * Genre classification * Music separation * MIMO channel estimation and symbol detection......* Machine learning framework for sound search * Genre classification * Music separation * MIMO channel estimation and symbol detection...

  3. Hinged Shields for Machine Tools

    Science.gov (United States)

    Lallande, J. B.; Poland, W. W.; Tull, S.

    1985-01-01

    Flaps guard against flying chips, but fold away for tool setup. Clear plastic shield in position to intercept flying chips from machine tool and retracted to give operator access to workpiece. Machine shops readily make such shields for own use.

  4. External Measures of Cognition

    Directory of Open Access Journals (Sweden)

    Osvaldo eCairo

    2011-10-01

    Full Text Available The human brain is undoubtedly the most impressive, complex and intricate organ that has evolved over time. It is also probably the least understood, and for that reason, the one that is currently attracting the most attention. In fact, the number of comparative analyses that focus on the evolution of brain size in Homo sapiens and other species has increased dramatically in recent years. In neuroscience, no other issue has generated so much interest and been the topic of so many heated debates as the difference in brain size between socially defined population groups, both its connotations and implications. For over a century, external measures of cognition have been related to intelligence. However, it is still unclear whether these measures actually correspond to cognitive abilities. In summary, this paper must be reviewed with this premise in mind.

  5. Design of Sugarcane Peeling Machine

    Directory of Open Access Journals (Sweden)

    Ge Xinfeng

    2015-02-01

    Full Text Available In order to solve the problem that appeared in hand peeling sugarcane, the sugarcane peeling machine is designed, the sugarcane peeling machine includes motor, groove wheel, cutting room, slider crank mechanism, reducer (including belt drive, chain drive and so on. The designed sugarcane peeling machine is simulated, the results show that the sugarcane peeling machine can peel sugarcane successfully with convenient, fast and uniform.

  6. Automatically-Programed Machine Tools

    Science.gov (United States)

    Purves, L.; Clerman, N.

    1985-01-01

    Software produces cutter location files for numerically-controlled machine tools. APT, acronym for Automatically Programed Tools, is among most widely used software systems for computerized machine tools. APT developed for explicit purpose of providing effective software system for programing NC machine tools. APT system includes specification of APT programing language and language processor, which executes APT statements and generates NC machine-tool motions specified by APT statements.

  7. Automatically-Programed Machine Tools

    Science.gov (United States)

    Purves, L.; Clerman, N.

    1985-01-01

    Software produces cutter location files for numerically-controlled machine tools. APT, acronym for Automatically Programed Tools, is among most widely used software systems for computerized machine tools. APT developed for explicit purpose of providing effective software system for programing NC machine tools. APT system includes specification of APT programing language and language processor, which executes APT statements and generates NC machine-tool motions specified by APT statements.

  8. Feature Recognition for Virtual Machining

    OpenAIRE

    Xú, Shixin; Anwer, Nabil; Qiao, Lihong

    2014-01-01

    International audience; Virtual machining uses software tools to simulate machining processes in virtual environments ahead of actual production. This paper proposes that feature recognition techniques can be applied in the course of virtual machining, such as identifying some process problems, and presenting corresponding correcting advices. By comparing with the original CAD model, form errors of the machining features can be found. And then corrections are suggested to process designers. T...

  9. 27 CFR 478.40 - Manufacture, transfer, and possession of semiautomatic assault weapons.

    Science.gov (United States)

    2010-04-01

    ... possession of semiautomatic assault weapons. 478.40 Section 478.40 Alcohol, Tobacco Products, and Firearms..., transfer, and possession of semiautomatic assault weapons. (a) Prohibition. No person shall manufacture, transfer, or possess a semiautomatic assault weapon. (b) Exceptions. The provisions of paragraph (a) of...

  10. The History of Predicative Possession in Slavic: Internal Development vs. Language Contact

    Science.gov (United States)

    McAnallen, Julia

    2011-01-01

    The languages of the world encode possession in a variety of ways. In Slavic languages, possession on the level of the clause, or predicative possession, is represented by two main encoding strategies. Most Slavic languages, including those in the West and South Slavic sub-groupings, use a "have" verb comparable to English have and German "haben."…

  11. The Neural Support Vector Machine

    NARCIS (Netherlands)

    Wiering, Marco; van der Ree, Michiel; Embrechts, Mark; Stollenga, Marijn; Meijster, Arnold; Nolte, A; Schomaker, Lambertus

    2013-01-01

    This paper describes a new machine learning algorithm for regression and dimensionality reduction tasks. The Neural Support Vector Machine (NSVM) is a hybrid learning algorithm consisting of neural networks and support vector machines (SVMs). The output of the NSVM is given by SVMs that take a

  12. The Neural Support Vector Machine

    NARCIS (Netherlands)

    Wiering, Marco; van der Ree, Michiel; Embrechts, Mark; Stollenga, Marijn; Meijster, Arnold; Nolte, A; Schomaker, Lambertus

    2013-01-01

    This paper describes a new machine learning algorithm for regression and dimensionality reduction tasks. The Neural Support Vector Machine (NSVM) is a hybrid learning algorithm consisting of neural networks and support vector machines (SVMs). The output of the NSVM is given by SVMs that take a centr

  13. Prediction of Machine Tool Condition Using Support Vector Machine

    Science.gov (United States)

    Wang, Peigong; Meng, Qingfeng; Zhao, Jian; Li, Junjie; Wang, Xiufeng

    2011-07-01

    Condition monitoring and predicting of CNC machine tools are investigated in this paper. Considering the CNC machine tools are often small numbers of samples, a condition predicting method for CNC machine tools based on support vector machines (SVMs) is proposed, then one-step and multi-step condition prediction models are constructed. The support vector machines prediction models are used to predict the trends of working condition of a certain type of CNC worm wheel and gear grinding machine by applying sequence data of vibration signal, which is collected during machine processing. And the relationship between different eigenvalue in CNC vibration signal and machining quality is discussed. The test result shows that the trend of vibration signal Peak-to-peak value in surface normal direction is most relevant to the trend of surface roughness value. In trends prediction of working condition, support vector machine has higher prediction accuracy both in the short term ('One-step') and long term (multi-step) prediction compared to autoregressive (AR) model and the RBF neural network. Experimental results show that it is feasible to apply support vector machine to CNC machine tool condition prediction.

  14. FRC Separatrix inference using machine-learning techniques

    Science.gov (United States)

    Romero, Jesus; Roche, Thomas; the TAE Team

    2016-10-01

    As Field Reversed Configuration (FRC) devices approach lifetimes exceeding the characteristic time of conductive structures external to the plasma, plasma stabilization cannot be achieved solely by the flux conserving effect of the external structures, and active control systems are then necessary. An essential component of such control systems is a reconstruction method for the plasma separatrix suitable for real time. We report on a method to infer the separatrix in an FRC using the information of magnetic probes located externally to the plasma. The method uses machine learning methods, namely Bayesian inference of Gaussian Processes, to obtain the most likely plasma current density distribution given the measurements of magnetic field external to the plasma. From the current sources, flux function and in particular separatrix are easily computed. The reconstruction method is non iterative and hence suitable for deterministic real time applications. Validation results with numerical simulations and application to separatrix inference of C-2U plasma discharges will be presented.

  15. Internal and external motivation to respond without sexism.

    Science.gov (United States)

    Klonis, Suzanne C; Plant, E Ashby; Devine, Patricia G

    2005-09-01

    Based on Plant and Devine's (1998) measures of Internal and External Motivation to Respond Without Prejudice toward Blacks, new scales were developed to assess Internal and External Motivation to Respond Without Sexism (IMS-S and EMS-S, respectively). The scales possess good psychometric properties. Providing evidence of convergent and discriminant validity, the IMS-S was strongly related to measures of sexism yet unrelated to measures of social evaluation. The EMS-S was modestly related to both sexism and social evaluative concerns. Providing evidence of predictive validity, participants who were either internally or externally motivated to respond without sexism rated sexist jokes more negatively in a situation discouraging sexism compared to participants low in both sources of motivation. However, only high IMS-S participants rated the jokes negatively whether the situation encouraged or discouraged sexism and whether their response was public or private. Implications for understanding the similarities and differences between sexism and racism are discussed.

  16. A Boltzmann machine for the organization of intelligent machines

    Science.gov (United States)

    Moed, Michael C.; Saridis, George N.

    1989-01-01

    In the present technological society, there is a major need to build machines that would execute intelligent tasks operating in uncertain environments with minimum interaction with a human operator. Although some designers have built smart robots, utilizing heuristic ideas, there is no systematic approach to design such machines in an engineering manner. Recently, cross-disciplinary research from the fields of computers, systems AI and information theory has served to set the foundations of the emerging area of the design of intelligent machines. Since 1977 Saridis has been developing an approach, defined as Hierarchical Intelligent Control, designed to organize, coordinate and execute anthropomorphic tasks by a machine with minimum interaction with a human operator. This approach utilizes analytical (probabilistic) models to describe and control the various functions of the intelligent machine structured by the intuitively defined principle of Increasing Precision with Decreasing Intelligence (IPDI) (Saridis 1979). This principle, even though resembles the managerial structure of organizational systems (Levis 1988), has been derived on an analytic basis by Saridis (1988). The purpose is to derive analytically a Boltzmann machine suitable for optimal connection of nodes in a neural net (Fahlman, Hinton, Sejnowski, 1985). Then this machine will serve to search for the optimal design of the organization level of an intelligent machine. In order to accomplish this, some mathematical theory of the intelligent machines will be first outlined. Then some definitions of the variables associated with the principle, like machine intelligence, machine knowledge, and precision will be made (Saridis, Valavanis 1988). Then a procedure to establish the Boltzmann machine on an analytic basis will be presented and illustrated by an example in designing the organization level of an Intelligent Machine. A new search technique, the Modified Genetic Algorithm, is presented and proved

  17. Using the Spindle Cooling Temperature as a Tool for Compensating the Thermal Deformation of Machines

    Directory of Open Access Journals (Sweden)

    J. Vyroubal

    2010-01-01

    Full Text Available Thermal error compensation of machine tools is a relatively complex problem nowadays. Machine users have very high expectations, and it is necessary to use all means to improve the cutting accuracy of existing machines. This paper deals with a novel approach, which combines standard temperature measurement of a machine tool and new temperature measurement of the spindle cooling liquid. A multinomial regression equation is then used to calculate the compensation correction of the position of the tool. This calculation does not critically overload the control system of the machines, so no external computing hardware is required. The cooling liquid approach improves the accuracy of the machine tool over an operational time of several hours. 

  18. Engineering molecular machines

    Science.gov (United States)

    Erman, Burak

    2016-04-01

    Biological molecular motors use chemical energy, mostly in the form of ATP hydrolysis, and convert it to mechanical energy. Correlated thermal fluctuations are essential for the function of a molecular machine and it is the hydrolysis of ATP that modifies the correlated fluctuations of the system. Correlations are consequences of the molecular architecture of the protein. The idea that synthetic molecular machines may be constructed by designing the proper molecular architecture is challenging. In their paper, Sarkar et al (2016 New J. Phys. 18 043006) propose a synthetic molecular motor based on the coarse grained elastic network model of proteins and show by numerical simulations that motor function is realized, ranging from deterministic to thermal, depending on temperature. This work opens up a new range of possibilities of molecular architecture based engine design.

  19. Boosting Support Vector Machines

    Directory of Open Access Journals (Sweden)

    Elkin Eduardo García Díaz

    2006-11-01

    Full Text Available En este artículo, se presenta un algoritmo de clasificación binaria basado en Support Vector Machines (Máquinas de Vectores de Soporte que combinado apropiadamente con técnicas de Boosting consigue un mejor desempeño en cuanto a tiempo de entrenamiento y conserva características similares de generalización con un modelo de igual complejidad pero de representación más compacta./ In this paper we present an algorithm of binary classification based on Support Vector Machines. It is combined with a modified Boosting algorithm. It run faster than the original SVM algorithm with a similar generalization error and equal complexity model but it has more compact representation.

  20. Quo vadis, Intelligent Machine?

    Directory of Open Access Journals (Sweden)

    Rosemarie Velik

    2010-09-01

    Full Text Available Artificial Intelligence (AI is a branch of computer science concerned with making computers behave like humans. At least this was the original idea. However, it turned out that this is no task easy to be solved. This article aims to give a comprehensible review on the last 60 years of artificial intelligence taking a philosophical viewpoint. It is outlined what happened so far in AI, what is currently going on in this research area, and what can be expected in future. The goal is to mediate an understanding for the developments and changes in thinking in course of time about how to achieve machine intelligence. The clear message is that AI has to join forces with neuroscience and other brain disciplines in order to make a step towards the development of truly intelligent machines.

  1. Introduction to Machine Protection

    CERN Document Server

    Schmidt, R

    2016-01-01

    Protection of accelerator equipment is as old as accelerator technology and was for many years related to high-power equipment. Examples are the protection of powering equipment from overheating (magnets, power converters, high-current cables), of superconducting magnets from damage after a quench and of klystrons. The protection of equipment from beam accidents is more recent, although there was one paper that discussed beam-induced damage for the SLAC linac (Stanford Linear Accelerator Center) as early as in 1967. It is related to the increasing beam power of high-power proton accelerators, to the emission of synchrotron light by electron-positron accelerators and to the increase of energy stored in the beam. Designing a machine protection system requires an excellent understanding of accelerator physics and operation to anticipate possible failures that could lead to damage. Machine protection includes beam and equipment monitoring, a system to safely stop beam operation (e.g. dumping the beam or stopping ...

  2. Technological requirements of profile machining

    Institute of Scientific and Technical Information of China (English)

    PARK Sangchul; CHUNG Yunchan

    2006-01-01

    The term ‘profile machining’is used to refer to the milling of vertical surfaces described by profile curves. Profile machining requires higher precision (1/1000 mm) than regular 3D machining (1/100 mm) with the erosion of sharp vertices should being especially avoided. Although, profile machining is very essential for making trimming and flangedies, it seldom brought into focus. This paper addresses the technological requirements of profile machining including machining width and depth control,minimizing toolware, and protecting sharp vertices. Issues of controller alarms are also addressed.

  3. Machining fiber-reinforced composites

    Science.gov (United States)

    Komanduri, Ranga

    1993-04-01

    Compared to high tool wear and high costs of tooling of fiber-reinforced composites (FRCs), noncontact material-removal processes offer attractive alternative. Noncontact machining methods can also minimize dust, noise, and extensive plastic deformation and consequent heat generation associated with conventional machining of FRCs, espacially those with an epoxy matrix. The paper describes the principles involved in and the details of machining of FRCs by laser machining, water jet-cutting and abrasive water jet-cutting, and electrical discharge machining of composites, as well as the limitations of each method.

  4. Future database machine architectures

    OpenAIRE

    Hsiao, David K.

    1984-01-01

    There are many software database management systems available on many general-purpose computers ranging from micros to super-mainframes. Database machines as backened computers can offload the database management work from the mainframe so that we can retain the same mainframe longer. However, the database backend must also demonstrate lower cost, higher performance, and newer functionality. Some of the fundamental architecture issues in the design of high-performance and great-capacity datab...

  5. Machine Learning at Scale

    OpenAIRE

    Izrailev, Sergei; Stanley, Jeremy M.

    2014-01-01

    It takes skill to build a meaningful predictive model even with the abundance of implementations of modern machine learning algorithms and readily available computing resources. Building a model becomes challenging if hundreds of terabytes of data need to be processed to produce the training data set. In a digital advertising technology setting, we are faced with the need to build thousands of such models that predict user behavior and power advertising campaigns in a 24/7 chaotic real-time p...

  6. Cost of photochemical machining

    OpenAIRE

    Roy, Rajkumar; Allen, David; Zamora, Oscar

    2004-01-01

    Photochemical machining (PCM), also known as photoetching, photofabrication or photochemical milling, is a non-traditional manufacturing method based on the combination of photoresist imaging and chemical etching. PCM uses techniques similar to those employed for the production of printed circuit boards and silicon integrated circuits. The PCM industry plays a valuable worldwide role in the production of metal precision parts and decorative items. Parts produced by PCM are t...

  7. Austempered Ductile Iron Machining

    Science.gov (United States)

    Pilc, Jozef; Šajgalík, Michal; Holubják, Jozef; Piešová, Marianna; Zaušková, Lucia; Babík, Ondrej; Kuždák, Viktor; Rákoci, Jozef

    2015-12-01

    This article deals with the machining of cast iron. In industrial practice, Austempered Ductile Iron began to be used relatively recently. ADI is ductile iron that has gone through austempering to get improved properties, among which we can include strength, wear resistance or noise damping. This specific material is defined also by other properties, such as high elasticity, ductility and endurance against tenigue, which are the properties, that considerably make the tooling characteristic worse.

  8. Quantum Virtual Machine (QVM)

    Energy Technology Data Exchange (ETDEWEB)

    2016-11-18

    There is a lack of state-of-the-art HPC simulation tools for simulating general quantum computing. Furthermore, there are no real software tools that integrate current quantum computers into existing classical HPC workflows. This product, the Quantum Virtual Machine (QVM), solves this problem by providing an extensible framework for pluggable virtual, or physical, quantum processing units (QPUs). It enables the execution of low level quantum assembly codes and returns the results of such executions.

  9. Agent Based Computing Machine

    Science.gov (United States)

    2005-12-09

    be used in Phase 2 to accomplish the following enhancements. Due to the speed and support of MPI for C/C++ on Beowulf clusters , these languages could...1.7 ABC Machine Formal Definition 24 1.8 Computational Analysis 31 1.9 Programming Concepts 34 1.10 Cluster Mapping 38 1.11 Phase 1 Results 43 2...options for hardware implementation are explored including an emulation with a high performance cluster , a high performance silicon chip and the

  10. Magnetic Electrochemical Finishing Machining

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    How to improve the finishing efficiency and surface roughness have been all along the objective of research in electrochemical polishing. However, the research activity, i.e. during electrochemical polishing, directly introduce the magnetic field to study how the magnetic field influences on the finishing efficiency, quality and the electrochemical process in the field of finishing machining technology, is insufficient. When introducing additional magnetic field in the traditional electrochemical pol...

  11. FMS precision machining

    Energy Technology Data Exchange (ETDEWEB)

    Burnham, M.W.

    1980-01-01

    In evaluating the technical obstacles and accuracy limits to producing a Precision Flexible Manufacturing System, a current system is subjected to an error budget analysis. It is noted that to make complex part geometries with tolerances in the lower thousandths range, machining to tenths is required for process control. Actual parts made to tenths are illustrated, along with a discussion of the requirements for automation and for process control.

  12. Machine on Trial

    Science.gov (United States)

    2012-06-01

    front of the Judge, how did we come to justify the ethical use of such a machine? The Judge called for a recess so that he could further educate ...commerce, where money would change hands, or for the purposes of controlling critical systems.”29 The initial group that set up the ARPANET did not... EBook of Fundamental Principals of the Metaphysic of Morals, May, 2004 [ EBook #5682 translated by Thomas Kingsmill Abbott, 12. http://manybooks.net

  13. Machines électriques tournantes conception, dimensionnement, fonctionnement

    CERN Document Server

    Laporte, Bernard

    2007-01-01

    L'ouvrage revient aux notions fondamentales, pour introduire les machines électriques tournantes et pour élaborer les outils nécessaires à leur conception, leur dimensionnement et leur modélisation externe. Parmi les nombreux points abordés, une place importante est accordée à la conception optimale de pôles à aimants, à la conception des enroulements des machines à courant alternatif, au projet de dimensionnement des machines et aux différentes formulations en régime quelconque. Les quatre derniers chapitres sont consacrés aux principales machines électriques. Ils constituent chacun un exposé autonome, fournissant, pour la machine considérée, les équations instantanées, puis en régime établi, la mise en œuvre, les essais et les performances. C'est un ouvrage de référence pour l'enseignement des machines électriques en Master et en Ecoles d'ingénieurs. Il devrait trouver un bon accueil auprès des constructeurs et auprès de tous ceux qui, s'intéressant de près ou de loin aux mac...

  14. Electrochemical Discharge Machining Process

    Directory of Open Access Journals (Sweden)

    Anjali V. Kulkarni

    2007-09-01

    Full Text Available Electrochemical discharge machining process is evolving as a promising micromachiningprocess. The experimental investigations in the present work substantiate this trend. In the presentwork, in situ, synchronised, transient temperature and current measurements have been carriedout. The need for the transient measurements arose due to the time-varying nature of the dischargeformation and time varying circuit current. Synchronised and transient measurements revealedthe discrete nature of the process. It also helped in formulating the basic mechanism for thedischarge formation and the material removal in the process. Temperature profile on workpieceand in electrochemical discharge machining cell is experimentally measured using pyrometer,and two varieties of K-type thermocouples. Surface topography of the discharge-affected zoneson the workpiece has been carried out using scanning electron microscope. Measurements andsurface topographical studies reveal the potential use of this process for machining in micronregime. With careful experimental set-up design, suitable supply voltage and its polarity, theprocess can be applied for both micromachining and micro-deposition. It can be extended formachining and or deposition of wide range of materials.

  15. Introduction: Minds, Bodies, Machines

    Directory of Open Access Journals (Sweden)

    Deirdre Coleman

    2008-10-01

    Full Text Available This issue of 19 brings together a selection of essays from an interdisciplinary conference on 'Minds, Bodies, Machines' convened last year by Birkbeck's Centre for Nineteenth-Century Studies, University of London, in partnership with the English programme, University of Melbourne and software developers Constraint Technologies International (CTI. The conference explored the relationship between minds, bodies and machines in the long nineteenth century, with a view to understanding the history of our technology-driven, post-human visions. It is in the nineteenth century that the relationship between the human and the machine under post-industrial capitalism becomes a pervasive theme. From Blake on the mills of the mind by which we are enslaved, to Carlyle's and Arnold's denunciation of the machinery of modern life, from Dickens's sooty fictional locomotive Mr Pancks, who 'snorted and sniffed and puffed and blew, like a little labouring steam-engine', and 'shot out […]cinders of principles, as if it were done by mechanical revolvency', to the alienated historical body of the late-nineteenth-century factory worker under Taylorization, whose movements and gestures were timed, regulated and rationalised to maximize efficiency; we find a cultural preoccupation with the mechanisation of the nineteenth-century human body that uncannily resonates with modern dreams and anxieties around technologies of the human.

  16. Machine Learning in Medicine.

    Science.gov (United States)

    Deo, Rahul C

    2015-11-17

    Spurred by advances in processing power, memory, storage, and an unprecedented wealth of data, computers are being asked to tackle increasingly complex learning tasks, often with astonishing success. Computers have now mastered a popular variant of poker, learned the laws of physics from experimental data, and become experts in video games - tasks that would have been deemed impossible not too long ago. In parallel, the number of companies centered on applying complex data analysis to varying industries has exploded, and it is thus unsurprising that some analytic companies are turning attention to problems in health care. The purpose of this review is to explore what problems in medicine might benefit from such learning approaches and use examples from the literature to introduce basic concepts in machine learning. It is important to note that seemingly large enough medical data sets and adequate learning algorithms have been available for many decades, and yet, although there are thousands of papers applying machine learning algorithms to medical data, very few have contributed meaningfully to clinical care. This lack of impact stands in stark contrast to the enormous relevance of machine learning to many other industries. Thus, part of my effort will be to identify what obstacles there may be to changing the practice of medicine through statistical learning approaches, and discuss how these might be overcome.

  17. Behind the machines

    CERN Document Server

    Laëtitia Pedroso

    2010-01-01

    One of the first things we think about when someone mentions physics is the machines. But behind the machines, there are the men and women who design, build and operate them. In an exhibition at the Thinktank planetarium’s art gallery in Birmingham (UK), Claudia Marcelloni and her husband Neal Hartman—she is a photographer and Outreach Officer for ATLAS, while he is an engineer working on the ATLAS pixel detector—explore the human side of scientists.   The exhibition at the Thinktank Planetarium art gallery, Birmingham (UK). It all began two years ago with the publication of Exploring the mystery of matter, a book about ATLAS. “A Norwegian physicist friend, Heidi Sandaker, saw my photographs and suggested that I display them in a museum. I thought this was an interesting idea, except that the photos consisted entirely of depictions of machinery, with human beings completely absent. For me, showing the people who are behind the machines and the fascination ...

  18. External fixators in haemophilia.

    Science.gov (United States)

    Lee, V; Srivastava, A; PalaniKumar, C; Daniel, A J; Mathews, V; Babu, N; Chandy, M; Sundararaj, G D

    2004-01-01

    External fixators (EF) are not commonly used for patients with haemophilia. We describe the use of EF (Ilizarov, AO- uni- and bi-planar fixators and Charnley clamp) in nine patients (mean age: 19.2 years; range: 9-37) with haemophilia for the following indications - arthrodesis of infected joints, treatment of open fractures and osteoclasis. EF required an average of nine skin punctures [range: 4-17 were maintained for a period of 15 weeks (range: 8-29.5), without regular factor replacement, till bone healing was adequate and were removed with a single dose of factor infusion]. The mean preoperative factor level achieved was 85% (range: 64-102%). Much lower levels were subsequently maintained till wound healing. The average total factor consumption was 430 IU kg(-1) (range: 240-870), administered over a period of 17 days (range: 9-44). There were no major complications related to EF except in a patient who developed inhibitors. In conclusion, EF can be used safely in haemophilic patients who do not have inhibitors and does not require prolonged factor replacement.

  19. Soft computing in machine learning

    CERN Document Server

    Park, Jooyoung; Inoue, Atsushi

    2014-01-01

    As users or consumers are now demanding smarter devices, intelligent systems are revolutionizing by utilizing machine learning. Machine learning as part of intelligent systems is already one of the most critical components in everyday tools ranging from search engines and credit card fraud detection to stock market analysis. You can train machines to perform some things, so that they can automatically detect, diagnose, and solve a variety of problems. The intelligent systems have made rapid progress in developing the state of the art in machine learning based on smart and deep perception. Using machine learning, the intelligent systems make widely applications in automated speech recognition, natural language processing, medical diagnosis, bioinformatics, and robot locomotion. This book aims at introducing how to treat a substantial amount of data, to teach machines and to improve decision making models. And this book specializes in the developments of advanced intelligent systems through machine learning. It...

  20. Machine Translation Effect on Communication

    DEFF Research Database (Denmark)

    Jensen, Mika Yasuoka; Bjørn, Pernille

    2011-01-01

    Intercultural collaboration facilitated by machine translation has gradually spread in various settings. Still, little is known as for the practice of machine-translation mediated communication. This paper investigates how machine translation affects intercultural communication in practice. Based...... determines communication process largely, our data indicates communication relies more on a dynamic process where participants establish common ground than on reproducibility and grammatical accuracy.......Intercultural collaboration facilitated by machine translation has gradually spread in various settings. Still, little is known as for the practice of machine-translation mediated communication. This paper investigates how machine translation affects intercultural communication in practice. Based...... on communication in which multilingual communication system is applied, we identify four communication types and its’ influences on stakeholders’ communication process, especially focusing on establishment and maintenance of common ground. Different from our expectation that quality of machine translation results...

  1. Skepticism, contextualism, externalism and modality

    National Research Council Canada - National Science Library

    Ron Wilburn

    2006-01-01

    .... However, because efforts to contextualize externalism via subjunctive conditional analysis court circularity, it is only on an internalistic interpretation that contextualist strategies can even be motivated...

  2. Screening for Prediabetes Using Machine Learning Models

    Directory of Open Access Journals (Sweden)

    Soo Beom Choi

    2014-01-01

    Full Text Available The global prevalence of diabetes is rapidly increasing. Studies support the necessity of screening and interventions for prediabetes, which could result in serious complications and diabetes. This study aimed at developing an intelligence-based screening model for prediabetes. Data from the Korean National Health and Nutrition Examination Survey (KNHANES were used, excluding subjects with diabetes. The KNHANES 2010 data (n=4685 were used for training and internal validation, while data from KNHANES 2011 (n=4566 were used for external validation. We developed two models to screen for prediabetes using an artificial neural network (ANN and support vector machine (SVM and performed a systematic evaluation of the models using internal and external validation. We compared the performance of our models with that of a screening score model based on logistic regression analysis for prediabetes that had been developed previously. The SVM model showed the areas under the curve of 0.731 in the external datasets, which is higher than those of the ANN model (0.729 and the screening score model (0.712, respectively. The prescreening methods developed in this study performed better than the screening score model that had been developed previously and may be more effective method for prediabetes screening.

  3. Design and analysis of linear fault-tolerant permanent-magnet vernier machines.

    Science.gov (United States)

    Xu, Liang; Ji, Jinghua; Liu, Guohai; Du, Yi; Liu, Hu

    2014-01-01

    This paper proposes a new linear fault-tolerant permanent-magnet (PM) vernier (LFTPMV) machine, which can offer high thrust by using the magnetic gear effect. Both PMs and windings of the proposed machine are on short mover, while the long stator is only manufactured from iron. Hence, the proposed machine is very suitable for long stroke system applications. The key of this machine is that the magnetizer splits the two movers with modular and complementary structures. Hence, the proposed machine offers improved symmetrical and sinusoidal back electromotive force waveform and reduced detent force. Furthermore, owing to the complementary structure, the proposed machine possesses favorable fault-tolerant capability, namely, independent phases. In particular, differing from the existing fault-tolerant machines, the proposed machine offers fault tolerance without sacrificing thrust density. This is because neither fault-tolerant teeth nor the flux-barriers are adopted. The electromagnetic characteristics of the proposed machine are analyzed using the time-stepping finite-element method, which verifies the effectiveness of the theoretical analysis.

  4. ExternE transport methodology for external cost evaluation of air pollution

    DEFF Research Database (Denmark)

    Jensen, S. S.; Berkowicz, R.; Brandt, J.

    The report describes how the human exposure estimates based on NERI's human exposure modelling system (AirGIS) can improve the Danish data used for exposure factors in the ExternE Transport methodology. Initially, a brief description of the ExternE Tranport methodology is given and it is summaris...... how the methodology has been applied so far in a previous Danish study. Finally, results of a case study are reported. Exposure factors have been calculated for various urban categories in the Greater Copenhagen Area...

  5. ExternE transport methodology for external cost evaluation of air pollution (DK)

    Energy Technology Data Exchange (ETDEWEB)

    Solvang Jensen, S.; Berkowicz, R.; Brandt, J. [National Environmental Research Inst., Dept. of Atmospheric Environment (Denmark); Willumsen, E.; Kristensen, N.B. [COWI (Denmark)

    2004-07-01

    The report describes how the human exposure estimates based on NERI's human exposure modelling system (AiGIS) can improve the Danish data used for exposure factors in the ExternE Transport methodology. Inititally, a brief description of the ExternE Transport methodology is given and it is summarised how the methodology has been applied so far in a previous Danish study. Finally, results of a case study are reported. Exposure factors have been calculated for various urban categories in the Greater Copenhagen Area. (au)

  6. External coating of colonic anastomoses

    DEFF Research Database (Denmark)

    Pommergaard, Hans-Christian; Achiam, Michael Patrick; Rosenberg, Jacob

    2012-01-01

    Colon anastomotic leakage remains both a frequent and serious complication in gastrointestinal surgery. External coating of colonic anastomoses has been proposed as a means to lower the rate of this complication. The aim of this review was to evaluate existing studies on external coating of colonic...

  7. Retrofitting Systems for External Walls

    DEFF Research Database (Denmark)

    Rose, Jørgen

    1997-01-01

    In this report, 9 different external and internal retrofitting systems are analyzed using numerical calculations. The analysis focuses on the thermal bridge effects in the different systems, and on this basis it is discussed whether internal or external retrofitting has the most advantages...

  8. Mineral mining machines

    Energy Technology Data Exchange (ETDEWEB)

    Mc Gaw, B.H.

    1984-01-01

    A machine for mining minerals is patented. It is a cutter loader with a drum actuating element of the worm type equipped with a multitude of cutting teeth reinforced with tungsten carbide. A feature of the patented machine is that all of the cutting teeth and holders on the drum have the identical design. This is achieved through selecting a slant angle for the cutting teeth which is the mean between the slant angle of the conventional radial teeth and the slant angle of the advance teeth. This, in turn, is provided thanks to the corresponding slant of the holders relative to the drum and (or) the slant of the cutting part of the teeth relative to their stems. Thus, the advance teeth projecting beyond the surface of the drum on the face side and providing upper and lateral clearances have the same angle of attack as the radial teeth, that is, from 20 to 35 degrees. A series of modifications of the cutting teeth is patented. One of the designs allows the cutting tooth to occupy a varying position relative to the drum, from the conventional vertical to an inverted, axially projecting position. In the last case the tooth in the extraction process provides the upper and lateral clearances for the drum on the face side. Among the different modifications of the cutting teeth, a design is proposed which provides for the presence of a stem which is shaped like a truncated cone. This particular stem is designed for use jointly with a wedge which unfastens the teeth and is placed in a holder. The latter is completed in a transverse slot thanks to which the rear end of the stem is compressed, which simplifies replacement of a tooth. Channels are provided in the patented machine for feeding water to the worm spiral, the holders and the cutting teeth themselves in order to deal with dust.

  9. Advanced Machine learning Algorithm Application for Rotating Machine Health Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Kanemoto, Shigeru; Watanabe, Masaya [The University of Aizu, Aizuwakamatsu (Japan); Yusa, Noritaka [Tohoku University, Sendai (Japan)

    2014-08-15

    The present paper tries to evaluate the applicability of conventional sound analysis techniques and modern machine learning algorithms to rotating machine health monitoring. These techniques include support vector machine, deep leaning neural network, etc. The inner ring defect and misalignment anomaly sound data measured by a rotating machine mockup test facility are used to verify the above various kinds of algorithms. Although we cannot find remarkable difference of anomaly discrimination performance, some methods give us the very interesting eigen patterns corresponding to normal and abnormal states. These results will be useful for future more sensitive and robust anomaly monitoring technology.

  10. Diamond Measuring Machine

    Energy Technology Data Exchange (ETDEWEB)

    Krstulic, J.F.

    2000-01-27

    The fundamental goal of this project was to develop additional capabilities to the diamond measuring prototype, work out technical difficulties associated with the original device, and perform automated measurements which are accurate and repeatable. For this project, FM and T was responsible for the overall system design, edge extraction, and defect extraction and identification. AccuGem provided a lab and computer equipment in Lawrence, 3D modeling, industry expertise, and sets of diamonds for testing. The system executive software which controls stone positioning, lighting, focusing, report generation, and data acquisition was written in Microsoft Visual Basic 6, while data analysis and modeling were compiled in C/C++ DLLs. All scanning parameters and extracted data are stored in a central database and available for automated analysis and reporting. The Phase 1 study showed that data can be extracted and measured from diamond scans, but most of the information had to be manually extracted. In this Phase 2 project, all data required for geometric modeling and defect identification were automatically extracted and passed to a 3D modeling module for analysis. Algorithms were developed which automatically adjusted both light levels and stone focus positioning for each diamond-under-test. After a diamond is analyzed and measurements are completed, a report is printed for the customer which shows carat weight, summarizes stone geometry information, lists defects and their size, displays a picture of the diamond, and shows a plot of defects on a top view drawing of the stone. Initial emphasis of defect extraction was on identification of feathers, pinpoints, and crystals. Defects were plotted color-coded by industry standards for inclusions (red), blemishes (green), and unknown defects (blue). Diamonds with a wide variety of cut quality, size, and number of defects were tested in the machine. Edge extraction, defect extraction, and modeling code were tested for

  11. Tribology in machine design

    CERN Document Server

    Stolarski, T A

    1990-01-01

    Tribology in Machine Design aims to promote a better appreciation of the increasingly important role played by tribology at the design stage in engineering. This book shows how algorithms developed from the basic principles of tribology can be used in a range of practical applications. The concept of tribodesign is introduced in Chapter 1. Chapter 2 is devoted to a brief discussion of the basic principles of tribology, including some concepts and models of lubricated wear and friction under complex kinematic conditions. Elements of contact mechanics, presented in Chapter 3, are confined to the

  12. Quantum adiabatic machine learning

    CERN Document Server

    Pudenz, Kristen L

    2011-01-01

    We develop an approach to machine learning and anomaly detection via quantum adiabatic evolution. In the training phase we identify an optimal set of weak classifiers, to form a single strong classifier. In the testing phase we adiabatically evolve one or more strong classifiers on a superposition of inputs in order to find certain anomalous elements in the classification space. Both the training and testing phases are executed via quantum adiabatic evolution. We apply and illustrate this approach in detail to the problem of software verification and validation.

  13. Daphne machine project

    Energy Technology Data Exchange (ETDEWEB)

    Vignola, G. and Daphne Project Team [Istituto Nazionale di Fisica Nucleare, Frascati (Italy)

    1996-07-01

    Daphne, a high luminosity e{sup +}/e{sup -} {Phi} factory, is presently under construction in Frascati. The beginning of the collider commissioning is scheduled by winter 1997, with a short term luminosity goal L=1.3 10{sup 32} cm{sup -2} sec{sup -1}. Daphne shall be the first of the new generation of very high luminosity colliders, called factories, to come in operation. Other factories under construction are PEP-II and KEK-B: first collision, for both machines, is planned for 1998.

  14. CENTRIFUGAL CASTING MACHINE

    Science.gov (United States)

    Shuck, A.B.

    1958-04-01

    A device is described that is specifically designed to cast uraniumn fuel rods in a vacuunn, in order to obtain flawless, nonoxidized castings which subsequently require a maximum of machining or wastage of the expensive processed material. A chamber surrounded with heating elements is connected to the molds, and the entire apparatus is housed in an airtight container. A charge of uranium is placed in the chamber, heated, then is allowed to flow into the molds While being rotated. Water circulating through passages in the molds chills the casting to form a fine grained fuel rod in nearly finished form.

  15. Electrical machines with Matlab

    CERN Document Server

    Gonen, Turan

    2011-01-01

    Basic ConceptsDistribution SystemImpact of Dispersed Storage and GenerationBrief Overview of Basic Electrical MachinesReal and Reactive Powers in Single-Phase AC CircuitsThree-Phase CircuitsThree-Phase SystemsUnbalanced Three-Phase LoadsMeasurement of Average Power in Three-Phase CircuitsPower Factor CorrectionMagnetic CircuitsMagnetic Field of Current-Carrying ConductorsAmpère's Magnetic Circuital LawMagnetic CircuitsMagnetic Circuit with Air GapBrief Review of FerromagnetismMagnetic Core LossesHow to Determine Flux for a Given MMFPermanent MagnetsTransformersTransformer ConstructionBrief Rev

  16. Performance Targets and External Benchmarking

    DEFF Research Database (Denmark)

    Friis, Ivar; Hansen, Allan; Vámosi, Tamás S.

    Research on relative performance measures, transfer pricing, beyond budgeting initiatives, target costing, piece rates systems and value based management has for decades underlined the importance of external benchmarking in performance management. Research conceptualises external benchmarking...... the conditions upon which the market mechanism is performing within organizations. This paper aims to contribute to research by providing more insight to the conditions for the use of external benchmarking as an element in performance management in organizations. Our study explores a particular type of external...... towards the conditions for the use of the external benchmarks we provide more insights to some of the issues and challenges that are related to using this mechanism for performance management and advance competitiveness in organizations....

  17. Machining of Complex Sculptured Surfaces

    CERN Document Server

    2012-01-01

    The machining of complex sculptured surfaces is a global technological topic in modern manufacturing with relevance in both industrialized and emerging in countries particularly within the moulds and dies sector whose applications include highly technological industries such as the automotive and aircraft industry. Machining of Complex Sculptured Surfaces considers new approaches to the manufacture of moulds and dies within these industries. The traditional technology employed in the manufacture of moulds and dies combined conventional milling and electro-discharge machining (EDM) but this has been replaced with  high-speed milling (HSM) which has been applied in roughing, semi-finishing and finishing of moulds and dies with great success. Machining of Complex Sculptured Surfaces provides recent information on machining of complex sculptured surfaces including modern CAM systems and process planning for three and five axis machining as well as explanations of the advantages of HSM over traditional methods ra...

  18. Learning thermodynamics with Boltzmann machines

    Science.gov (United States)

    Torlai, Giacomo; Melko, Roger G.

    2016-10-01

    A Boltzmann machine is a stochastic neural network that has been extensively used in the layers of deep architectures for modern machine learning applications. In this paper, we develop a Boltzmann machine that is capable of modeling thermodynamic observables for physical systems in thermal equilibrium. Through unsupervised learning, we train the Boltzmann machine on data sets constructed with spin configurations importance sampled from the partition function of an Ising Hamiltonian at different temperatures using Monte Carlo (MC) methods. The trained Boltzmann machine is then used to generate spin states, for which we compare thermodynamic observables to those computed by direct MC sampling. We demonstrate that the Boltzmann machine can faithfully reproduce the observables of the physical system. Further, we observe that the number of neurons required to obtain accurate results increases as the system is brought close to criticality.

  19. Machine learning with R cookbook

    CERN Document Server

    Chiu, Yu-Wei

    2015-01-01

    If you want to learn how to use R for machine learning and gain insights from your data, then this book is ideal for you. Regardless of your level of experience, this book covers the basics of applying R to machine learning through to advanced techniques. While it is helpful if you are familiar with basic programming or machine learning concepts, you do not require prior experience to benefit from this book.

  20. Machine learning in healthcare informatics

    CERN Document Server

    Acharya, U; Dua, Prerna

    2014-01-01

    The book is a unique effort to represent a variety of techniques designed to represent, enhance, and empower multi-disciplinary and multi-institutional machine learning research in healthcare informatics. The book provides a unique compendium of current and emerging machine learning paradigms for healthcare informatics and reflects the diversity, complexity and the depth and breath of this multi-disciplinary area. The integrated, panoramic view of data and machine learning techniques can provide an opportunity for novel clinical insights and discoveries.

  1. Autocoding State Machine in Erlang

    DEFF Research Database (Denmark)

    Guo, Yu; Hoffman, Torben; Gunder, Nicholas

    2008-01-01

    This paper presents an autocoding tool suit, which supports development of state machine in a model-driven fashion, where models are central to all phases of the development process. The tool suit, which is built on the Eclipse platform, provides facilities for the graphical specification...... of a state machine model. Once the state machine is specified, it is used as input to a code generation engine that generates source code in Erlang....

  2. Stacked Extreme Learning Machines.

    Science.gov (United States)

    Zhou, Hongming; Huang, Guang-Bin; Lin, Zhiping; Wang, Han; Soh, Yeng Chai

    2015-09-01

    Extreme learning machine (ELM) has recently attracted many researchers' interest due to its very fast learning speed, good generalization ability, and ease of implementation. It provides a unified solution that can be used directly to solve regression, binary, and multiclass classification problems. In this paper, we propose a stacked ELMs (S-ELMs) that is specially designed for solving large and complex data problems. The S-ELMs divides a single large ELM network into multiple stacked small ELMs which are serially connected. The S-ELMs can approximate a very large ELM network with small memory requirement. To further improve the testing accuracy on big data problems, the ELM autoencoder can be implemented during each iteration of the S-ELMs algorithm. The simulation results show that the S-ELMs even with random hidden nodes can achieve similar testing accuracy to support vector machine (SVM) while having low memory requirements. With the help of ELM autoencoder, the S-ELMs can achieve much better testing accuracy than SVM and slightly better accuracy than deep belief network (DBN) with much faster training speed.

  3. Interaction with Machine Improvisation

    Science.gov (United States)

    Assayag, Gerard; Bloch, George; Cont, Arshia; Dubnov, Shlomo

    We describe two multi-agent architectures for an improvisation oriented musician-machine interaction systems that learn in real time from human performers. The improvisation kernel is based on sequence modeling and statistical learning. We present two frameworks of interaction with this kernel. In the first, the stylistic interaction is guided by a human operator in front of an interactive computer environment. In the second framework, the stylistic interaction is delegated to machine intelligence and therefore, knowledge propagation and decision are taken care of by the computer alone. The first framework involves a hybrid architecture using two popular composition/performance environments, Max and OpenMusic, that are put to work and communicate together, each one handling the process at a different time/memory scale. The second framework shares the same representational schemes with the first but uses an Active Learning architecture based on collaborative, competitive and memory-based learning to handle stylistic interactions. Both systems are capable of processing real-time audio/video as well as MIDI. After discussing the general cognitive background of improvisation practices, the statistical modelling tools and the concurrent agent architecture are presented. Then, an Active Learning scheme is described and considered in terms of using different improvisation regimes for improvisation planning. Finally, we provide more details about the different system implementations and describe several performances with the system.

  4. Vector control of induction machines

    CERN Document Server

    Robyns, Benoit

    2012-01-01

    After a brief introduction to the main law of physics and fundamental concepts inherent in electromechanical conversion, ""Vector Control of Induction Machines"" introduces the standard mathematical models for induction machines - whichever rotor technology is used - as well as several squirrel-cage induction machine vector-control strategies. The use of causal ordering graphs allows systematization of the design stage, as well as standardization of the structure of control devices. ""Vector Control of Induction Machines"" suggests a unique approach aimed at reducing parameter sensitivity for

  5. Beam Transfer and Machine Protection

    CERN Document Server

    Kain, V

    2016-01-01

    Beam transfer, such as injection into or extraction from an accelerator, is one of the most critical moments in terms of machine protection in a high-intensity machine. Special equipment is used and machine protection aspects have to be taken into account in the design of the beam transfer concepts. A brief introduction of the principles of beam transfer and the equipment involved will be given in this lecture. The main concepts of machine protection for injection and extraction will be presented, with examples from the CERN SPS and LHC.

  6. Turing Automata and Graph Machines

    Directory of Open Access Journals (Sweden)

    Miklós Bartha

    2010-06-01

    Full Text Available Indexed monoidal algebras are introduced as an equivalent structure for self-dual compact closed categories, and a coherence theorem is proved for the category of such algebras. Turing automata and Turing graph machines are defined by generalizing the classical Turing machine concept, so that the collection of such machines becomes an indexed monoidal algebra. On the analogy of the von Neumann data-flow computer architecture, Turing graph machines are proposed as potentially reversible low-level universal computational devices, and a truly reversible molecular size hardware model is presented as an example.

  7. External costs related to power production technologies. ExternE national implementation for Denmark

    Energy Technology Data Exchange (ETDEWEB)

    Schleisner, L.; Sieverts Nielsen, P.

    1997-12-01

    The objective of the ExternE National Implementation project has been to establish a comprehensive and comparable set of data on externalities of power generation for all EU member states and Norway. The tasks include the application of the ExternE methodology to the most important fuel cycles for each country as well as to update the already existing results; to aggregate these site- and technology-specific results to more general figures. The current report covers the results of the national implementation for Denmark. Three different fuel cycles have been chosen as case studies. These are fuel cycles for an offshore wind farm and a wind farm on land, a decentralised CHP plant based on natural gas and a decentralised CHP plant based on biogas. The report covers all the details of the application of the methodology to these fuel cycles aggregation to a national level. (au) EU-JOULE 3. 59 tabs., 25 ills., 61 refs.

  8. Virtual Machine Images Management in Cloud Environments

    CERN Document Server

    CERN. Geneva

    2017-01-01

    Nowadays, the demand for scalability in distributed systems has led a design philosophy in which virtual resources need to be configured in a flexible way to provide services to a large number of users. The configuration and management of such an architecture is challenging (e.g.: 100,000 compute cores on the private cloud together with thousands of cores on external cloud resources). There is the need to process CPU intensive work whilst ensuring that the resources are shared fairly between different users of the system, and guarantee that all nodes are up to date with new images containing the latest software configurations. Different types of automated systems can be used to facilitate the orchestration. CERN’s current system, composed of different technologies such as OpenStack, Packer, Puppet, Rundeck and Docker will be introduced and explained, together with the process used to create new Virtual Machines images at CERN.

  9. Influences of external factors on the energy conversion and productivity of Scenedesmus sp. in mass culture

    NARCIS (Netherlands)

    Wesselius, J.C.

    1973-01-01

    Experiments about the influence of external factors on the energy conversion in mass cultures of Scenedesmus are described in this thesis. Several types of culture vessels were used in the laboratory as well as in the open. Demonstration models of Miele washing machines with a volume of 50 l were us

  10. On optimization of internal/external spur gears tooth bending strength

    DEFF Research Database (Denmark)

    Pedersen, Niels Leergaard

    2014-01-01

    level at the tooth root. As with most machine elements the design/geometry is defined in standards (ISO). The present work focuses on changing the tooth root design of both external and internal gears, in order to improve the stress concentration factor. The design changes made are compliant...

  11. Influences of external factors on the energy conversion and productivity of Scenedesmus sp. in mass culture

    NARCIS (Netherlands)

    Wesselius, J.C.

    1973-01-01

    Experiments about the influence of external factors on the energy conversion in mass cultures of Scenedesmus are described in this thesis. Several types of culture vessels were used in the laboratory as well as in the open. Demonstration models of Miele washing machine

  12. Production Machine Shop Employment Competencies. Part Four: The Milling Machine.

    Science.gov (United States)

    Bishart, Gus; Werner, Claire

    Competencies for production machine shop are provided for the fourth of four topic areas: the milling machine. Each competency appears in a one-page format. It is presented as a goal statement followed by one or more "indicator" statements, which are performance objectives describing an ability that, upon attainment, will establish…

  13. Standardized Curriculum for Machine Tool Operation/Machine Shop.

    Science.gov (United States)

    Mississippi State Dept. of Education, Jackson. Office of Vocational, Technical and Adult Education.

    Standardized vocational education course titles and core contents for two courses in Mississippi are provided: machine tool operation/machine shop I and II. The first course contains the following units: (1) orientation; (2) shop safety; (3) shop math; (4) measuring tools and instruments; (5) hand and bench tools; (6) blueprint reading; (7)…

  14. External fuel thermionic reactor system.

    Science.gov (United States)

    Mondt, J. F.; Peelgren, M. L.

    1971-01-01

    Thermionic reactors are prime candidates for nuclear electric propulsion. The national thermionic reactor effort is concentrated on the flashlight concept with the external-fuel concept as the backup. The external-fuel concept is very adaptable to a completely modular power subsystem which is attractive for highly reliable long-life applications. The 20- to 25-cm long, externally-fueled converters have been designed, fabricated, and successfully tested with many thermal cycles by electrical heating. However, difficulties have been encountered during encapsulation for nuclear heated tests and none have been started to date. These nuclear tests are required to demonstrate the concept feasibility.

  15. Internally geared screw machines with ported end plates

    Science.gov (United States)

    Read, M. G.; Smith, I. K.; Stosic, N.

    2017-08-01

    It is possible to design cylindrical helical gearing profiles such that an externally lobed inner gear rotates inside an internally lobed outer gear while maintaining continuous lines of contact between the gears. The continuous contact between the inner and outer rotors (analogous to the main and gate rotors in a conventional screw machine) creates a series of separate working chambers. In this type of machine the rotors have parallel axes of rotation, and if both rotors are free to rotate about their own axes, these axes can be fixed in space. The use of ported end plates is proposed to control the period during which fluid is allowed to enter or leave the working chambers of the internally geared screw machine. As with conventional screw machines, these internally geared rotors can then be used to achieve compression or expansion of a trapped mass of fluid, and the machine geometry can be designed in order to optimise performance for particular applications. This paper describes the geometrical analysis of some simple rotor profiles and explores the effect on rotor torques for particular applications of this novel screw configuration.

  16. The Protective Effects of Adaptability, Study Skills, and Social Skills on Externalizing Student-Teacher Relationships

    Science.gov (United States)

    Fisher, Sycarah D.; Reynolds, Jennifer L.; Sheehan, Chelsea E.

    2016-01-01

    Although students with externalizing behaviors inherently exhibit behaviors that contribute to poor teacher relationships, little research has examined the positive characteristics these students may possess that serve to facilitate positive teacher relationships. This study explores the moderating effects of adaptability, social skills, and study…

  17. Combination of external loads

    Energy Technology Data Exchange (ETDEWEB)

    Frandsen, S.; Tarp Johansen, N.J.; Joergensen, H. [Forskningscenter Risoe, Roskilde (Denmark); Gravesen, H.; Soerensen, S.L. [Carl Bro, Glostrup (Denmark); Pedersen, J. [Elsam Engineering, Fredericia (Denmark); Zorn, R.; Hvidberg Knudsen, M. [DHI Water and Environment, Hoersholm (Denmark); Voelund, P. [Energi E2, Koebenhavn (Denmark)

    2003-09-01

    The project onbectives have been: To improve and consequently opimise the basis for design of offshore wind turbines. This is done through 1) mapping the wind, wave ice and current as well as correlations of these, and 2) by clarifyring how these external conditions transform into loads. A comprehensive effort has been made to get a thorough understanding of the uncertainties that govern the reliability of wind turbines with respect to wind and wave loading. One of the conclusions is that the reliability of wind turbines is generally lower, than the average reliability of building structures that are subject not only to environmental loads, which are very uncertain, but also imposed loads and self weight, which are less uncertain than the environmental loads. The implication is that, at the moment lower load partial safety factors for onshore wind turbines cannot be recommended. For the combination of wind and wave design loads the problem is twofold: 1). A very conservative design will be generated by simply adding the individual wind and wave design loads disregarding the independence of the short-term fluctuations of wind and wave loads. 2). Characteristic values and partial safety factors for wind and wave loads are not defined similarly. This implies that the reliability levels of turbine support structures subject to purely aerodynamic loads and subject to purely hydrodynamic loads are not identical. For the problem of combining aerodynamic design loads and hydrodynamic design loads two results have been obtained in the project: 1). By simple means a site specific wave load safety factor rendering the same safety level for hydrodynamic loads as for aerodynamic loads is derived, and next, by direct square summation of extreme fluctuations, the wind and wave load safety factors are weighted. 2). Under the assumptions that a deep water site is considered and that the wave loading is a fifty-fifty mix of drag and inertia the same wind and wave load safety factor

  18. Machine performance assessment and enhancement for a hexapod machine

    Energy Technology Data Exchange (ETDEWEB)

    Mou, J.I. [Arizona State Univ., Tempe, AZ (United States); King, C. [Sandia National Labs., Livermore, CA (United States). Integrated Manufacturing Systems Center

    1998-03-19

    The focus of this study is to develop a sensor fused process modeling and control methodology to model, assess, and then enhance the performance of a hexapod machine for precision product realization. Deterministic modeling technique was used to derive models for machine performance assessment and enhancement. Sensor fusion methodology was adopted to identify the parameters of the derived models. Empirical models and computational algorithms were also derived and implemented to model, assess, and then enhance the machine performance. The developed sensor fusion algorithms can be implemented on a PC-based open architecture controller to receive information from various sensors, assess the status of the process, determine the proper action, and deliver the command to actuators for task execution. This will enhance a hexapod machine`s capability to produce workpieces within the imposed dimensional tolerances.

  19. Theory and practice in machining systems

    CERN Document Server

    Ito, Yoshimi

    2017-01-01

    This book describes machining technology from a wider perspective by considering it within the machining space. Machining technology is one of the metal removal activities that occur at the machining point within the machining space. The machining space consists of structural configuration entities, e.g., the main spindle, the turret head and attachments such the chuck and mandrel, and also the form-generating movement of the machine tool itself. The book describes fundamental topics, including the form-generating movement of the machine tool and the important roles of the attachments, before moving on to consider the supply of raw materials into the machining space, and the discharge of swarf from it, and then machining technology itself. Building on the latest research findings “Theory and Practice in Machining System” discusses current challenges in machining. Thus, with the inclusion of introductory and advanced topics, the book can be used as a guide and survey of machining technology for students an...

  20. Possession Obsession

    Science.gov (United States)

    Elias, Marilyn

    2012-01-01

    In one recent national survey of teenagers who had been in relationships, 29 percent reported experiencing sexual or physical abuse or receiving threats of physical violence from partners. About 10 percent of students in grades nine to 12 consistently say they've been physically hurt on purpose by a dating partner during the past year, according…

  1. Application of neural network method to process planning in ship pipe machining

    Institute of Scientific and Technical Information of China (English)

    ZHONG Yu-guang; QIU Chang-hua; SHI Dong-yan

    2004-01-01

    Based on artificial neural network for process planning decision in ship pipe manufacturing, a novel method is established by analyzing process characteristics of the ship pipe machining. The process knowledge of pipe machining is shifted from the expression of the external rules to the description of the internal net weight value in order for the net inferring engine to decide the process route of pipe machining rapidly and rightly. Simulation shows that the method can resolve problems of process decision, and overcome the drawbacks of "matching difficulty" and "combination explosion" in traditional intelligent CAPP based on symbol reasoning.

  2. Optimal Scheduling of Railway Track Possessions in Large-Scale Projects with Multiple Construction Works

    DEFF Research Database (Denmark)

    Li, Rui; Roberti, Roberto

    2017-01-01

    This paper addresses the railway track possession scheduling problem (RTPSP), where a large-scale railway infrastructure project consisting of multiple construction works is to be planned. The RTPSP is to determine when to perform the construction works and in which track possessions while satisf...

  3. 50 CFR 600.1204 - Shark finning; possession at sea and landing of shark fins.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Shark finning; possession at sea and landing of shark fins. 600.1204 Section 600.1204 Wildlife and Fisheries FISHERY CONSERVATION AND... PROVISIONS Shark Finning § 600.1204 Shark finning; possession at sea and landing of shark fins. (a)(1)...

  4. 50 CFR 92.6 - Use and possession of migratory birds.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Use and possession of migratory birds. 92... INTERIOR (CONTINUED) MISCELLANEOUS PROVISIONS MIGRATORY BIRD SUBSISTENCE HARVEST IN ALASKA General Provisions § 92.6 Use and possession of migratory birds. You may not sell, offer for sale, purchase, or...

  5. The Acquisition of Possessive HAVE-Clauses by Turkish and Moroccan Learners of Dutch.

    Science.gov (United States)

    van de Craats, Ineke; van Hout, Roeland; Corver, Norbert

    2002-01-01

    Describes how Turkish and Morrocan adults acquire Dutch possessive clauses in which the verb "have" expresses the possessive relationship. The acquisition process is explained within the framework of recent generative theory on which "have-clauses are assumed to be popular locative constructions. (Author/VWL)

  6. 32 CFR 552.122 - Personnel not authorized to possess or retain personal weapons.

    Science.gov (United States)

    2010-07-01

    ... personal weapons. 552.122 Section 552.122 National Defense Department of Defense (Continued) DEPARTMENT OF... authorized to possess or retain personal weapons. (a) Possession, retention or storage of personal weapons or... enforcement officer authorized to carry the weapon under state or federal law, while on Fort Lewis or a sub...

  7. 10 CFR 70.20a - General license to possess special nuclear material for transport.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false General license to possess special nuclear material for transport. 70.20a Section 70.20a Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DOMESTIC LICENSING OF... transport. (a) A general license is issued to any person to possess formula quantities of strategic...

  8. The expected value of possession in professional rugby league match-play.

    Science.gov (United States)

    Kempton, Thomas; Kennedy, Nicholas; Coutts, Aaron J

    2016-01-01

    This study estimated the expected point value for starting possessions in different field locations during rugby league match-play and calculated the mean expected points for each subsequent play during the possession. It also examined the origin of tries scored according to the method of gaining possession. Play-by-play data were taken from all 768 regular-season National Rugby League (NRL) matches during 2010-2013. A probabilistic model estimated the expected point outcome based on the net difference in points scored by a team in possession in a given situation. An iterative method was used to approximate the value of each situation based on actual scoring outcomes. Possessions commencing close to the opposition's goal-line had the highest expected point equity, which decreased as the location of the possession moved towards the team's own goal-line. Possessions following an opposition error, penalty or goal-line dropout had the highest likelihood of a try being scored on the set subsequent to their occurrence. In contrast, possessions that follow an opposition completed set or a restart were least likely to result in a try. The expected point values framework from our model has applications for informing playing strategy and assessing individual and team performance in professional rugby league.

  9. Factors contributing to possession and use of walking aids among persons with rheumatoid arthritis and osteoarthritis.

    NARCIS (Netherlands)

    Esch, M. van der; Heijmans, M.; Dekker, J.

    2003-01-01

    OBJECTIVE: To investigate the possession and use of walking aids among patients with rheumatoid arthritis (RA) or osteoarthritis (OA), and to identify factors contributing to possession and actual use of these aids. METHODS: A random sample of 640 patients with RA or OA was derived from a database

  10. 26 CFR 1.881-5 - Exception for certain possessions corporations.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 9 2010-04-01 2010-04-01 false Exception for certain possessions corporations... (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES Foreign Corporations § 1.881-5 Exception for certain possessions corporations. (a) Scope. Section 881(b) and this section provide special rules for the...

  11. Semantic Vector Machines

    CERN Document Server

    Vincent, Etter

    2011-01-01

    We first present our work in machine translation, during which we used aligned sentences to train a neural network to embed n-grams of different languages into an $d$-dimensional space, such that n-grams that are the translation of each other are close with respect to some metric. Good n-grams to n-grams translation results were achieved, but full sentences translation is still problematic. We realized that learning semantics of sentences and documents was the key for solving a lot of natural language processing problems, and thus moved to the second part of our work: sentence compression. We introduce a flexible neural network architecture for learning embeddings of words and sentences that extract their semantics, propose an efficient implementation in the Torch framework and present embedding results comparable to the ones obtained with classical neural language models, while being more powerful.

  12. Regularized maximum correntropy machine

    KAUST Repository

    Wang, Jim Jing-Yan

    2015-02-12

    In this paper we investigate the usage of regularized correntropy framework for learning of classifiers from noisy labels. The class label predictors learned by minimizing transitional loss functions are sensitive to the noisy and outlying labels of training samples, because the transitional loss functions are equally applied to all the samples. To solve this problem, we propose to learn the class label predictors by maximizing the correntropy between the predicted labels and the true labels of the training samples, under the regularized Maximum Correntropy Criteria (MCC) framework. Moreover, we regularize the predictor parameter to control the complexity of the predictor. The learning problem is formulated by an objective function considering the parameter regularization and MCC simultaneously. By optimizing the objective function alternately, we develop a novel predictor learning algorithm. The experiments on two challenging pattern classification tasks show that it significantly outperforms the machines with transitional loss functions.

  13. Machine Learning Exciton Dynamics

    CERN Document Server

    Häse, Florian; Pyzer-Knapp, Edward; Aspuru-Guzik, Alán

    2015-01-01

    Obtaining the exciton dynamics of large photosynthetic complexes by using mixed quantum mechanics/molecular mechanics (QM/MM) is computationally demanding. We propose a machine learning technique, multi-layer perceptrons, as a tool to reduce the time required to compute excited state energies. With this approach we predict time-dependent density functional theory (TDDFT) excited state energies of bacteriochlorophylls in the Fenna-Matthews-Olson (FMO) complex. Additionally we compute spectral densities and exciton populations from the predictions. Different methods to determine multi-layer perceptron training sets are introduced, leading to several initial data selections. In addition, we compute spectral densities and exciton populations. Once multi-layer perceptrons are trained, predicting excited state energies was found to be significantly faster than the corresponding QM/MM calculations. We showed that multi-layer perceptrons can successfully reproduce the energies of QM/MM calculations to a high degree o...

  14. Training Restricted Boltzmann Machines

    DEFF Research Database (Denmark)

    Fischer, Asja

    Restricted Boltzmann machines (RBMs) are probabilistic graphical models that can also be interpreted as stochastic neural networks. Training RBMs is known to be challenging. Computing the likelihood of the model parameters or its gradient is in general computationally intensive. Thus, training...... relies on sampling based approximations of the log-likelihood gradient. I will present an empirical and theoretical analysis of the bias of these approximations and show that the approximation error can lead to a distortion of the learning process. The bias decreases with increasing mixing rate...... of the applied sampling procedure and I will introduce a transition operator that leads to faster mixing. Finally, a different parametrisation of RBMs will be discussed that leads to better learning results and more robustness against changes in the data representation....

  15. Mechanics of Wood Machining

    CERN Document Server

    Csanády, Etele

    2013-01-01

    Wood is one of the most valuable materials for mankind, and since our earliest days wood materials have been widely used. Today we have modern woodworking machine and tools; however, the raw wood materials available are continuously declining. Therefore we are forced to use this precious material more economically, reducing waste wherever possible. This new textbook on the “Mechanics of Wood Machining” combines the quantitative, mathematical analysis of the mechanisms of wood processing with practical recommendations and solutions. Bringing together materials from many sources, the book contains new theoretical and experimental approaches and offers a clear and systematic overview of the theory of wood cutting, thermal loading in wood-cutting tools, dynamic behaviour of tool and work piece, optimum choice of operational parameters and energy consumption, the wear process of the tools, and the general regularities of wood surface roughness. Diagrams are provided for the quick estimation of various process ...

  16. External costs related to power production technologies. ExternE national implementation for Denmark

    Energy Technology Data Exchange (ETDEWEB)

    Schleisner, L.; Sieverts Nielsen, P. [eds.

    1997-12-01

    The objective of the ExternE National Implementation project has been to establish a comprehensive and comparable set of data on externalities of power generation for all EU member states and Norway. The tasks include the application of the ExternE methodology to the most important fuel cycles for each country as well as to update the already existing results, to aggregate these site- and technology-specific results to more general figures. The current report covers the detailed information concerning the ExternE methodology. Importance is attached to the computer system used in the project and the assessment of air pollution effects on health, materials and ecological effects. Also the assessment of global warming damages are described. Finally the report covers the detailed information concerning the national implementation for Denmark for an offshore wind farm and a wind farm on land, a decentralised CHP plant based on natural gas and a decentralised CHP plant base on biogas. (au) EU-JOULE 3. 79 tabs., 11 ills., 201 refs.

  17. Weapon Possession Among College Students: A Study From a Midwestern University.

    Science.gov (United States)

    Jang, Hyunseok; Kang, Ji Hyon; Dierenfeldt, Rick; Lindsteadt, Greg

    2015-10-01

    Weapon possession on college campuses causes great concern, but there remains a lack of research examining the determinants of this phenomenon. Previous studies addressing weapon possession have primarily focused on either K-12 or the general adult population. Unlike previous studies, this study examined the weapon possession among college students using data collected from a mid-sized university in Missouri, and 451 students participated. Weapon possession and other theoretical factors were measured through the self-administered survey. Logistical regression analysis revealed that weapon socialization was the most significant factor in predicting student weapon carrying. Also, gender and age were significant factors in explaining campus-based weapon possession. This research has a limitation with generalizability because the data were collected from only a single university with convenient sampling. Future studies need to cover a wider range of college students from a variety of different universities with random sampling.

  18. "Satan has afflicted me!" Jinn-possession and mental illness in the Qur'an.

    Science.gov (United States)

    Islam, F; Campbell, R A

    2014-02-01

    Mental health stigma in Muslim communities may be partly due to a commonly held belief among some Muslims about the supernatural causes of mental illness (i.e. jinn-possession brought on by one's sinful life). A thematic analysis was carried out on four English translations and the Arabic text of the Qur'an to explore whether the connection between jinn-possession and insanity exists within the Muslim holy book. No connection between spirit-possession and madness or mental illness was found. Pagans taunted and labelled people as jinn-possessed only to ostracize and scapegoat. Linking the labelling of people as jinn-possession to a pagan practice may be used to educate Muslims, so they can reassess their community's stigma towards the mentally ill.

  19. Externality and burnout among dentists.

    Science.gov (United States)

    St-Yves, A; Freeston, M H; Godbout, F; Poulin, L; St-Amand, C; Verret, M

    1989-12-01

    This study investigates the relationship between burnout as measured by the Maslach Burnout Inventory and locus of control as measured by the Adult Nowicki-Strickland Internal-External Locus of Control (ANS-IE) for 82 dentists. Significant Pearson correlations between two Maslach subscales and locus of control show Personal Accomplishment to be negatively associated -.31 and Emotional Exhaustion to be positively correlated .21 to externality.

  20. Relatie interne en externe audit

    OpenAIRE

    Ghys, Emelie

    2011-01-01

    In het eerste hoofdstuk wordt de probleemstelling van deze eindverhandeling besproken. Interne en externe audit worden de laatste jaren internationaal en nationaal meer en meer erkend in het bedrijfsleven. Aanleiding voor de toenemende belangstelling van de interne en externe auditfunctie zijn de verschillende boekhoudschandalen rond corporate governance of deugdelijk bestuur. Deze financiële mislukkingen leidden wereldwijd tot diverse wetten, nieuwe regels en verbeterde standaarden om zo een...

  1. Performance Targets and External Benchmarking

    DEFF Research Database (Denmark)

    Friis, Ivar; Hansen, Allan; Vámosi, Tamás S.

    as a market mechanism that can be brought inside the firm to provide incentives for continuous improvement and the development of competitive advances. However, whereas extant research primarily has focused on the importance and effects of using external benchmarks, less attention has been directed towards...... towards the conditions for the use of the external benchmarks we provide more insights to some of the issues and challenges that are related to using this mechanism for performance management and advance competitiveness in organizations....

  2. Parallel External Memory Graph Algorithms

    DEFF Research Database (Denmark)

    Arge, Lars Allan; Goodrich, Michael T.; Sitchinava, Nodari

    2010-01-01

    In this paper, we study parallel I/O efficient graph algorithms in the Parallel External Memory (PEM) model, one o f the private-cache chip multiprocessor (CMP) models. We study the fundamental problem of list ranking which leads to efficient solutions to problems on trees, such as computing lowest...... an optimal speedup of ¿(P) in parallel I/O complexity and parallel computation time, compared to the single-processor external memory counterparts....

  3. CREDITWORTHINESS OF MACHINE BUILDING ENTERPRISES

    OpenAIRE

    Freimanis, Tālis; Svarinskis, Leonārs

    2009-01-01

    The previous research showed that the Latvian machine building enterprises experienced regular liquidity problems at the end of each year. Therefore to ensure their development the constant access to bank credits is a necessity. For that reason the analysis and evaluation of machine building enterprises creditworthiness was performed.

  4. SOLVENCY OF MACHINE BUILDING ENTERPRISES

    OpenAIRE

    Freimanis, Tālis; Svarinskis, Leonārs

    2009-01-01

    Machine building as a competative exporting industry plays an important role in the Latvian national open market economy. The further development of machine building is possible under the conditions of the stable solvency. Therefore, it is crucial to perform the solvency analysis of the industry enterprises and give its evaluation.

  5. Storytelling machines for video search

    NARCIS (Netherlands)

    Habibian, A.

    2016-01-01

    We study a fundamental question for developing storytelling machines: what vocabulary is suited for machines to tell the story of a video? We start by manually specifying the vocabulary concepts and their annotations. In order to effectively handcraft the vocabulary, we empirically study what are

  6. Understanding and applying machine vision

    CERN Document Server

    Zeuch, Nello

    2000-01-01

    A discussion of applications of machine vision technology in the semiconductor, electronic, automotive, wood, food, pharmaceutical, printing, and container industries. It describes systems that enable projects to move forward swiftly and efficiently, and focuses on the nuances of the engineering and system integration of machine vision technology.

  7. Storytelling machines for video search

    NARCIS (Netherlands)

    Habibian, A.

    2016-01-01

    We study a fundamental question for developing storytelling machines: what vocabulary is suited for machines to tell the story of a video? We start by manually specifying the vocabulary concepts and their annotations. In order to effectively handcraft the vocabulary, we empirically study what are th

  8. Cleaning of Free Machining Brass

    Energy Technology Data Exchange (ETDEWEB)

    Shen, T

    2005-12-29

    We have investigated four brightening treatments proposed by two cleaning vendors for cleaning free machining brass. The experimental results showed that none of the proposed brightening treatments passed the swipe test. Thus, we maintain the recommendation of not using the brightening process in the cleaning of free machining brass for NIF application.

  9. Man and Machines: Three Criticisms.

    Science.gov (United States)

    Schneider, Edward F.

    As machines have become a more common part of daily life through the passage of time, the idea that the line separating man and machine is slowly fading has become more popular as well. This paper examines three critics of change through their most famous works. One of the most popular views of Mary Shelley's "Frankenstein" is that it is a…

  10. Anaesthesia machine: Checklist, hazards, scavenging

    Directory of Open Access Journals (Sweden)

    Umesh Goneppanavar

    2013-01-01

    Full Text Available From a simple pneumatic device of the early 20 th century, the anaesthesia machine has evolved to incorporate various mechanical, electrical and electronic components to be more appropriately called anaesthesia workstation. Modern machines have overcome many drawbacks associated with the older machines. However, addition of several mechanical, electronic and electric components has contributed to recurrence of some of the older problems such as leak or obstruction attributable to newer gadgets and development of newer problems. No single checklist can satisfactorily test the integrity and safety of all existing anaesthesia machines due to their complex nature as well as variations in design among manufacturers. Human factors have contributed to greater complications than machine faults. Therefore, better understanding of the basics of anaesthesia machine and checking each component of the machine for proper functioning prior to use is essential to minimise these hazards. Clear documentation of regular and appropriate servicing of the anaesthesia machine, its components and their satisfactory functioning following servicing and repair is also equally important. Trace anaesthetic gases polluting the theatre atmosphere can have several adverse effects on the health of theatre personnel. Therefore, safe disposal of these gases away from the workplace with efficiently functioning scavenging system is necessary. Other ways of minimising atmospheric pollution such as gas delivery equipment with negligible leaks, low flow anaesthesia, minimal leak around the airway equipment (facemask, tracheal tube, laryngeal mask airway, etc. more than 15 air changes/hour and total intravenous anaesthesia should also be considered.

  11. A multipurpose tissue bending machine.

    Science.gov (United States)

    Vesely, I; Boughner, D R

    1985-01-01

    A unique tissue bending machine was developed to test the bending properties of normal and bioprosthetic heart valve material. It can be operated in air or in a tissue bath and can measure bending torques with an accuracy in excess of 1.0 microN m. Three contrasting substances were tested to compare their stiffness and to demonstrate the machine.

  12. Self-Adjusting Teaching Machines.

    Science.gov (United States)

    Dovgyallo, A. M.

    A study was made on the synthesis of teaching machine elements to ensure the stabilization of the chi indicator of the teaching process of each student. At first, a procedure was developed for calculating the chi indicator for the case when the teaching machine predicts the magnitude of this indicator based on probabilities derived from an…

  13. The Machine Scoring of Writing

    Science.gov (United States)

    McCurry, Doug

    2010-01-01

    This article provides an introduction to the kind of computer software that is used to score student writing in some high stakes testing programs, and that is being promoted as a teaching and learning tool to schools. It sketches the state of play with machines for the scoring of writing, and describes how these machines work and what they do.…

  14. Real Analytic Machines and Degrees

    CERN Document Server

    Gärtner, Tobias; 10.4204/EPTCS.24.12

    2010-01-01

    We study and compare in two degree-theoretic ways (iterated Halting oracles analogous to Kleene's arithmetical hierarchy and the Borel hierarchy of descriptive set theory) the capabilities and limitations of three models of analytic computation: BSS machines (aka real-RAM) and strongly/weakly analytic machines as introduced by Hotz et. al. (1995).

  15. Storytelling machines for video search

    NARCIS (Netherlands)

    Habibian, A.

    2016-01-01

    We study a fundamental question for developing storytelling machines: what vocabulary is suited for machines to tell the story of a video? We start by manually specifying the vocabulary concepts and their annotations. In order to effectively handcraft the vocabulary, we empirically study what are th

  16. Anaesthesia machine: checklist, hazards, scavenging.

    Science.gov (United States)

    Goneppanavar, Umesh; Prabhu, Manjunath

    2013-09-01

    From a simple pneumatic device of the early 20(th) century, the anaesthesia machine has evolved to incorporate various mechanical, electrical and electronic components to be more appropriately called anaesthesia workstation. Modern machines have overcome many drawbacks associated with the older machines. However, addition of several mechanical, electronic and electric components has contributed to recurrence of some of the older problems such as leak or obstruction attributable to newer gadgets and development of newer problems. No single checklist can satisfactorily test the integrity and safety of all existing anaesthesia machines due to their complex nature as well as variations in design among manufacturers. Human factors have contributed to greater complications than machine faults. Therefore, better understanding of the basics of anaesthesia machine and checking each component of the machine for proper functioning prior to use is essential to minimise these hazards. Clear documentation of regular and appropriate servicing of the anaesthesia machine, its components and their satisfactory functioning following servicing and repair is also equally important. Trace anaesthetic gases polluting the theatre atmosphere can have several adverse effects on the health of theatre personnel. Therefore, safe disposal of these gases away from the workplace with efficiently functioning scavenging system is necessary. Other ways of minimising atmospheric pollution such as gas delivery equipment with negligible leaks, low flow anaesthesia, minimal leak around the airway equipment (facemask, tracheal tube, laryngeal mask airway, etc.) more than 15 air changes/hour and total intravenous anaesthesia should also be considered.

  17. Bionic machines and systems

    Energy Technology Data Exchange (ETDEWEB)

    Halme, A.; Paanajaervi, J. (eds.)

    2004-07-01

    Introduction Biological systems form a versatile and complex entirety on our planet. One evolutionary branch of primates, called humans, has created an extraordinary skill, called technology, by the aid of which it nowadays dominate life on the planet. Humans use technology for producing and harvesting food, healthcare and reproduction, increasing their capability to commute and communicate, defending their territory etc., and to develop more technology. As a result of this, humans have become much technology dependent, so that they have been forced to form a specialized class of humans, called engineers, who take care of the knowledge of technology developing it further and transferring it to later generations. Until now, technology has been relatively independent from biology, although some of its branches, e.g. biotechnology and biomedical engineering, have traditionally been in close contact with it. There exist, however, an increasing interest to expand the interface between technology and biology either by directly utilizing biological processes or materials by combining them with 'dead' technology, or by mimicking in technological solutions the biological innovations created by evolution. The latter theme is in focus of this report, which has been written as the proceeding of the post-graduate seminar 'Bionic Machines and Systems' held at HUT Automation Technology Laboratory in autumn 2003. The underlaying idea of the seminar was to analyze biological species by considering them as 'robotic machines' having various functional subsystems, such as for energy, motion and motion control, perception, navigation, mapping and localization. We were also interested about intelligent capabilities, such as learning and communication, and social structures like swarming behavior and its mechanisms. The word 'bionic machine' comes from the book which was among the initial material when starting our mission to the fascinating world

  18. A new support vector machine based multiuser detection scheme

    Institute of Scientific and Technical Information of China (English)

    WANG Yong-jian; ZHAO Hong-lin

    2008-01-01

    In order to suppress the multiple access interference(MAI)in 3G,which limits the capacity of a CDMA communication system,a fast relevance vector machine(FRVM)is employed in the muhinser detection (MUD)scheme.This method aims to overcome the shortcomings of many ordinary support vector machine (SVM)based MUD schemes,such as the long training time and the inaccuracy of the decision data,and enhance the performance of a CDMA communication system.Computer simulation results demonstrate that the proposed FRVM based muhiuser detection has lower bit error rate,costs short training time,needs fewer kernel functions and possesses better near-far resistance.

  19. On Machine Capacitance Dimensional and Surface Profile Measurement System

    Science.gov (United States)

    Resnick, Ralph

    1993-01-01

    A program was awarded under the Air Force Machine Tool Sensor Improvements Program Research and Development Announcement to develop and demonstrate the use of a Capacitance Sensor System including Capacitive Non-Contact Analog Probe and a Capacitive Array Dimensional Measurement System to check the dimensions of complex shapes and contours on a machine tool or in an automated inspection cell. The manufacturing of complex shapes and contours and the subsequent verification of those manufactured shapes is fundamental and widespread throughout industry. The critical profile of a gear tooth; the overall shape of a graphite EDM electrode; the contour of a turbine blade in a jet engine; and countless other components in varied applications possess complex shapes that require detailed and complex inspection procedures. Current inspection methods for complex shapes and contours are expensive, time-consuming, and labor intensive.

  20. Machinability of Stellite 6 hardfacing

    Science.gov (United States)

    Benghersallah, M.; Boulanouar, L.; Le Coz, G.; Devillez, A.; Dudzinski, D.

    2010-06-01

    This paper reports some experimental findings concerning the machinability at high cutting speed of nickel-base weld-deposited hardfacings for the manufacture of hot tooling. The forging work involves extreme impacts, forces, stresses and temperatures. Thus, mould dies must be extremely resistant. The aim of the project is to create a rapid prototyping process answering to forging conditions integrating a Stellite 6 hardfacing deposed PTA process. This study talks about the dry machining of the hardfacing, using a two tips machining tool and a high speed milling machine equipped by a power consumption recorder Wattpilote. The aim is to show the machinability of the hardfacing, measuring the power and the tip wear by optical microscope and white light interferometer, using different strategies and cutting conditions.

  1. Machine intelligence and signal processing

    CERN Document Server

    Vatsa, Mayank; Majumdar, Angshul; Kumar, Ajay

    2016-01-01

    This book comprises chapters on key problems in machine learning and signal processing arenas. The contents of the book are a result of a 2014 Workshop on Machine Intelligence and Signal Processing held at the Indraprastha Institute of Information Technology. Traditionally, signal processing and machine learning were considered to be separate areas of research. However in recent times the two communities are getting closer. In a very abstract fashion, signal processing is the study of operator design. The contributions of signal processing had been to device operators for restoration, compression, etc. Applied Mathematicians were more interested in operator analysis. Nowadays signal processing research is gravitating towards operator learning – instead of designing operators based on heuristics (for example wavelets), the trend is to learn these operators (for example dictionary learning). And thus, the gap between signal processing and machine learning is fast converging. The 2014 Workshop on Machine Intel...

  2. Machinability of Stellite 6 hardfacing

    Directory of Open Access Journals (Sweden)

    Dudzinski D.

    2010-06-01

    Full Text Available This paper reports some experimental findings concerning the machinability at high cutting speed of nickel-base weld-deposited hardfacings for the manufacture of hot tooling. The forging work involves extreme impacts, forces, stresses and temperatures. Thus, mould dies must be extremely resistant. The aim of the project is to create a rapid prototyping process answering to forging conditions integrating a Stellite 6 hardfacing deposed PTA process. This study talks about the dry machining of the hardfacing, using a two tips machining tool and a high speed milling machine equipped by a power consumption recorder Wattpilote. The aim is to show the machinability of the hardfacing, measuring the power and the tip wear by optical microscope and white light interferometer, using different strategies and cutting conditions.

  3. Nontraditional machining processes research advances

    CERN Document Server

    2013-01-01

    Nontraditional machining employs processes that remove material by various methods involving thermal, electrical, chemical and mechanical energy or even combinations of these. Nontraditional Machining Processes covers recent research and development in techniques and processes which focus on achieving high accuracies and good surface finishes, parts machined without burrs or residual stresses especially with materials that cannot be machined by conventional methods. With applications to the automotive, aircraft and mould and die industries, Nontraditional Machining Processes explores different aspects and processes through dedicated chapters. The seven chapters explore recent research into a range of topics including laser assisted manufacturing, abrasive water jet milling and hybrid processes. Students and researchers will find the practical examples and new processes useful for both reference and for developing further processes. Industry professionals and materials engineers will also find Nontraditional M...

  4. An art history of machines?

    Directory of Open Access Journals (Sweden)

    Daniel Bridgman

    2016-12-01

    Full Text Available A toast offered in honor of Donald Preziosi on the cusp of his seventy-fifth birthday, this essay considers a range of machine metaphors, their art historical settings, and their implications. Addressing the mythography of Daedalus and his wonder machines in relation to art history’s machinic enterprises, an ancient art-archaeology seminar Preziosi directed at UCLA (in 1988 and the book, Rethinking Art History: Meditations on a Coy Science (1989 form the focus of my thinking about Preziosi’s work. At issue across the essay is the work of recursion, when machines make machines and in so doing create a recessive subjectivity for the maker. The essay ends with the speculation that art history’s disciplinary machinery may owe its generative strength to a perpetual need for replacement parts.

  5. External Costs Related to Power Production Technologies

    DEFF Research Database (Denmark)

    Ibsen, Liselotte Schleisner; Nielsen, Per Sieverts

    1997-01-01

    The European Commission has launched a major study project, ExternE, to develop a methodology to quantify externalities. A “National Implementation Phase”, was started under the Joule II programme with the purpose of implementing the ExternE methodology in all member states. The main objective...

  6. External Costs Related to Power Production Technologies

    DEFF Research Database (Denmark)

    Ibsen, Liselotte Schleisner; Nielsen, Per Sieverts

    1997-01-01

    The European Commission has launched a major study project, ExternE, to develop a methodology to quantify externalities. A “National Implementation Phase”, was started under the Joule II programme with the purpose of implementing the ExternE methodology in all member states. The main objective of...

  7. Microelectrical Discharge Machining: A Suitable Process for Machining Ceramics

    Directory of Open Access Journals (Sweden)

    Andreas Schubert

    2015-01-01

    Full Text Available Today ceramics are used in many industrial applications, for example, in the biomedical field, for high-temperature components or for cutting tools. This is attributed to their excellent mechanical and physical properties, as low density, high strength, and hardness or chemical resistance. However, these specific mechanical properties lead to problems regarding the postprocessing of ceramics. In particular, cutting processes require expensive tools which cause high manufacturing costs to machine ceramics. Consequently, there is a demand for alternative machining processes. Microelectrical discharge machining (micro-EDM is a thermal abrasion process which is based on electrical discharges between a tool and a workpiece. The advantages of micro-EDM are more and more in focus for ceramic machining. These advantages include the process of being a noncontact technology, an independency of material brittleness and hardness, a low impact on the material, and the achievable microstructures. This paper presents the current state of investigations regarding micro-EDM of ceramics. Beside the process principle of EDM, the used procedures for machining ceramics and insulating ceramics are described. Furthermore several machining examples are presented to demonstrate the possibilities of the micro-EDM process with regard to the machining of ceramics.

  8. Weibel instability in a plasma with nonzero external magnetic field

    Directory of Open Access Journals (Sweden)

    O. A. Pokhotelov

    2012-07-01

    Full Text Available The theory of the Weibel instability is generalized for the case of a plasma immersed in a nonzero external magnetic field. It is shown that the presence of this external field modifies the dispersion relation for this mode which now possesses a nonzero frequency. The explicit expression for the real and imaginary parts of the frequency is then calculated. It turns out that the linear growth rate remains unchanged, whereas the frequency becomes nonzero due to the finite value of the electron cyclotron frequency. The frequency of the Weibel mode is found to be proportional to the electron temperature anisotropy. The formal similarity of the Weibel and drift-mirror instabilities is outlined.

  9. Decomposition of forging dies for machining planning

    CERN Document Server

    Tapie, Laurent; Anselmetti, Bernard

    2009-01-01

    This paper will provide a method to decompose forging dies for machining planning in the case of high speed machining finishing operations. This method lies on a machining feature approach model presented in the following paper. The two main decomposition phases, called Basic Machining Features Extraction and Process Planning Generation, are presented. These two decomposition phases integrates machining resources models and expert machining knowledge to provide an outstanding process planning.

  10. Decomposition of forging dies for machining planning

    OpenAIRE

    Tapie, Laurent; Mawussi, Kwamiwi; Anselmetti, Bernard

    2009-01-01

    International audience; This paper will provide a method to decompose forging dies for machining planning in the case of high speed machining finishing operations. This method lies on a machining feature approach model presented in the following paper. The two main decomposition phases, called Basic Machining Features Extraction and Process Planning Generation, are presented. These two decomposition phases integrates machining resources models and expert machining knowledge to provide an outs...

  11. HUMAN MACHINE COOPERATIVE TELEROBOTICS

    Energy Technology Data Exchange (ETDEWEB)

    William R. Hamel; Spivey Douglass; Sewoong Kim; Pamela Murray; Yang Shou; Sriram Sridharan; Ge Zhang; Scott Thayer; Rajiv V. Dubey

    2003-06-30

    described as Human Machine Cooperative Telerobotics (HMCTR). The HMCTR combines the telerobot with robotic control techniques to improve the system efficiency and reliability in teleoperation mode. In this topical report, the control strategy, configuration and experimental results of Human Machines Cooperative Telerobotics (HMCTR), which modifies and limits the commands of human operator to follow the predefined constraints in the teleoperation mode, is described. The current implementation is a laboratory-scale system that will be incorporated into an engineering-scale system at the Oak Ridge National Laboratory in the future.

  12. Machine Learning for Medical Imaging.

    Science.gov (United States)

    Erickson, Bradley J; Korfiatis, Panagiotis; Akkus, Zeynettin; Kline, Timothy L

    2017-01-01

    Machine learning is a technique for recognizing patterns that can be applied to medical images. Although it is a powerful tool that can help in rendering medical diagnoses, it can be misapplied. Machine learning typically begins with the machine learning algorithm system computing the image features that are believed to be of importance in making the prediction or diagnosis of interest. The machine learning algorithm system then identifies the best combination of these image features for classifying the image or computing some metric for the given image region. There are several methods that can be used, each with different strengths and weaknesses. There are open-source versions of most of these machine learning methods that make them easy to try and apply to images. Several metrics for measuring the performance of an algorithm exist; however, one must be aware of the possible associated pitfalls that can result in misleading metrics. More recently, deep learning has started to be used; this method has the benefit that it does not require image feature identification and calculation as a first step; rather, features are identified as part of the learning process. Machine learning has been used in medical imaging and will have a greater influence in the future. Those working in medical imaging must be aware of how machine learning works. (©)RSNA, 2017.

  13. Assessment of Office Education Operating Competencies Possessed by Postgraduate University Business Education Students to Handle Entrepreneurship Business Challenges in Nigeria

    Directory of Open Access Journals (Sweden)

    James Okoro

    2013-08-01

    Full Text Available This study assessed the office education operating competencies possessed by the university postgraduate business education students to handle entrepreneurship business challenges in Nigeria. One research question and five null hypotheses guided the study. Descriptive survey design was adopted for the study. The population and sample consisted of 388 business education graduates who are postgraduate students in universities in Nigeria. A 31-item structured questionnaire was validated and was also subjected to reliability which had internal consistency of 0.96 was used for data collection. The mean and standard deviation was used to answer the research questions while Z-test was used to test the null hypotheses at 0.05 level of significance. The results revealed that the respondents are competent in office education operating skills such as ability to file documents properly, knowledge handling office machines, ability to take minutes during meeting, among others. However, the respondents are not competent in knowledge of insurance policy and can do approach.

  14. Setup planning for machining

    CERN Document Server

    Hazarika, Manjuri

    2015-01-01

    Professionals as well as researchers can benefit from this comprehensive introduction into the topic of setup planning, which reflects the latest state of research and gives hands-on examples. Starting with a brief but thorough introduction, this book explains the significance of setup planning in process planning and includes a reflection on its external constraints. Step-by-step the different phases of setup planning are outlined and traditional as well as modern approaches, such as fuzzy logic based setup planning, on the solution of setup planning problems are presented. Three detailed examples of applications provide a clear and accessible insight into the up-to-date techniques and various approaches in setup planning.

  15. Learning with Support Vector Machines

    CERN Document Server

    Campbell, Colin

    2010-01-01

    Support Vectors Machines have become a well established tool within machine learning. They work well in practice and have now been used across a wide range of applications from recognizing hand-written digits, to face identification, text categorisation, bioinformatics, and database marketing. In this book we give an introductory overview of this subject. We start with a simple Support Vector Machine for performing binary classification before considering multi-class classification and learning in the presence of noise. We show that this framework can be extended to many other scenarios such a

  16. Gloved Human-Machine Interface

    Science.gov (United States)

    Adams, Richard (Inventor); Olowin, Aaron (Inventor); Hannaford, Blake (Inventor)

    2015-01-01

    Certain exemplary embodiments can provide a system, machine, device, manufacture, circuit, composition of matter, and/or user interface adapted for and/or resulting from, and/or a method and/or machine-readable medium comprising machine-implementable instructions for, activities that can comprise and/or relate to: tracking movement of a gloved hand of a human; interpreting a gloved finger movement of the human; and/or in response to interpreting the gloved finger movement, providing feedback to the human.

  17. Machine learning in virtual screening.

    Science.gov (United States)

    Melville, James L; Burke, Edmund K; Hirst, Jonathan D

    2009-05-01

    In this review, we highlight recent applications of machine learning to virtual screening, focusing on the use of supervised techniques to train statistical learning algorithms to prioritize databases of molecules as active against a particular protein target. Both ligand-based similarity searching and structure-based docking have benefited from machine learning algorithms, including naïve Bayesian classifiers, support vector machines, neural networks, and decision trees, as well as more traditional regression techniques. Effective application of these methodologies requires an appreciation of data preparation, validation, optimization, and search methodologies, and we also survey developments in these areas.

  18. Fundamentals of Machine Learning for Neural Machine Translation

    OpenAIRE

    Kelleher, John

    2016-01-01

    This paper presents a short introduction to neural networks and how they are used for machine translation and concludes with some discussion on the current research challenges being addressed by neural machine translation (NMT) research. The primary goal of this paper is to give a no-tears introduction to NMT to readers that do not have a computer science or mathematical background. The secondary goal is to provide the reader with a deep enough understanding of NMT that they can appreciate th...

  19. Leveraging External Sources of Innovation

    DEFF Research Database (Denmark)

    West, Joel; Bogers, Marcel

    2014-01-01

    This paper reviews research on open innovation that considers how and why firms commercialize external sources of innovations. It examines both the “outside-in” and “coupled” modes of open innovation. From an analysis of prior research on how firms leverage external sources of innovation...... cited work beyond those journals. A review of 291 open innovation-related publications from these sources shows that the majority of these articles indeed address elements of this inbound open innovation process model. Specifically, it finds that researchers have front-loaded their examination...... external innovations create value rather than how firms capture value from those innovations. Finally, the interaction phase considers both feedback for the linear process and reciprocal innovation processes such as cocreation, network collaboration, and community innovation. This review and synthesis...

  20. A case of possessive state with onset influenced by 'door-to-door' sales.

    Science.gov (United States)

    Satoh, S; Obata, S; Seno, E; Okada, T; Morita, N; Saito, T; Yoshikawa, M; Yamagami, A

    1996-12-01

    Recently in Japan, 'door-to-door sales' has become of concern because it has created numerous legal and social problems. In this paper, a 47 year old dissociative trance disorder case who presented with possession by God is discussed. Specific types of door-to-door sales is known to use superstition and folk beliefs as tools to lure customers. In this particular case, these religious factors seemed to have played an important role in the precipitation of the disorder and its presentation. In addition, the brain-washing environment observed in video lectures used in door-to-door sales seemed to play an important role in the development of the possessive state. We also performed social psychiatric analysis of the occurrence of the possessive state in a city area, which has been considered to develop within traditional culture. Phenomenological classification by one of the authors was useful for diagnosing underlying disorders in the possessive state.

  1. PRESERVATION AND CHANGE IN THE HISTORY OF PORTUGUESE: FROM POSSESSIVE TO EXISTENTIAL VERB

    Directory of Open Access Journals (Sweden)

    Dinah Callou

    2016-04-01

    Full Text Available In Brazilian Portuguese (BP, the verb haver ‘to exist/there to be’can be replaced by the possessive ter ‘to have’ in existential constructions and an intriguing aspect of this variation is that ter loses the definiteness restrictions on complements while haver triggers such restriction. The assumption is that this contrast is due to the fact that, although ter has been reanalyzed as existential, it keeps the selection properties of possessive sentences. The data analyzed (1528 existential clauses from spoken contemporary BP and 200 with haver/ter-possessive clauses in MP, from the 13th to the 16th century reveal a crucial aspect of the relevant changes in the history of Portuguese: the existential version of ter and haver inherits syntacticsemantic aspects of their possessive version, which shows that an item can emerge into a new context without changing its essential selection properties.

  2. Feature interpretability and the positions of 2nd person possessives in Brazilian Portuguese

    Directory of Open Access Journals (Sweden)

    Bruna Karla Pereira

    2016-12-01

    Full Text Available Interpretability and valuation of φ-features (Chomsky, 2001; Pesetsky and Torrego, 2007 have played a central role in the investigation of language universals. With regard to that, in standard Brazilian Portuguese (BP, as well as in other Romance languages, possessives have uninterpretable number features, which are valued via nominal agreement. However, dialects of BP, especially the one spoken in Minas Gerais, have shown that 2nd person possessives, in postnominal position, do not have number agreement with the noun. In order to account for these facts, I will argue that, in this grammar, number features on 2nd person possessives are reanalyzed as being: (i associated with the person (rather than the noun and (ii interpretable. From the first postulation, ‘seu’ is expected to be the possessive for 2nd person singular, and ‘seus’ for 2nd person plural. From the second postulation, no number concord is expected to be triggered on the possessive. In addition, based on Danon (2011 and Norris (2014, I will argue that cardinals divide BP DPs into two domains in that phrases located above NumP are marked with the plural morpheme, while phrases below it are unmarked. In this sense, because prenominal possessives precede cardinals (NumP, they must be marked with the plural morpheme for nominal agreement; whereas postnominal possessives, which follow NumP, must be unmarked. Free from the plural marking associated with nominal agreement, postnominal 2nd person possessives favor the reanalysis of the morpheme ‘-s’ as indicating the number associated with person features.

  3. Design of an ARM-based Automatic Rice-Selling Machine for Cafeterias

    Directory of Open Access Journals (Sweden)

    Zhiliang Kang

    2016-02-01

    Full Text Available To address the problems of low selling efficiency, poor sanitation conditions, labor-intensive requirement, and quick rice cooling speed in manual rice selling in cafeterias, especially in colleges and secondary schools, this paper presented an Advanced RISC Machines (ARM microprocessor-based rice-selling machine for cafeterias. The machines consisted of a funnel-shaped rice bin, a thermal insulation box, and a conveying and scattering mechanism. Moreover, this machine exerts fuzzy control over stepper motor rpm, and the motor drives the conveyor belt with a scraper to scatter rice, deliver it, and keep it warm. Apart from an external 4*4 keyboard, a point of sale (POS machine, an ARM process and a pressure sensor, the machine is also equipped with card swiping and weighting mechanisms to achieve functions of card swiping payment and precise measurement, respectively. In addition, detection of the right amount of rice and the alarm function are achieved using an ultrasonic sensor and a beeper, respectively. The presence of the rice container on the rice outlet is detected by an optoelectronic switch. Results show that this rice-selling machine achieves precise measurement, quick card swiping, fast rice selling, stable operation, and good rice heat preservation. Therefore, the mechanical design enables the machine to achieve its goals.

  4. O olhar dos psiquiatras brasileiros sobre os fenômenos de transe e possessão Brazilian psychiatrists’ approaches on trance and possession phenomena

    Directory of Open Access Journals (Sweden)

    Angélica A. Silva de Almeida

    2007-01-01

    Full Text Available CONTEXTO: Os fenômenos de transe e possessão despertaram o interesse da comunidade psiquiátrica brasileira, gerando posturas diversificadas. OBJETIVOS: Descrever e analisar como os fenômenos de transe e possessão foram tratados pelos psiquiatras brasileiros: seu impacto na teoria, na pesquisa e na prática clínica entre 1900 e 1950. MÉTODO: Análise de artigos científicos e leigos, teses e livros sobre transes e possessões produzidos pelos psiquiatras brasileiros entre 1900 e 1950. RESULTADOS: Identificam-se duas correntes de pensamento entre os psiquiatras. A primeira, vinculada às Faculdades de Medicina do Rio de Janeiro e São Paulo, sob forte influência de autores franceses, deteve-se mais na periculosidade do espiritismo para a saúde mental. Defendia a adoção de medidas repressivas com o poder público. O segundo grupo de psiquiatras, ligado às Faculdades de Medicina da Bahia e Pernambuco, embora não desconsiderasse o caráter patológico ou "primitivo" dos fenômenos de transe e possessão, apresentou uma visão mais antropológica e culturalista. Considerando tais fenômenos como manifestações étnicas ou culturais, alguns defenderam o controle médico e a educação do povo para o abandono dessas práticas "primitivas". Outros não consideravam os fenômenos mediúnicos como desencadeadores da loucura, mas manifestações não-patológicas de um universo cultural, além de não vinculá-los ao atraso cultural da população. CONCLUSÕES: As religiões mediúnicas foram objeto de estudo por longo período, resultando hipóteses e práticas diferenciadas por parte da comunidade psiquiátrica brasileira, constituindo-se oportunidade privilegiada para o estudo do impacto dos fatores socioculturais na atividade psiquiátrica.BACKGROUND: Trance and possession experiences have raised interest among Brazilian psychiatrists resulting in a variety of approaches. OBJECTIVES: To describe and analyze how Brazilian psychiatrists

  5. Machine Learning examples on Invenio

    CERN Document Server

    CERN. Geneva

    2017-01-01

    This talk will present the different Machine Learning tools that the INSPIRE is developing and integrating in order to automatize as much as possible content selection and curation in a subject based repository.

  6. ENERGY STAR Certified Vending Machines

    Data.gov (United States)

    U.S. Environmental Protection Agency — Certified models meet all ENERGY STAR requirements as listed in the Version 3.0 ENERGY STAR Program Requirements for Refrigerated Beverage Vending Machines that are...

  7. Particle accelerator; the Universe machine

    CERN Multimedia

    Yurkewicz, Katie

    2008-01-01

    "In summer 2008, scientists will switch on one of the largest machines in the world to search for the smallest of particle. CERN's Large Hadron Collider particle accelerator has the potential to chagne our understanding of the Universe."

  8. Quantum-Enhanced Machine Learning.

    Science.gov (United States)

    Dunjko, Vedran; Taylor, Jacob M; Briegel, Hans J

    2016-09-23

    The emerging field of quantum machine learning has the potential to substantially aid in the problems and scope of artificial intelligence. This is only enhanced by recent successes in the field of classical machine learning. In this work we propose an approach for the systematic treatment of machine learning, from the perspective of quantum information. Our approach is general and covers all three main branches of machine learning: supervised, unsupervised, and reinforcement learning. While quantum improvements in supervised and unsupervised learning have been reported, reinforcement learning has received much less attention. Within our approach, we tackle the problem of quantum enhancements in reinforcement learning as well, and propose a systematic scheme for providing improvements. As an example, we show that quadratic improvements in learning efficiency, and exponential improvements in performance over limited time periods, can be obtained for a broad class of learning problems.

  9. Quantum-Enhanced Machine Learning

    Science.gov (United States)

    Dunjko, Vedran; Taylor, Jacob M.; Briegel, Hans J.

    2016-09-01

    The emerging field of quantum machine learning has the potential to substantially aid in the problems and scope of artificial intelligence. This is only enhanced by recent successes in the field of classical machine learning. In this work we propose an approach for the systematic treatment of machine learning, from the perspective of quantum information. Our approach is general and covers all three main branches of machine learning: supervised, unsupervised, and reinforcement learning. While quantum improvements in supervised and unsupervised learning have been reported, reinforcement learning has received much less attention. Within our approach, we tackle the problem of quantum enhancements in reinforcement learning as well, and propose a systematic scheme for providing improvements. As an example, we show that quadratic improvements in learning efficiency, and exponential improvements in performance over limited time periods, can be obtained for a broad class of learning problems.

  10. Diamond turning machine controller implementation

    Energy Technology Data Exchange (ETDEWEB)

    Garrard, K.P.; Taylor, L.W.; Knight, B.F.; Fornaro, R.J.

    1988-12-01

    The standard controller for a Pnuemo ASG 2500 Diamond Turning Machine, an Allen Bradley 8200, has been replaced with a custom high-performance design. This controller consists of four major components. Axis position feedback information is provided by a Zygo Axiom 2/20 laser interferometer with 0.1 micro-inch resolution. Hardware interface logic couples the computers digital and analog I/O channels to the diamond turning machine`s analog motor controllers, the laser interferometer, and other machine status and control information. It also provides front panel switches for operator override of the computer controller and implement the emergency stop sequence. The remaining two components, the control computer hardware and software, are discussed in detail below.

  11. The efficiency of combined machinings

    OpenAIRE

    2012-01-01

    This paper analyses the efficiency of the finish process applied in machining of hard surfaces, completed by grinding, hard turning and also by the combination of these two procedures, on the basis of time consumption.

  12. Machine learning for healthcare technologies

    CERN Document Server

    Clifton, David A

    2016-01-01

    This book brings together chapters on the state-of-the-art in machine learning (ML) as it applies to the development of patient-centred technologies, with a special emphasis on 'big data' and mobile data.

  13. 4th Machining Innovations Conference

    CERN Document Server

    2014-01-01

    This contributed volume contains the research results presented at the 4th Machining Innovations Conference, Hannover, September 2013. The topic of the conference are new production technologies in aerospace industry and the focus is on energy efficient machine tools as well as sustainable process planning. The target audience primarily comprises researchers and experts in the field but the book may also be beneficial for graduate students.

  14. Function Concepts for Machine Parts

    DEFF Research Database (Denmark)

    Mortensen, Niels Henrik

    1999-01-01

    The majority of resources, like time and costs, consumed in industrial product development can be related to detailed design, i.e. the materialisation of machine parts (German Maschinenteile). Existing design theories based on a systems approach, e.g. Haberfellner [5] all have function, i...... to be identification of a purposeful behaviour concept, i.e. function for a machine part. The contribution is based on the theory of technical systems, Hubka and the domain theory, Andreasen....

  15. Constructing a modern city machine

    DEFF Research Database (Denmark)

    Lindegaard, Hanne; Jørgensen, Ulrik

    1998-01-01

    Based on the Copenhagen sewers debates and constructions the role of changing perceptions of water, hygiene and environment is discussed in relation to the modernisation of cities by machinating flows and infrastructures.......Based on the Copenhagen sewers debates and constructions the role of changing perceptions of water, hygiene and environment is discussed in relation to the modernisation of cities by machinating flows and infrastructures....

  16. Biosleeve Human-Machine Interface

    Science.gov (United States)

    Assad, Christopher (Inventor)

    2016-01-01

    Systems and methods for sensing human muscle action and gestures in order to control machines or robotic devices are disclosed. One exemplary system employs a tight fitting sleeve worn on a user arm and including a plurality of electromyography (EMG) sensors and at least one inertial measurement unit (IMU). Power, signal processing, and communications electronics may be built into the sleeve and control data may be transmitted wirelessly to the controlled machine or robotic device.

  17. The Complexity of Abstract Machines

    Directory of Open Access Journals (Sweden)

    Beniamino Accattoli

    2017-01-01

    Full Text Available The lambda-calculus is a peculiar computational model whose definition does not come with a notion of machine. Unsurprisingly, implementations of the lambda-calculus have been studied for decades. Abstract machines are implementations schema for fixed evaluation strategies that are a compromise between theory and practice: they are concrete enough to provide a notion of machine and abstract enough to avoid the many intricacies of actual implementations. There is an extensive literature about abstract machines for the lambda-calculus, and yet—quite mysteriously—the efficiency of these machines with respect to the strategy that they implement has almost never been studied. This paper provides an unusual introduction to abstract machines, based on the complexity of their overhead with respect to the length of the implemented strategies. It is conceived to be a tutorial, focusing on the case study of implementing the weak head (call-by-name strategy, and yet it is an original re-elaboration of known results. Moreover, some of the observation contained here never appeared in print before.

  18. Optimal Auctions with Financial Externalities

    NARCIS (Netherlands)

    Maasland, E.; Onderstal, A.M.

    2002-01-01

    We construct optimal auctions when bidders face financial externalities.In a Coasean World, in which the seller cannot prevent a perfect resale market, nor withhold the object, the lowest-price all-pay auction is optimal.In a Myersonean World, in which the seller can both prevent resale after the au

  19. Organizing for External Knowledge Sourcing

    DEFF Research Database (Denmark)

    Rabbiosi, Larissa; Reichstein, Toke

    2011-01-01

    The aim of this article is to provide an introduction to the special issue. We briefly consider the external knowledge sourcing and organizing for innovation literatures, which offer a background for the special issue, and we highlight their mutual dialogue. We then illustrate the main findings...

  20. Measuring Externalities in Program Evaluation

    NARCIS (Netherlands)

    Janssens, Wendy

    2005-01-01

    Impact evaluations of development programmes usually focus on a comparison of participants with a control group. However, if the programme generates externalities for non-participants such an approach will capture only part of the programme's impact. Based on a unique large-scale quantitative survey

  1. Lupus vulgaris of external nose.

    Science.gov (United States)

    Bhandary, Satheesh Kumar; Ranganna, B Usha

    2008-12-01

    Lupus vulgaris is the commonest form of cutaneous tuberculosis which commonly involve trunk and buttocks. Lupus vulgaris affecting nose and face, are rarely reported in India. This study reports an unusual case of lupus vulgaris involving the external nose that showed dramatic outcome after six months of anti- tubercular treatment.

  2. [Treatment by external insulin pump].

    Science.gov (United States)

    Clavel, Sylvaine

    2010-12-01

    Since the recent recommendations by the French speaking association for research on diabetes and metabolic illnesses (Alfediam), treatment by insulin pump has found itself in competition with basal-bolus, a procedure using similar injections of insulin which has become a benchmark treatment. The latest Alfediam guidelines focus on defining ways of treating diabetics with an external insulin pump.

  3. Matchings with Externalities and Attitudes

    DEFF Research Database (Denmark)

    Branzei, Simina; Michalak, Tomasz; Rahwan, Talal;

    2013-01-01

    Two-sided matchings are an important theoretical tool used to model markets and social interactions. In many real-life problems the utility of an agent is influenced not only by their own choices, but also by the choices that other agents make. Such an influence is called an externality. Whereas ...

  4. Post-external dacryocystorhinostomy lagophthalmos.

    Science.gov (United States)

    Odat, Thabit A; Odat, Haitham A; Khraisat, Heba; Odat, Mohannad A; Alzoubi, Firas Q

    2015-06-01

    To describe lagophthalmos and eyelid closure abnormality after external dacryocystorhinostomy (DCR). A retrospective review of medical records and postoperative photographs of 79 patients who underwent external DCR for nasolacrimal duct obstruction and developed eyelid closure abnormality and lagophthalmos with or without exposure keratopathy was conducted. Collected data included age, sex, indication for surgery, laterality, length and type of incision, length of follow-up duration, presence of punctate epithelial keratopathy, and time for resolution of eyelid closure abnormalities. Twenty-seven patients with 28 external dacryocystorhinostomy had postoperative eyelid closure abnormalities. Male to female ratio was 1:6. The mean age was 40.1 years (range 9-80 years). All surgeries were performed through diagonal skin incision. Lagophthalmos involving the medial third of the palpebral fissure was noticed in 28.6 % of cases. All patients had hypometric blink mainly of the upper eyelid. One patient had punctate epithelial keratopathy. Resolution of lagophthalmos was noticed over a period of 1-5 weeks with an average of 3 weeks. None of the patients continued to have residual hypometric blink or punctate keratopathy at the last follow-up time. The mean follow-up period was 4.2 months (range 3-6 months). Eyelid closure abnormality and lagophthalmos after external DCR are underestimated problems. Spontaneous resolution is seen in all cases weeks to months after surgery.

  5. Femoral Reconstruction Using External Fixation

    Directory of Open Access Journals (Sweden)

    Yevgeniy Palatnik

    2011-01-01

    Full Text Available Background. The use of an external fixator for the purpose of distraction osteogenesis has been applied to a wide range of orthopedic problems caused by such diverse etiologies as congenital disease, metabolic conditions, infections, traumatic injuries, and congenital short stature. The purpose of this study was to analyze our experience of utilizing this method in patients undergoing a variety of orthopedic procedures of the femur. Methods. We retrospectively reviewed our experience of using external fixation for femoral reconstruction. Three subgroups were defined based on the primary reconstruction goal lengthening, deformity correction, and repair of nonunion/bone defect. Factors such as leg length discrepancy (LLD, limb alignment, and external fixation time and complications were evaluated for the entire group and the 3 subgroups. Results. There was substantial improvement in the overall LLD, femoral length discrepancy, and limb alignment as measured by mechanical axis deviation (MAD and lateral distal femoral angle (LDFA for the entire group as well as the subgroups. Conclusions. The Ilizarov external fixator allows for decreased surgical exposure and preservation of blood supply to bone, avoidance of bone grafting and internal fixation, and simultaneous lengthening and deformity correction, making it a very useful technique for femoral reconstruction.

  6. A methylation-stimulated DNA machine: an autonomous isothermal route to methyltransferase activity and inhibition analysis.

    Science.gov (United States)

    Zhu, Changfeng; Wen, Yanqin; Peng, Hongzhen; Long, Yitao; He, Yao; Huang, Qing; Li, Di; Fan, Chunhai

    2011-04-01

    The operation of DNA nanomachines is generally triggered by either conformational changes of DNA nanostructure or external environmental stimuli. In the present study, we demonstrate an alternative driving force, DNA methylation, to stimulate DNA machine operation. DNA methylation changes neither DNA sequence and conformation nor external environment, however, blocks its cleavage by corresponding methylation-sensitive restriction endonuclease. We thus designed a strand displacement amplification DNA machine, which could be stimulated upon DNA methylation and then autonomously generates accumulated amounts of peroxidase-mimicking DNAzyme signaling machine products in an isothermal manner. The machine product DNAzyme could catalyze the H(2)O(2)-mediated oxidation of 2,2'-azino-bis(3-ethylbenzo thiazoline-6-sulfonic acid) (ABTS(2-)) to a colored product ABTS(·-). This methylation-stimulated DNA machine was further used as a colorimetric assay for analysis of methyltransferases activities and screening of methylation inhibitors. As compared with classical methylation assay, this facile isothermal DNA machine avoids the introduction of methylation-specific polymerase chain reaction and radioactive labels, which might be employed as an effective tool for DNA methylation analysis.

  7. Adaptive Excitation Control with L2 Disturbance Attenuation for Multi-Machine Power Systems

    Institute of Scientific and Technical Information of China (English)

    梅生伟; 金敏杰; 申铁龙

    2004-01-01

    Generator excitation control plays an important role in improving the dynamic performance and stability of power systems. This paper is concerned with nonlinear decentralized adaptive excitation control for multi-machine power systems. Based on a recursive design method, an adaptive excitation control law with L2 disturbance attenuation is constructed. Furthermore, it is verified that the proposed control scheme possesses the property of decentralization and the robustness in the sense of L2-gain. As a consequence, transient stability of a multi-machine power system is guaranteed, regardless of system parameters variation and faults.

  8. Machine function based control code algebras

    NARCIS (Netherlands)

    Bergstra, J.A.

    2008-01-01

    Machine functions have been introduced by Earley and Sturgis in [6] in order to provide a mathematical foundation of the use of the T-diagrams proposed by Bratman in [5]. Machine functions describe the operation of a machine at a very abstract level. A theory of hardware and software based on machin

  9. Machining dynamics fundamentals, applications and practices

    CERN Document Server

    Cheng, Kai

    2008-01-01

    Machining dynamics are vital to the performance of machine tools and machining processes in manufacturing. This book discusses the state-of-the-art applications, practices and research in machining dynamics. It presents basic theory, analysis and control methodology. It is useful for manufacturing engineers, supervisors, engineers and designers.

  10. Singer CNC sewing and embroidery machine

    Directory of Open Access Journals (Sweden)

    Lokodi Zsolt

    2011-12-01

    Full Text Available This paper presents the adaptation of a classic foot pedal operated Singer sewing machine to a computerized numerical control (CNC sewing and embroidery machine. This machine is composed of a Singer sewing machine and a two-degrees-of-freedom XY stage designed specifically for this application. The whole system is controlled from a PC using adequate CNC control software.

  11. Physarum machines: encapsulating reaction-diffusion to compute spanning tree

    Science.gov (United States)

    Adamatzky, Andrew

    2007-12-01

    The Physarum machine is a biological computing device, which employs plasmodium of Physarum polycephalum as an unconventional computing substrate. A reaction-diffusion computer is a chemical computing device that computes by propagating diffusive or excitation wave fronts. Reaction-diffusion computers, despite being computationally universal machines, are unable to construct certain classes of proximity graphs without the assistance of an external computing device. I demonstrate that the problem can be solved if the reaction-diffusion system is enclosed in a membrane with few ‘growth points’, sites guiding the pattern propagation. Experimental approximation of spanning trees by P. polycephalum slime mold demonstrates the feasibility of the approach. Findings provided advance theory of reaction-diffusion computation by enriching it with ideas of slime mold computation.

  12. Evolving Neural Turing Machines for Reward-based Learning

    DEFF Research Database (Denmark)

    Jacobsen, Emil Juul; Risi, Sebastian; Greve, Rasmus Boll

    2016-01-01

    and integrating new information without losing previously acquired skills. Here we build on recent work by Graves et al. [5] who extended the capabilities of an ANN by combining it with an external memory bank trained through gradient descent. In this paper, we introduce an evolvable version of their Neural...... Turing Machine (NTM) and show that such an approach greatly simplifies the neural model, generalizes better, and does not require accessing the entire memory content at each time-step. The Evolvable Neural Turing Machine (ENTM) is able to solve a simple copy tasks and for the first time, the continuous...... version of the double T-Maze, a complex reinforcement-like learning problem. In the T-Maze learning task the agent uses the memory bank to display adaptive behavior that normally requires a plastic ANN, thereby suggesting a complementary and effective mechanism for adaptive behavior in NE....

  13. Differences in methodologies used for externality assessment. Why are the numbers different?

    Energy Technology Data Exchange (ETDEWEB)

    Schleisner, Lotte

    1999-06-01

    During the last few years, externalities related to power production technologies have been calculated making use of different methodologies. The external costs may turn out to be very different for the same fuel cycle depending on the methodology that has been used to assess the externalities. The report gives a review of different valuation issues, which are used in different externality studies and focuses on why the numbers often are different for the same fuel cycle, using different methodologies for assessment of the externalities. The review of externality valuation focuses in this report on the assessment of environmental externalities. Importance has been attached to health effects, as these are the dominating effects in the external costs. Other effects are only mentioned on a superior level. The report points out different parameters, which are important to consider when externalities estimated for the same fuel cycle in different studies are compared. 8 studies have been chosen for further analysis and comparison in order to show the variation in external costs. The comparison shows the importance of possessing knowledge of which kind of methodologies have been used, which impacts are included etc. to explain why the numbers vary so much in different studies for the same fuel cycle. As an example a comparison of the impacts and damage costs related to air emissions has been made for three studies using different methodologies. The external costs are estimated for the same reference plant using the dispersion models, dose-response functions, impacts and monetary values from the three studies. The estimates from the three studies are compared two and two, and a more detailed analysis is performed in relation to human health, which is the dominating impact in all externality studies. (au) EFP-97. 29 tabs., 12 ills., 34 refs.

  14. SUPPORT VECTOR MACHINE FOR STRUCTURAL RELIABILITY ANALYSIS

    Institute of Scientific and Technical Information of China (English)

    LI Hong-shuang; L(U) Zhen-zhou; YUE Zhu-feng

    2006-01-01

    Support vector machine (SVM) was introduced to analyze the reliability of the implicit performance function, which is difficult to implement by the classical methods such as the first order reliability method (FORM) and the Monte Carlo simulation (MCS). As a classification method where the underlying structural risk minimization inference rule is employed, SVM possesses excellent learning capacity with a small amount of information and good capability of generalization over the complete data. Hence,two approaches, i.e., SVM-based FORM and SVM-based MCS, were presented for the structural reliability analysis of the implicit limit state function. Compared to the conventional response surface method (RSM) and the artificial neural network (ANN), which are widely used to replace the implicit state function for alleviating the computation cost,the more important advantages of SVM are that it can approximate the implicit function with higher precision and better generalization under the small amount of information and avoid the "curse of dimensionality". The SVM-based reliability approaches can approximate the actual performance function over the complete sampling data with the decreased number of the implicit performance function analysis (usually finite element analysis), and the computational precision can satisfy the engineering requirement, which are demonstrated by illustrations.

  15. Defensive externality and blame projection following failure.

    Science.gov (United States)

    Hochreich, D J

    1975-09-01

    This study focuses upon the relationship between internal-external control and defensive blame projection. Trust was used as a moderator variable for making differential predictions concerning the behavior of two subgroups of externals: defensive externals, whose externality is presumed to reflect primarily a verbal technique of defense, and congruent externals, whose externality reflects a more genuine belief that most outcomes are determined by forces beyond their personal control. As predicted, defensive externals showed a stronger tendency than did congruent externals and internals to resort to blame projection following failure at an achievement task. There were no group differences in attribution following task success. Defensive externals were found to be more responsive to negative feedback than were congruent externals.

  16. Core Muscle Activity, Exercise Preference, and Perceived Exertion during Core Exercise with Elastic Resistance versus Machine

    Directory of Open Access Journals (Sweden)

    Jonas Vinstrup

    2015-01-01

    Full Text Available Objectives. To investigate core muscle activity, exercise preferences, and perceived exertion during two selected core exercises performed with elastic resistance versus a conventional training machine. Methods. 17 untrained men aged 26–67 years participated in surface electromyography (EMG measurements of five core muscles during torso-twists performed from left to right with elastic resistance and in the machine, respectively. The order of the exercises was randomized and each exercise consisted of 3 repetitions performed at a 10 RM load. EMG amplitude was normalized (nEMG to maximum voluntary isometric contraction (MVC. Results. A higher right erector spinae activity in the elastic exercise compared with the machine exercise (50% [95% CI 36–64] versus 32% [95% CI 18–46] nEMG was found. By contrast, the machine exercise, compared with the elastic exercise, showed higher left external oblique activity (77% [95% CI 64–90] versus 54% [95% CI 40–67] nEMG. For the rectus abdominis, right external oblique, and left erector spinae muscles there were no significant differences. Furthermore, 76% preferred the torso-twist with elastic resistance over the machine exercise. Perceived exertion (Borg CR10 was not significantly different between machine (5.8 [95% CI 4.88–6.72] and elastic exercise (5.7 [95% CI 4.81–6.59]. Conclusion. Torso-twists using elastic resistance showed higher activity of the erector spinae, whereas torso-twist in the machine resulted in higher activity of the external oblique. For the remaining core muscles the two training modalities induced similar muscular activation. In spite of similar perceived exertion the majority of the participants preferred the exercise using elastic resistance.

  17. Compiling scheme using abstract state machines

    OpenAIRE

    2003-01-01

    The project investigates the use of Abstract State Machine in the process of computer program compilation. Compilation is to produce machine-code from a source program written in a high-level language. A compiler is a program written for the purpose. Machine-code is the computer-readable representation of sequences of computer instructions. An Abstract State Machine (ASM) is a notional computing machine, developed by Yuri Gurevich, for accurately and easily representing the semantics of...

  18. Provable Data Possession Scheme based on Homomorphic Hash Function in Cloud Storage

    Directory of Open Access Journals (Sweden)

    Li Yu

    2016-01-01

    Full Text Available Cloud storage can satisfy the demand of accessing data at anytime, anyplace. In cloud storage, only when the users can verify that the cloud storage server possesses the data correctly, users shall feel relax to use cloud storage. Provable data possession(PDP makes it easy for a third party to verify whether the data is integrity in the cloud storage server. We analyze the existing PDP schemes, find that these schemes have some drawbacks, such as computationally expensive, only performing a limited number provable data possession. This paper proposes a provable data possession scheme based on homomorphic hash function according to the problems exist in the existing algorithms. The advantage of homomorphic hash function is that it provides provable data possession and data integrity protection. The scheme is a good way to ensure the integrity of remote data and reduce redundant storage space and bandwidth consumption on the premise that users do not retrieve data. The main cost of the scheme is in the server side, it is suitable for mobile devices in the cloud storage environments. We prove that the scheme is feasible by analyzing the security and performance of the scheme.

  19. Gun possession among American youth: a discovery-based approach to understand gun violence.

    Science.gov (United States)

    Ruggles, Kelly V; Rajan, Sonali

    2014-01-01

    To apply discovery-based computational methods to nationally representative data from the Centers for Disease Control and Preventions' Youth Risk Behavior Surveillance System to better understand and visualize the behavioral factors associated with gun possession among adolescent youth. Our study uncovered the multidimensional nature of gun possession across nearly five million unique data points over a ten year period (2001-2011). Specifically, we automated odds ratio calculations for 55 risk behaviors to assemble a comprehensive table of associations for every behavior combination. Downstream analyses included the hierarchical clustering of risk behaviors based on their association "fingerprint" to 1) visualize and assess which behaviors frequently co-occur and 2) evaluate which risk behaviors are consistently found to be associated with gun possession. From these analyses, we identified more than 40 behavioral factors, including heroin use, using snuff on school property, having been injured in a fight, and having been a victim of sexual violence, that have and continue to be strongly associated with gun possession. Additionally, we identified six behavioral clusters based on association similarities: 1) physical activity and nutrition; 2) disordered eating, suicide and sexual violence; 3) weapon carrying and physical safety; 4) alcohol, marijuana and cigarette use; 5) drug use on school property and 6) overall drug use. Use of computational methodologies identified multiple risk behaviors, beyond more commonly discussed indicators of poor mental health, that are associated with gun possession among youth. Implications for prevention efforts and future interdisciplinary work applying computational methods to behavioral science data are described.

  20. Classifying BCI signals from novice users with extreme learning machine

    Science.gov (United States)

    Rodríguez-Bermúdez, Germán; Bueno-Crespo, Andrés; José Martinez-Albaladejo, F.

    2017-07-01

    Brain computer interface (BCI) allows to control external devices only with the electrical activity of the brain. In order to improve the system, several approaches have been proposed. However it is usual to test algorithms with standard BCI signals from experts users or from repositories available on Internet. In this work, extreme learning machine (ELM) has been tested with signals from 5 novel users to compare with standard classification algorithms. Experimental results show that ELM is a suitable method to classify electroencephalogram signals from novice users.

  1. Classifying BCI signals from novice users with extreme learning machine

    Directory of Open Access Journals (Sweden)

    Rodríguez-Bermúdez Germán

    2017-07-01

    Full Text Available Brain computer interface (BCI allows to control external devices only with the electrical activity of the brain. In order to improve the system, several approaches have been proposed. However it is usual to test algorithms with standard BCI signals from experts users or from repositories available on Internet. In this work, extreme learning machine (ELM has been tested with signals from 5 novel users to compare with standard classification algorithms. Experimental results show that ELM is a suitable method to classify electroencephalogram signals from novice users.

  2. Cluster-based query expansion using external collections in medical information retrieval.

    Science.gov (United States)

    Oh, Heung-Seon; Jung, Yuchul

    2015-12-01

    Utilizing external collections to improve retrieval performance is challenging research because various test collections are created for different purposes. Improving medical information retrieval has also gained much attention as various types of medical documents have become available to researchers ever since they started storing them in machine processable formats. In this paper, we propose an effective method of utilizing external collections based on the pseudo relevance feedback approach. Our method incorporates the structure of external collections in estimating individual components in the final feedback model. Extensive experiments on three medical collections (TREC CDS, CLEF eHealth, and OHSUMED) were performed, and the results were compared with a representative expansion approach utilizing the external collections to show the superiority of our method.

  3. Music emotion detection using hierarchical sparse kernel machines.

    Science.gov (United States)

    Chin, Yu-Hao; Lin, Chang-Hong; Siahaan, Ernestasia; Wang, Jia-Ching

    2014-01-01

    For music emotion detection, this paper presents a music emotion verification system based on hierarchical sparse kernel machines. With the proposed system, we intend to verify if a music clip possesses happiness emotion or not. There are two levels in the hierarchical sparse kernel machines. In the first level, a set of acoustical features are extracted, and principle component analysis (PCA) is implemented to reduce the dimension. The acoustical features are utilized to generate the first-level decision vector, which is a vector with each element being a significant value of an emotion. The significant values of eight main emotional classes are utilized in this paper. To calculate the significant value of an emotion, we construct its 2-class SVM with calm emotion as the global (non-target) side of the SVM. The probability distributions of the adopted acoustical features are calculated and the probability product kernel is applied in the first-level SVMs to obtain first-level decision vector feature. In the second level of the hierarchical system, we merely construct a 2-class relevance vector machine (RVM) with happiness as the target side and other emotions as the background side of the RVM. The first-level decision vector is used as the feature with conventional radial basis function kernel. The happiness verification threshold is built on the probability value. In the experimental results, the detection error tradeoff (DET) curve shows that the proposed system has a good performance on verifying if a music clip reveals happiness emotion.

  4. Dipolar fluids under external perturbations

    Energy Technology Data Exchange (ETDEWEB)

    Klapp, Sabine H L [Stranski-Laboratorium fuer Physikalische und Theoretische Chemie Sekretariat TC7, Technische Universitaet Berlin, Strasse des 17. Juni 124, D-10623 Berlin (Germany)

    2005-04-20

    We discuss recent developments and present new findings on the structural and phase properties of dipolar model fluids influenced by various external perturbations. We concentrate on systems of spherical particles with permanent (point) dipole moments. Starting from what is known about the three-dimensional systems, particular emphasis is given to dipolar fluids in different confining situations involving both simple and complex (disordered) pore geometries. Further topics concern the effect of quenched positional disorder, the influence of external (electric or magnetic) fields, and the fluid-fluid phase behaviour of various dipolar mixtures. It is demonstrated that due to the translational-orientational coupling and due to the long range of dipolar interactions even simple perturbations such as hard walls can have a profound impact on the systems. (topical review)

  5. External observer reflections on QBism

    CERN Document Server

    Khrennikov, Andrei

    2015-01-01

    In this short review I present my personal reflections on QBism. I have no intrinsic sympathy neither to QBism nor to subjective interpretation of probability in general. However, I have been following development of QBism from its very beginning, observing its evolution and success, sometimes with big surprise. Therefore my reflections on QBism can be treated as "external observer" reflections. I hope that my representation of this interpretation of quantum mechanics (QM) has some degree of objectivity. It may be useful for researchers who are interested in quantum foundations, but do not belong to the QBism-community, because I tried to analyze essentials of QBism critically (i.e., not just emphasizing its advantages, as in a typical publication of QBists). QBists may be interested as well - in comments of an external observer who monitored development of this approach to QM during last 16 years. The second part of the paper is devoted to interpretations of probability, objective versus subjective, and view...

  6. Firm Search for External Knowledge

    DEFF Research Database (Denmark)

    Sofka, Wolfgang; Grimpe, Christoph

    2012-01-01

    The innovation performance of modern firms is increasingly determined by their ability to search and absorb external knowledge. However, after a certain threshold firms "oversearch" their environment and innovation performance declines. In this paper, we argue that prior literature has largely...... ignored the institutional context that provides or denies access to external knowledge at the country level. Combining institutional and knowledge search theory, we suggest that the market orientation of the institutional environment and the magnitude of institutional change influence when firms begin...... to experience the negative performance effects of oversearch. Based on a comprehensive sample of almost 8,000 firms from ten European countries, we find that institutions matter considerably for firms' search activity. Higher market orientation of institutions increases the effectiveness of firms' search...

  7. MGR External Events Hazards Analysis

    Energy Technology Data Exchange (ETDEWEB)

    L. Booth

    1999-11-06

    The purpose and objective of this analysis is to apply an external events Hazards Analysis (HA) to the License Application Design Selection Enhanced Design Alternative 11 [(LADS EDA II design (Reference 8.32))]. The output of the HA is called a Hazards List (HL). This analysis supersedes the external hazards portion of Rev. 00 of the PHA (Reference 8.1). The PHA for internal events will also be updated to the LADS EDA II design but under a separate analysis. Like the PHA methodology, the HA methodology provides a systematic method to identify potential hazards during the 100-year Monitored Geologic Repository (MGR) operating period updated to reflect the EDA II design. The resulting events on the HL are candidates that may have potential radiological consequences as determined during Design Basis Events (DBEs) analyses. Therefore, the HL that results from this analysis will undergo further screening and analysis based on the criteria that apply during the performance of DBE analyses.

  8. Brain Machine Interface: Analysis of segmented EEG Signal Classification Using Short-Time PCA and Recurrent Neural Networks

    OpenAIRE

    C. R. Hema; Paulraj, M.P.; Nagarajan, R.; Sazali Yaacob; Abdul Hamid Adom

    2008-01-01

    Brain machine interface provides a communication channel between the human brain and an external device. Brain interfaces are studied to provide rehabilitation to patients with neurodegenerative diseases; such patients loose all communication pathways except for their sensory and cognitive functions. One of the possible rehabilitation methods for these patients is to provide a brain machine interface (BMI) for communication; the BMI uses the electrical activity of the brain detected by scalp ...

  9. Game-powered machine learning.

    Science.gov (United States)

    Barrington, Luke; Turnbull, Douglas; Lanckriet, Gert

    2012-04-24

    Searching for relevant content in a massive amount of multimedia information is facilitated by accurately annotating each image, video, or song with a large number of relevant semantic keywords, or tags. We introduce game-powered machine learning, an integrated approach to annotating multimedia content that combines the effectiveness of human computation, through online games, with the scalability of machine learning. We investigate this framework for labeling music. First, a socially-oriented music annotation game called Herd It collects reliable music annotations based on the "wisdom of the crowds." Second, these annotated examples are used to train a supervised machine learning system. Third, the machine learning system actively directs the annotation games to collect new data that will most benefit future model iterations. Once trained, the system can automatically annotate a corpus of music much larger than what could be labeled using human computation alone. Automatically annotated songs can be retrieved based on their semantic relevance to text-based queries (e.g., "funky jazz with saxophone," "spooky electronica," etc.). Based on the results presented in this paper, we find that actively coupling annotation games with machine learning provides a reliable and scalable approach to making searchable massive amounts of multimedia data.

  10. Mechanical design of walking machines.

    Science.gov (United States)

    Arikawa, Keisuke; Hirose, Shigeo

    2007-01-15

    The performance of existing actuators, such as electric motors, is very limited, be it power-weight ratio or energy efficiency. In this paper, we discuss the method to design a practical walking machine under this severe constraint with focus on two concepts, the gravitationally decoupled actuation (GDA) and the coupled drive. The GDA decouples the driving system against the gravitational field to suppress generation of negative power and improve energy efficiency. On the other hand, the coupled drive couples the driving system to distribute the output power equally among actuators and maximize the utilization of installed actuator power. First, we depict the GDA and coupled drive in detail. Then, we present actual machines, TITAN-III and VIII, quadruped walking machines designed on the basis of the GDA, and NINJA-I and II, quadruped wall walking machines designed on the basis of the coupled drive. Finally, we discuss walking machines that travel on three-dimensional terrain (3D terrain), which includes the ground, walls and ceiling. Then, we demonstrate with computer simulation that we can selectively leverage GDA and coupled drive by walking posture control.

  11. Reusable State Machine Code Generator

    Science.gov (United States)

    Hoffstadt, A. A.; Reyes, C.; Sommer, H.; Andolfato, L.

    2010-12-01

    The State Machine model is frequently used to represent the behaviour of a system, allowing one to express and execute this behaviour in a deterministic way. A graphical representation such as a UML State Chart diagram tames the complexity of the system, thus facilitating changes to the model and communication between developers and domain experts. We present a reusable state machine code generator, developed by the Universidad Técnica Federico Santa María and the European Southern Observatory. The generator itself is based on the open source project architecture, and uses UML State Chart models as input. This allows for a modular design and a clean separation between generator and generated code. The generated state machine code has well-defined interfaces that are independent of the implementation artefacts such as the middle-ware. This allows using the generator in the substantially different observatory software of the Atacama Large Millimeter Array and the ESO Very Large Telescope. A project-specific mapping layer for event and transition notification connects the state machine code to its environment, which can be the Common Software of these projects, or any other project. This approach even allows to automatically create tests for a generated state machine, using techniques from software testing, such as path-coverage.

  12. Machine Learning in Parliament Elections

    Directory of Open Access Journals (Sweden)

    Ahmad Esfandiari

    2012-09-01

    Full Text Available Parliament is considered as one of the most important pillars of the country governance. The parliamentary elections and prediction it, had been considered by scholars of from various field like political science long ago. Some important features are used to model the results of consultative parliament elections. These features are as follows: reputation and popularity, political orientation, tradesmen's support, clergymen's support, support from political wings and the type of supportive wing. Two parameters of reputation and popularity and the support of clergymen and religious scholars that have more impact in reducing of prediction error in election results, have been used as input parameters in implementation. In this study, the Iranian parliamentary elections, modeled and predicted using learnable machines of neural network and neuro-fuzzy. Neuro-fuzzy machine combines the ability of knowledge representation of fuzzy sets and the learning power of neural networks simultaneously. In predicting the social and political behavior, the neural network is first trained by two learning algorithms using the training data set and then this machine predict the result on test data. Next, the learning of neuro-fuzzy inference machine is performed. Then, be compared the results of two machines.

  13. Viscoelastic machine elements elastomers and lubricants in machine systems

    CERN Document Server

    MOORE, D F

    2015-01-01

    Viscoelastic Machine Elements, which encompass elastomeric elements (rubber-like components), fluidic elements (lubricating squeeze films) and their combinations, are used for absorbing vibration, reducing friction and improving energy use. Examplesinclude pneumatic tyres, oil and lip seals, compliant bearings and races, and thin films. This book sets out to show that these elements can be incorporated in machine analysis, just as in the case of conventional elements (e.g. gears, cogs, chaindrives, bearings). This is achieved by introducing elementary theory and models, by describing new an

  14. Spectrum Assignment Algorithm for Cognitive Machine-to-Machine Networks

    Directory of Open Access Journals (Sweden)

    Soheil Rostami

    2016-01-01

    Full Text Available A novel aggregation-based spectrum assignment algorithm for Cognitive Machine-To-Machine (CM2M networks is proposed. The introduced algorithm takes practical constraints including interference to the Licensed Users (LUs, co-channel interference (CCI among CM2M devices, and Maximum Aggregation Span (MAS into consideration. Simulation results show clearly that the proposed algorithm outperforms State-Of-The-Art (SOTA algorithms in terms of spectrum utilisation and network capacity. Furthermore, the convergence analysis of the proposed algorithm verifies its high convergence rate.

  15. Network externalities across financial institutions

    OpenAIRE

    Castro Iragorri, Carlos Alberto; Preciado Pua, Sergio Andrés; Ordóñez Herrera, Juan Sebastián

    2016-01-01

    We propose and estimate a financial distress model that explicitly accounts for the interactions or spill-over effects between financial institutions, through the use of a spatial continuity matrix that is build from financial network data of inter bank transactions. Such setup of the financial distress model allows for the empirical validation of the importance of network externalities in determining financial distress, in addition to institution specific and macroeconomic covariates. The re...

  16. Externe Kosten in der Energiewirtschaft

    OpenAIRE

    Voß, Alfred; Friedrich, Rainer

    1994-01-01

    Als externe Effekte werden unbeteiligte Dritte betreffende Zusatzkosten oder Zusatznutzen verstanden, die sich in den jeweiligen Güterpreisen nicht wiederfinden und denen die Betroffenen nicht indifferent gegenüberstehen. Die gegenwärtige Energiebereitstellung und -nutzung ist in vielen Bereichen eine wesentliche Quelle der Belastung von Umwelt und Natur. Begriffe und Schlagworte wie Waldsterben, Tankerunglücke, Tschernobyl und Treibhauseffekt seien in diesem Zusammenhang erwähnt.

  17. Matching Games with Additive Externalities

    DEFF Research Database (Denmark)

    Branzei, Simina; Michalak, Tomasz; Rahwan, Talal

    2012-01-01

    Two-sided matchings are an important theoretical tool used to model markets and social interactions. In many real life problems the utility of an agent is influenced not only by their own choices, but also by the choices that other agents make. Such an influence is called an externality. Whereas......, optimistic, and pessimistic behaviour, and provide both computational hardness results and polynomial-time algorithms for computing stable outcomes....

  18. Hybrid computing using a neural network with dynamic external memory.

    Science.gov (United States)

    Graves, Alex; Wayne, Greg; Reynolds, Malcolm; Harley, Tim; Danihelka, Ivo; Grabska-Barwińska, Agnieszka; Colmenarejo, Sergio Gómez; Grefenstette, Edward; Ramalho, Tiago; Agapiou, John; Badia, Adrià Puigdomènech; Hermann, Karl Moritz; Zwols, Yori; Ostrovski, Georg; Cain, Adam; King, Helen; Summerfield, Christopher; Blunsom, Phil; Kavukcuoglu, Koray; Hassabis, Demis

    2016-10-27

    Artificial neural networks are remarkably adept at sensory processing, sequence learning and reinforcement learning, but are limited in their ability to represent variables and data structures and to store data over long timescales, owing to the lack of an external memory. Here we introduce a machine learning model called a differentiable neural computer (DNC), which consists of a neural network that can read from and write to an external memory matrix, analogous to the random-access memory in a conventional computer. Like a conventional computer, it can use its memory to represent and manipulate complex data structures, but, like a neural network, it can learn to do so from data. When trained with supervised learning, we demonstrate that a DNC can successfully answer synthetic questions designed to emulate reasoning and inference problems in natural language. We show that it can learn tasks such as finding the shortest path between specified points and inferring the missing links in randomly generated graphs, and then generalize these tasks to specific graphs such as transport networks and family trees. When trained with reinforcement learning, a DNC can complete a moving blocks puzzle in which changing goals are specified by sequences of symbols. Taken together, our results demonstrate that DNCs have the capacity to solve complex, structured tasks that are inaccessible to neural networks without external read-write memory.

  19. ENDOSCOPIC DCR VERSUS EXTERNAL DCR

    Directory of Open Access Journals (Sweden)

    Rukma

    2015-04-01

    Full Text Available PURPOSE: To compare success rates of endoscopic dacryocystorhinostomy (DCR and external DCR for acquired nasolacrimal duct obstruction (NLDO. MATERIALS AND METHODS: A prospective comparative non randomized study of 64 patients who presented with acquired NLD obstruction to a tertiary hospital. They were fully evaluated to ascertain the site of obstruction and patients with distal obstruction were included in the study. 34 patients underwent endoscopic DCR and 30 patients underwent external DCR RESULTS: 64 patients were included in the study and 72 procedures carried out. Success was achieved in 65 cases and failure in 7. Of the 7 failed cases, anatomical obstruction at the fistula site was found in 3, whereas functional failure was found in 4. In our patients, endoscopic DCR had a significantly higher success rate than external DCR, 95.23% versus 83.33% (P = 0.03. CONCLUSIONS: The success rate of Endoscopic DCR for acquired NLDO in our group of patients was 95.23%, with endoscopic surgery showing better results.

  20. Conceptual challenges for internalising externalities

    DEFF Research Database (Denmark)

    Miguel, Brandão; Weidema, Bo Pedersen

    2013-01-01

    We analyse a number of different externalities to identify conceptual challenges for the practical implementation of their internalisation. Three issues were identified: i) The balance between compensation and technology change and the respective effects on the nominal and real GDP; ii) The relev......We analyse a number of different externalities to identify conceptual challenges for the practical implementation of their internalisation. Three issues were identified: i) The balance between compensation and technology change and the respective effects on the nominal and real GDP; ii......) The relevance and efficiency of different instruments for internalisation and compensation; and iii) Implementing internalisation over large geographical and temporal distances. We find taxation to be a more relevant and efficient tool for internalisation than insurance and litigation. With increasing...... geographical and especially temporal distance between the benefitting actor and the victim of the external cost, the involvement of a non-governmental intermediate actor becomes increasingly necessary to provide the short-term capital required to ensure a successful implementation....

  1. Individuals' insight into intrapersonal externalities

    Directory of Open Access Journals (Sweden)

    David J. Stillwell

    2012-07-01

    Full Text Available An intrapersonal externality exists when an individual's decisions affect the outcomes of her future decisions. It can result in decreasing or increasing average returns to the rate of consumption, as occurs in addiction or exercise. Experimentation using the Harvard Game, which models intrapersonal externalities, has found differences in decision making between drug users and control subjects, leading to the argument that these externalities influence the course of illicit drug use. Nevertheless, it is unclear how participants who behave optimally conceptualise the problem. We report two experiments using a simplified Harvard Game, which tested the differences in contingency knowledge between participants who chose optimally and participants who did not. Those who demonstrated optimal performance exhibited both a pattern of correct responses and systematic errors to questions about the payoff schedules. The pattern suggested that they learned explicit knowledge of the change in reinforcement on a trail-by-trial basis. They did not have, or need, a full knowledge of the historical interaction leading to each payoff. We also found no evidence of choice differences between participants who were given a guaranteed payment and participants who were paid contingent on their performance, but those given a guaranteed payment were able to report more contingency knowledge as the experiment progressed, suggesting that they explored more rather than settling into a routine. Experiment 2 showed that using a fixed inter-trial interval did not change the results.

  2. Demonic possessions and mental illness: discussion of selected cases in late medieval hagiographical literature.

    Science.gov (United States)

    Espí Forcén, Carlos; Espí Forcén, Fernando

    2014-01-01

    During the Middle Ages, demonic possession constituted an explanation for an erratic behavior in society. Exorcism was the treatment generally applied to demoniacs and seems to have caused some alleviation in the suffering of mentally distressed people. We have selected and analyzed some cases of demonic possession from thirteenth-century hagiographical literature. In the description of demoniacs we have been able to find traits of psychotic, mood, neurotic, personality disorders and epilepsy. The exorcisms analyzed in our article are the result of literary invention more than the description of a contemporary event. Nevertheless, the writers were witnesses of their time, transferred their knowledge about exorcism and possession in their narrative and presumably incorporated their actual experience with demoniacs.

  3. Possession as a clinical phenomenon: a critique of the medical model

    Directory of Open Access Journals (Sweden)

    Owe Wikström

    1982-01-01

    Full Text Available The focus of this article is on the individual's specific experience of his personality being possessed, either partially or completely, momentarily or for an extended period of time, by evil spirits. It must be seen as necessary to supplement the narrow medical model for interpreting states of possession. The clinically interested psychologist of religion, in particular, needs consider aspects of the phenomenology of religion and clinical psychology in order to gain a broader understanding of this phenomenon. To declare that possession experiences are "nothing but psychosis, mania, epilepsy or schizophrenia, are examples of this type of over-simplification. The structure of possession can above all be understood as an interaction between a cognitive, linguistic level, and an emotional, affective level. Only if one unites these two levels can one attain a deeper understanding of the individual's possession experience. It is, in other words, important to remember that to increase understanding of the structure of possession, we must relate the individual's (bio-chemically conditioned intensive feeling experience to the surrounding subculture's way of defining these intensive feelings. Religious language provides one way of dealing verbally with the unstructured and terrifying aspects of a developing psychosis. It is, for example, possible to describe the personal transformation as a dynamic relationship between the verbal representatives for evil or the Evil One in the world of mythological language, and the intrapsychic, anxiety-filled emotive state, regardless of whether this inner state is considered to be the result of neurosis, psycho-sis, or the consequence of intensive suggestion.

  4. An improved method of support vector machine and its applications to financial time series forecasting

    Institute of Scientific and Technical Information of China (English)

    LIANG Yanchun; SUN Yanfeng

    2003-01-01

    A novel method for kernel function of support vector machine is presented based on the information geometry theory. The kernel function is modified using a conformal mapping to make the kernel data-dependent so as to increase the ability of predicting high noise data of the method. Numerical simulations demonstrate the effectiveness of the method. Simulated results on the prediction of the stock price show that the improved approach possesses better forecasting precision and ability of generalization than the conventional models.

  5. Build your own time machine

    CERN Document Server

    Clegg, Brian

    2012-01-01

    There is no physical law to prevent time travel nothing in physics to say it is impossible. So who is to say it can't be done? In Build Your Own Time Machine, acclaimed science writer Brian Clegg takes inspiration from his childhood heroes, Doctor Who and H. G. Wells, to explain the nature of time. How do we understand it and why measure it the way we do? How did the theories of one man change the way time was perceived by the world? Why wouldn't H. G. Wells's time machine have worked? And what would we need to do to make a real one? Build Your Own Time Machine explores the amazing possib

  6. Emerging Paradigms in Machine Learning

    CERN Document Server

    Jain, Lakhmi; Howlett, Robert

    2013-01-01

    This  book presents fundamental topics and algorithms that form the core of machine learning (ML) research, as well as emerging paradigms in intelligent system design. The  multidisciplinary nature of machine learning makes it a very fascinating and popular area for research.  The book is aiming at students, practitioners and researchers and captures the diversity and richness of the field of machine learning and intelligent systems.  Several chapters are devoted to computational learning models such as granular computing, rough sets and fuzzy sets An account of applications of well-known learning methods in biometrics, computational stylistics, multi-agent systems, spam classification including an extremely well-written survey on Bayesian networks shed light on the strengths and weaknesses of the methods. Practical studies yielding insight into challenging problems such as learning from incomplete and imbalanced data, pattern recognition of stochastic episodic events and on-line mining of non-stationary ...

  7. INVESTIGATION OF MAGNESIUM ALLOYS MACHINABILITY

    Directory of Open Access Journals (Sweden)

    Berat Barıs BULDUM

    2013-01-01

    Full Text Available Magnesium is the lightest structural metal. Magnesium alloys have a hexagonal lattice structure, which affects the fundamental properties of these alloys. Plastic deformation of the hexagonal lattice is more complicated than in cubic latticed metals like aluminum, copper and steel. Magnesium alloy developments have traditionally been driven by industry requirements for lightweight materials to operate under increasingly demanding conditions. Magnesium alloys have always been attractive to designers due to their low density, only two thirds that of aluminium and its alloys [1]. The element and its alloys take a big part of modern industry needs. Especially nowadays magnesium alloys are used in automotive and mechanical (trains and wagons manufacture, because of its lightness and other features. Magnesium and magnesium alloys are the easiest of all metals to machine, allowing machining operations at extremely high speed. All standard machining operations such as turning, drilling, milling, are commonly performed on magnesium parts.

  8. Higgs Machine Learning Challenge 2014

    CERN Multimedia

    Olivier, A-P; Bourdarios, C ; LAL / Orsay; Goldfarb, S ; University of Michigan

    2014-01-01

    High Energy Physics (HEP) has been using Machine Learning (ML) techniques such as boosted decision trees (paper) and neural nets since the 90s. These techniques are now routinely used for difficult tasks such as the Higgs boson search. Nevertheless, formal connections between the two research fields are rather scarce, with some exceptions such as the AppStat group at LAL, founded in 2006. In collaboration with INRIA, AppStat promotes interdisciplinary research on machine learning, computational statistics, and high-energy particle and astroparticle physics. We are now exploring new ways to improve the cross-fertilization of the two fields by setting up a data challenge, following the footsteps of, among others, the astrophysics community (dark matter and galaxy zoo challenges) and neurobiology (connectomics and decoding the human brain). The organization committee consists of ATLAS physicists and machine learning researchers. The Challenge will run from Monday 12th to September 2014.

  9. Single Bacteria as Turing Machines

    Science.gov (United States)

    Bos, Julia; Zang, Qiucen; Vyawahare, Saurabh; Austin, Robert

    2014-03-01

    In Allan Turing's famous 1950 paper on Computing Machinery and Intelligence, he started with the provocative statement: ``I propose to consider the question, `Can machines think?' This should begin with definitions of the meaning of the terms `machine' and `think'.'' In our own work on exploring the way that organisms respond to stress and evolve, it seems at times as if they come to remarkably fast solutions to problems, indicating some sort of very clever computational machinery. I'll discuss how it would appear that bacteria can indeed create a form of a Turing Machine, the first example of a computer, and how they might use this algorithm to do rapid evolution to solve a genomics problem.

  10. Plug into 'the modernizing machine'!

    DEFF Research Database (Denmark)

    Krejsler, John B.

    2013-01-01

    ‘The modernizing machine’ codes individual bodies, things and symbols with images from New Public Management, neoliberal and Knowledge Economy discourses. Drawing on Deleuze & Guattari’s concept of machines, this article explores how ‘the modernizing machine’ produces neo-liberal modernization...... of the public sector. Taking its point of departure in Danish university reform, the article explores how the university is transformed by this desiring-producing machine. ‘The modernizing machine’ wrestles with the so-called ‘democratic-Humboldtian machine’. The University Act of 2003 and the host of reforms...... bodies and minds simultaneously produce academic subjectivities by plugging into these transformative machinic forces and are produced as they are traversed by them. What is experienced as stressful closures vis-à-vis new opportunities depends to a great extent upon how these producing...

  11. Machine learning methods in chemoinformatics

    Science.gov (United States)

    Mitchell, John B O

    2014-01-01

    Machine learning algorithms are generally developed in computer science or adjacent disciplines and find their way into chemical modeling by a process of diffusion. Though particular machine learning methods are popular in chemoinformatics and quantitative structure–activity relationships (QSAR), many others exist in the technical literature. This discussion is methods-based and focused on some algorithms that chemoinformatics researchers frequently use. It makes no claim to be exhaustive. We concentrate on methods for supervised learning, predicting the unknown property values of a test set of instances, usually molecules, based on the known values for a training set. Particularly relevant approaches include Artificial Neural Networks, Random Forest, Support Vector Machine, k-Nearest Neighbors and naïve Bayes classifiers. WIREs Comput Mol Sci 2014, 4:468–481. How to cite this article: WIREs Comput Mol Sci 2014, 4:468–481. doi:10.1002/wcms.1183 PMID:25285160

  12. Vector grammars and PN machines

    Institute of Scientific and Technical Information of China (English)

    蒋昌俊

    1996-01-01

    The concept of vector grammars under the string semantic is introduced.The dass of vector grammars is given,which is similar to the dass of Chomsky grammars.The regular vector grammar is divided further.The strong and weak relation between the vector grammar and scalar grammar is discussed,so the spectrum system graph of scalar and vector grammars is made.The equivalent relation between the regular vector grammar and Petri nets (also called PN machine) is pointed.The hybrid PN machine is introduced,and its language is proved equivalent to the language of the context-free vector grammar.So the perfect relation structure between vector grammars and PN machines is formed.

  13. Machine learning phases of matter

    Science.gov (United States)

    Carrasquilla, Juan; Melko, Roger G.

    2017-02-01

    Condensed-matter physics is the study of the collective behaviour of infinitely complex assemblies of electrons, nuclei, magnetic moments, atoms or qubits. This complexity is reflected in the size of the state space, which grows exponentially with the number of particles, reminiscent of the `curse of dimensionality' commonly encountered in machine learning. Despite this curse, the machine learning community has developed techniques with remarkable abilities to recognize, classify, and characterize complex sets of data. Here, we show that modern machine learning architectures, such as fully connected and convolutional neural networks, can identify phases and phase transitions in a variety of condensed-matter Hamiltonians. Readily programmable through modern software libraries, neural networks can be trained to detect multiple types of order parameter, as well as highly non-trivial states with no conventional order, directly from raw state configurations sampled with Monte Carlo.

  14. Alpha Channeling in Mirror Machines

    Energy Technology Data Exchange (ETDEWEB)

    Fisch N.J.

    2005-10-19

    Because of their engineering simplicity, high-β, and steady-state operation, mirror machines and related open-trap machines such as gas dynamic traps, are an attractive concept for achieving controlled nuclear fusion. In these open-trap machines, the confinement occurs by means of magnetic mirroring, without the magnetic field lines closing upon themselves within the region of particle confinement. Unfortunately, these concepts have not achieved to date very spectacular laboratory results, and their reactor prospects are dimmed by the prospect of a low Q-factor, the ratio of fusion power produced to auxiliary power. Nonetheless, because of its engineering promise, over the years numerous improvements have been proposed to enhance the reactor prospects of mirror fusion, such as tandem designs, end-plugging, and electric potential barriers.

  15. Traditional machining processes research advances

    CERN Document Server

    2015-01-01

    This book collects several examples of research in machining processes. Chapter 1 provides information on polycrystalline diamond tool material and its emerging applications. Chapter 2 is dedicated to the analysis of orthogonal cutting experiments using diamond-coated tools with force and temperature measurements. Chapter 3 describes the estimation of cutting forces and tool wear using modified mechanistic models in high performance turning. Chapter 4 contains information on cutting under gas shields for industrial applications. Chapter 5 is dedicated to the machinability of magnesium and its alloys. Chapter 6 provides information on grinding science. Finally, chapter 7 is dedicated to flexible integration of shape and functional modelling of machine tool spindles in a design framework.    

  16. Machine learning for evolution strategies

    CERN Document Server

    Kramer, Oliver

    2016-01-01

    This book introduces numerous algorithmic hybridizations between both worlds that show how machine learning can improve and support evolution strategies. The set of methods comprises covariance matrix estimation, meta-modeling of fitness and constraint functions, dimensionality reduction for search and visualization of high-dimensional optimization processes, and clustering-based niching. After giving an introduction to evolution strategies and machine learning, the book builds the bridge between both worlds with an algorithmic and experimental perspective. Experiments mostly employ a (1+1)-ES and are implemented in Python using the machine learning library scikit-learn. The examples are conducted on typical benchmark problems illustrating algorithmic concepts and their experimental behavior. The book closes with a discussion of related lines of research.

  17. Aerosols generated during beryllium machining.

    Science.gov (United States)

    Martyny, J W; Hoover, M D; Mroz, M M; Ellis, K; Maier, L A; Sheff, K L; Newman, L S

    2000-01-01

    Some beryllium processes, especially machining, are associated with an increased risk of beryllium sensitization and disease. Little is known about exposure characteristics contributing to risk, such as particle size. This study examined the characteristics of beryllium machining exposures under actual working conditions. Stationary samples, using eight-stage Lovelace Multijet Cascade Impactors, were taken at the process point of operation and at the closest point that the worker would routinely approach. Paired samples were collected at the operator's breathing zone by using a Marple Personal Cascade Impactor and a 35-mm closed-faced cassette. More than 50% of the beryllium machining particles in the breathing zone were less than 10 microns in aerodynamic diameter. This small particle size may result in beryllium deposition into the deepest portion of the lung and may explain elevated rates of sensitization among beryllium machinists.

  18. Modeling of ribosome dynamics on a ds-mRNA under an external load

    Science.gov (United States)

    Shakiba, Bahareh; Dayeri, Maryam; Mohammad-Rafiee, Farshid

    2016-07-01

    Protein molecules in cells are synthesized by macromolecular machines called ribosomes. According to the recent experimental data, we reduce the complexity of the ribosome and propose a model to express its activity in six main states. Using our model, we study the translation rate in different biological relevant situations in the presence of external force and the translation through the RNA double stranded region in the absence or presence of the external force. In the present study, we give a quantitative theory for translation rate and show that the ribosome behaves more like a Brownian Ratchet motor. Our findings could shed some light on understanding behaviors of the ribosome in biological conditions.

  19. Modeling of Ribosome Dynamics on a ds-mRNA under an External Load

    CERN Document Server

    Shakiba, Bahareh; Mohammad-Rafiee, Farshid

    2016-01-01

    Protein molecules in cells are synthesized by macromolecular machines called ribosomes. According to recent experimental data, we reduce the complexity of the ribosome and propose a model to express its activity in six main states. Using our model, we study the translation rate in different biological relevant situations in the presence of external force, and translation through the RNA double stranded region in the absence or presence of the external force. In the present study, we give a quantitative theory for translation rate and show that the ribosome behaves more like a Brownian Ratchet motor. Our findings could shed some light on understanding behaviors of the ribosome in biological conditions.

  20. Rotating electrical machines part 4: methods for determining synchronous machine quantities from tests

    CERN Document Server

    International Electrotechnical Commission. Geneva

    1985-01-01

    Applies to three-phase synchronous machines of 1 kVA rating and larger with rated frequency of not more than 400 Hz and not less than 15 Hz. An appendix gives unconfirmed test methods for determining synchronous machine quantities. Notes: 1 -Tests are not applicable to synchronous machines such as permanent magnet field machines, inductor type machines, etc. 2 -They also apply to brushless machines, but certain variations exist and special precautions should be taken.

  1. Propagation of computer virus both across the Internet and external computers: A complex-network approach

    Science.gov (United States)

    Gan, Chenquan; Yang, Xiaofan; Liu, Wanping; Zhu, Qingyi; Jin, Jian; He, Li

    2014-08-01

    Based on the assumption that external computers (particularly, infected external computers) are connected to the Internet, and by considering the influence of the Internet topology on computer virus spreading, this paper establishes a novel computer virus propagation model with a complex-network approach. This model possesses a unique (viral) equilibrium which is globally attractive. Some numerical simulations are also given to illustrate this result. Further study shows that the computers with higher node degrees are more susceptible to infection than those with lower node degrees. In this regard, some appropriate protective measures are suggested.

  2. Controls and Machine Protection Systems

    CERN Document Server

    Carrone, E

    2016-01-01

    Machine protection, as part of accelerator control systems, can be managed with a 'functional safety' approach, which takes into account product life cycle, processes, quality, industrial standards and cybersafety. This paper will discuss strategies to manage such complexity and the related risks, with particular attention to fail-safe design and safety integrity levels, software and hardware standards, testing, and verification philosophy. It will also discuss an implementation of a machine protection system at the SLAC National Accelerator Laboratory's Linac Coherent Light Source (LCLS).

  3. Magnet management in electric machines

    Energy Technology Data Exchange (ETDEWEB)

    Reddy, Patel Bhageerath; El-Refaie, Ayman Mohamed Fawzi; Huh, Kum Kang

    2017-03-21

    A magnet management method of controlling a ferrite-type permanent magnet electrical machine includes receiving and/or estimating the temperature permanent magnets; determining if that temperature is below a predetermined temperature; and if so, then: selectively heating the magnets in order to prevent demagnetization and/or derating the machine. A similar method provides for controlling magnetization level by analyzing flux or magnetization level. Controllers that employ various methods are disclosed. The present invention has been described in terms of specific embodiment(s), and it is recognized that equivalents, alternatives, and modifications, aside from those expressly stated, are possible and within the scope of the appending claims.

  4. Cooling system for rotating machine

    Science.gov (United States)

    Gerstler, William Dwight; El-Refaie, Ayman Mohamed Fawzi; Lokhandwalla, Murtuza; Alexander, James Pellegrino; Quirion, Owen Scott; Palafox, Pepe; Shen, Xiaochun; Salasoo, Lembit

    2011-08-09

    An electrical machine comprising a rotor is presented. The electrical machine includes the rotor disposed on a rotatable shaft and defining a plurality of radial protrusions extending from the shaft up to a periphery of the rotor. The radial protrusions having cavities define a fluid path. A stationary shaft is disposed concentrically within the rotatable shaft wherein an annular space is formed between the stationary and rotatable shaft. A plurality of magnetic segments is disposed on the radial protrusions and the fluid path from within the stationary shaft into the annular space and extending through the cavities within the radial protrusions.

  5. Magnet management in electric machines

    Science.gov (United States)

    Reddy, Patel Bhageerath; El-Refaie, Ayman Mohamed Fawzi; Huh, Kum Kang

    2017-03-21

    A magnet management method of controlling a ferrite-type permanent magnet electrical machine includes receiving and/or estimating the temperature permanent magnets; determining if that temperature is below a predetermined temperature; and if so, then: selectively heating the magnets in order to prevent demagnetization and/or derating the machine. A similar method provides for controlling magnetization level by analyzing flux or magnetization level. Controllers that employ various methods are disclosed. The present invention has been described in terms of specific embodiment(s), and it is recognized that equivalents, alternatives, and modifications, aside from those expressly stated, are possible and within the scope of the appending claims.

  6. Towards green lubrication in machining

    CERN Document Server

    Liew Yun Hsien, Willey

    2014-01-01

    The book gives an overview of environmental friendly gaseous and vapour, refrigerated compressed gas, solid lubricant, mist lubrication, minimum quantity lubrication (MQL) and vegetable oils that can be used as lubricants and additives in industrial machining applications. This book introduces vegetable oils as viable and good alternative resources because of their environmental friendly, non-toxic and readily biodegradable nature.  The effectiveness of various types of vegetables oils as lubricants and additives in reducing wear and friction is discussed in this book. Engineers and scientist working in the field of lubrication and machining will find this book useful.

  7. Machine-to-machine communications architectures, technology, standards, and applications

    CERN Document Server

    Misic, Vojislav B

    2014-01-01

    With the number of machine-to-machine (M2M)-enabled devices projected to reach 20 to 50 billion by 2020, there is a critical need to understand the demands imposed by such systems. Machine-to-Machine Communications: Architectures, Technology, Standards, and Applications offers rigorous treatment of the many facets of M2M communication, including its integration with current technology.Presenting the work of a different group of international experts in each chapter, the book begins by supplying an overview of M2M technology. It considers proposed standards, cutting-edge applications, architectures, and traffic modeling and includes case studies that highlight the differences between traditional and M2M communications technology.Details a practical scheme for the forward error correction code designInvestigates the effectiveness of the IEEE 802.15.4 low data rate wireless personal area network standard for use in M2M communicationsIdentifies algorithms that will ensure functionality, performance, reliability, ...

  8. Learning as a Machine: Crossovers between Humans and Machines

    Science.gov (United States)

    Hildebrandt, Mireille

    2017-01-01

    This article is a revised version of the keynote presented at LAK '16 in Edinburgh. The article investigates some of the assumptions of learning analytics, notably those related to behaviourism. Building on the work of Ivan Pavlov, Herbert Simon, and James Gibson as ways of "learning as a machine," the article then develops two levels of…

  9. Different configurations of laser vibrometry for quality control of electric motors with external rotor

    Science.gov (United States)

    Chiariotti, P.; Ciarmatori, R.; Castellini, P.; Bastari, A.; Paone, N.

    2012-06-01

    When designing a test bench for vibration based diagnostics of machines with external rotating parts, such as electric motors having a rotating external rotor, one may choose among single point vibrometry, rotational vibrometry or in-plane vibrometry. The paper discusses these different options, taking the assumption that the minimum number of measuring instruments is preferred when instrumenting a quality control system and provides an insight into advantages and limitations of each instrument. In particular the following issues are discussed: a) possible installation lay-outs; b) alignment problems (and possible advantages for diagnostics), c) typical signals and diagnostic features which can be observed. The research presented refers to electric motors for home appliances, but potentially has wider application fields to other rotating machines.

  10. The Perfect Science Machine

    Science.gov (United States)

    2008-05-01

    ESO celebrates 10 years since First Light of the VLT Today marks the 10th anniversary since First Light with ESO's Very Large Telescope (VLT), the most advanced optical telescope in the world. Since then, the VLT has evolved into a unique suite of four 8.2-m Unit Telescopes (UTs) equipped with no fewer than 13 state-of-the-art instruments, and four 1.8-m moveable Auxiliary Telescopes (ATs). The telescopes can work individually, and they can also be linked together in groups of two or three to form a giant 'interferometer' (VLTI), allowing astronomers to see details corresponding to those from a much larger telescope. Green Flash at Paranal ESO PR Photo 16a/08 The VLT 10th anniversary poster "The Very Large Telescope array is a flagship facility for astronomy, a perfect science machine of which Europe can be very proud," says Tim de Zeeuw, ESO's Director General. "We have built the most advanced ground-based optical observatory in the world, thanks to the combination of a long-term adequately-funded instrument and technology development plan with an approach where most of the instruments were built in collaboration with institutions in the member states, with in-kind contributions in labour compensated by guaranteed observing time." Sitting atop the 2600m high Paranal Mountain in the Chilean Atacama Desert, the VLT's design, suite of instruments, and operating principles set the standard for ground-based astronomy. It provides the European scientific community with a telescope array with collecting power significantly greater than any other facilities available at present, offering imaging and spectroscopy capabilities at visible and infrared wavelengths. Blue Flash at Paranal ESO PR Photo 16b/08 A Universe of Discoveries The first scientifically useful images, marking the official 'First Light' of the VLT, were obtained on the night of 25 to 26 May 1998, with a test camera attached to "Antu", Unit Telescope number 1. They were officially presented to the press on

  11. Online algorithms for scheduling with machine activation cost on two uniform machines

    Institute of Scientific and Technical Information of China (English)

    HAN Shu-guang; JIANG Yi-wei; HU Jue-liang

    2007-01-01

    In this paper we investigate a variant of the scheduling problem on two uniform machines with speeds 1 and s. For this problem, we are given two potential uniform machines to process a sequence of independent jobs. Machines need to be activated before starting to process, and each machine activated incurs a fixed machine activation cost. No machines are initially activated,and when a job is revealed, the algorithm has the option to activate new machines. The objective is to minimize the sum of the makespan and the machine activation cost. We design optimal online algorithms with competitive ratio of (2s+1)/(s+1) for every s≥1.

  12. Investigation of Surfaces after Non Conventional Machining

    Science.gov (United States)

    Micietova, Anna; Neslusan, Miroslav; Cillikova, Maria

    2016-12-01

    This paper deals with analysis of surface integrity of steel after electro discharge machining (EDM), water jet machining, (WJM) laser beam machining (LBM) and plasma beam machining (PBM). The paper discusses surface integrity expressed in surface roughness, sample precision expressed in perpendicularity deviation as well as stress state. This study also demonstrates influence of the various non-conventional methods on structure transformations and reports about sensitivity of the different non-conventional methods of machining with regard to variable thickness of machined samples.

  13. Stimulating Students' Use of External Representations for a Distance Education Time Machine Design

    Science.gov (United States)

    Baaki, John; Luo, Tian

    2017-01-01

    As faculty members in an instructional design and technology (IDT) program, we wanted to help our graduate students better understand and experience how designers design in the real world. We aimed to design a reflective and collaborative learning environment where we sparked students to engage in reflection, ideation, and the iterative process of…

  14. Syndrome Diagnosis: Human Intuition or Machine Intelligence?

    Science.gov (United States)

    Braaten, Øivind; Friestad, Johannes

    2008-01-01

    The aim of this study was to investigate whether artificial intelligence methods can represent objective methods that are essential in syndrome diagnosis. Most syndromes have no external criterion standard of diagnosis. The predictive value of a clinical sign used in diagnosis is dependent on the prior probability of the syndrome diagnosis. Clinicians often misjudge the probabilities involved. Syndromology needs objective methods to ensure diagnostic consistency, and take prior probabilities into account. We applied two basic artificial intelligence methods to a database of machine-generated patients - a ‘vector method’ and a set method. As reference methods we ran an ID3 algorithm, a cluster analysis and a naive Bayes’ calculation on the same patient series. The overall diagnostic error rate for the the vector algorithm was 0.93%, and for the ID3 0.97%. For the clinical signs found by the set method, the predictive values varied between 0.71 and 1.0. The artificial intelligence methods that we used, proved simple, robust and powerful, and represent objective diagnostic methods. PMID:19415142

  15. Syndrome diagnosis: human intuition or machine intelligence?

    Science.gov (United States)

    Braaten, Oivind; Friestad, Johannes

    2008-01-01

    The aim of this study was to investigate whether artificial intelligence methods can represent objective methods that are essential in syndrome diagnosis. Most syndromes have no external criterion standard of diagnosis. The predictive value of a clinical sign used in diagnosis is dependent on the prior probability of the syndrome diagnosis. Clinicians often misjudge the probabilities involved. Syndromology needs objective methods to ensure diagnostic consistency, and take prior probabilities into account. We applied two basic artificial intelligence methods to a database of machine-generated patients - a 'vector method' and a set method. As reference methods we ran an ID3 algorithm, a cluster analysis and a naive Bayes' calculation on the same patient series. The overall diagnostic error rate for the the vector algorithm was 0.93%, and for the ID3 0.97%. For the clinical signs found by the set method, the predictive values varied between 0.71 and 1.0. The artificial intelligence methods that we used, proved simple, robust and powerful, and represent objective diagnostic methods.

  16. 26 CFR 7.936-1 - Qualified possession source investment income.

    Science.gov (United States)

    2010-04-01

    ... (CONTINUED) INCOME TAX (CONTINUED) TEMPORARY INCOME TAX REGULATIONS UNDER THE TAX REFORM ACT OF 1976 § 7.936... Puerto Rican income tax under regulations issued by the Secretary of the Treasury of Puerto Rico, as in... 26 Internal Revenue 14 2010-04-01 2010-04-01 false Qualified possession source investment income...

  17. 19 CFR 122.79 - Shipments to U.S. possessions.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Shipments to U.S. possessions. 122.79 Section 122.79 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF...; Electronic Manifest Requirements for Passengers, Crew Members, and Non-Crew Members Onboard...

  18. How Risky Is Marijuana Possession? Considering the Role of Age, Race, and Gender

    Science.gov (United States)

    Nguyen, Holly; Reuter, Peter

    2012-01-01

    Arrest rates per capita for possession of marijuana have increased threefold over the last 20 years and now constitute the largest single arrest offense category. Despite the increase in arrest numbers, rates of use have remained stable during much of the same period. This article presents the first estimates of the arrest probabilities for…

  19. The Right to Receive and Possess Pornography; An Attorney Foresees the End of Legal Restrictions

    Science.gov (United States)

    Gerber, Albert B.

    1970-01-01

    The Supreme Court decision Stanley v. Georgia is interpreted as an end to restrictions on possession or obtaining of allegedly pornographic materials. This does not end censorship problems in several areas, the most significant for librarians being in distribution of such materials to juveniles. (JS)

  20. 25 CFR 36.75 - What qualifications must homeliving staff possess?

    Science.gov (United States)

    2010-04-01

    ... at least 32 post-secondary semester hours (or 48 quarter hours) in an applicable academic discipline... Supervisor Must be qualified based on size and complexity of the school, but at minimum possess a bachelor's... requirements of paragraph (a) of this section by the 2009-2010 school year; and (2) May, upon showing...

  1. The Impact of World Knowledge on the Processing of Mandarin Possessive Reflexive "Zijide"

    Science.gov (United States)

    Li, Rui; Zhang, Zhiyi; Ni, Chuanbin

    2017-01-01

    It has long been considered that the Mandarin possessive reflexive "zijide" can be either locally bound or long distance bound, leading to ambiguity where it fails to exclusively refer back to either long distance binding NP or the local NP. In addition to syntactic factors such as the local versus long distance division, the present…

  2. How Risky Is Marijuana Possession? Considering the Role of Age, Race, and Gender

    Science.gov (United States)

    Nguyen, Holly; Reuter, Peter

    2012-01-01

    Arrest rates per capita for possession of marijuana have increased threefold over the last 20 years and now constitute the largest single arrest offense category. Despite the increase in arrest numbers, rates of use have remained stable during much of the same period. This article presents the first estimates of the arrest probabilities for…

  3. An extension of the Noether theorem: Accompanying equations possessing conservation laws

    Science.gov (United States)

    Dorodnitsyn, V. A.; Ibragimov, N. H.

    2014-02-01

    It is shown that the Noether theorem can be extended for some equations associated (accompanying) with Euler-Lagrange equation. Each symmetry of Lagrangian yields a class of accompanying equations possessing conservation law (first integral). The generalization is done for canonical Hamiltonian equations as well.

  4. Youth Caught in Violation of Tobacco Purchase, Use, and Possession Laws: Education versus Fines

    Science.gov (United States)

    Jason, Leonard A.; Pokorny, Steven B.; Adams, Monica; Hunt, Yvonne; Gadiraju, Praveena; Morello, Taylor; Schoeny, Michael; Dinwiddie, Crystal

    2007-01-01

    Each day, thousands of children are caught for violation of tobacco purchase, use, and possession (PUP) laws. Little is known about their impact on violators; we do not know how the youth who are caught perceive these consequences or the effects they have on their tobacco use. Moreover, many communities are beginning to use brief tobacco education…

  5. Do Fines for Violating Possession-Use-Purchase Laws Reduce Youth Tobacco Use?

    Science.gov (United States)

    Jason, Leonard A.; Pokorny, Steven B.; Adams, Monica; Hunt, Yvonne; Gadiraju, Praveena; Schoeny, Michael

    2007-01-01

    The present brief report followed children exposed to consequences for violating Purchase, Use, and Possession (PUP) laws over time to assess changes in their smoking status. Youth in 24 towns were surveyed once a year for 3 years, and rates of tobacco use for those fined for PUP law violations were assessed. Of those who were given a ticket for a…

  6. 34 CFR 668.40 - Conviction for possession or sale of illegal drugs.

    Science.gov (United States)

    2010-07-01

    ... student successfully completes a drug rehabilitation program described in paragraph (d) of this section... successfully completes the program. (d) A drug rehabilitation program referred to in paragraph (c) of this... 34 Education 3 2010-07-01 2010-07-01 false Conviction for possession or sale of illegal drugs....

  7. Prepositions in Use: Prepositions of Standard, Prepositions of Possession and Prepositions of Accompaniment

    Science.gov (United States)

    AlQbailat, Naji Masned; Al-Momani, Islam M.; Almahameed, Yazan Shaker

    2016-01-01

    The current research paper attempted at investigating the use of prepositions of standard, prepositions of possession and prepositions of accompaniment by some Jordanian learners of English. A total of 53 Jordanian English Majors participated in the study from the department of English language at Princess Alia University College. In collecting…

  8. THE RELATIONSHIP BETWEEN RESEARCH AND TEACHING: THE CHART OF POSSESSIVE PRONOUNS IN PORTUGUESE

    Directory of Open Access Journals (Sweden)

    Leonardo Lennertz Marcotulio

    2016-01-01

    Full Text Available The aim of this article is to investigate the relationship between research and teaching, concerning the rearrangements operated in the chart of possessive pronouns,  observing in which way sociolinguistic studies have been applied to the teaching of Portuguese through the didactic material prepared for High School and the courses of Portuguese as a Foreign Language.

  9. Required and Possessed University Graduates Employability Skills: Perceptions of the Nigerian Employers

    Science.gov (United States)

    Adebakin, Azeez B.; Ajadi, O. Timothy; Subair, S. 'Tayo

    2015-01-01

    University is a place where skilled labour is produced for societal and global consumption. This is premised on the fact that education provided at this level enhances human capital development, which widens employment opportunities. However, there seems to be a disparity between the skills required and those possessed by graduates from Nigerian…

  10. 7 CFR 800.174 - Issuance and possession of licenses and authorizations.

    Science.gov (United States)

    2010-01-01

    ... possession of licenses and authorizations. (a) Scope of licenses and authorizations. Subject to the... more services specified in this paragraph. (1) Official samplers. Individuals employed by an agency or...) Licensed warehouse samplers. Elevator or warehouse employees may be licensed to sample grain and...

  11. The influence of situational variables on ball possession in the English Premier League.

    Science.gov (United States)

    Bradley, Paul Simon; Lago-Peñas, Carlos; Rey, Ezequiel; Sampaio, Jaime

    2014-12-01

    Abstract The aims of this study were twofold: (1) to examine the influence of situational variables on ball possession in elite soccer and (2) to quantify the variables that discriminate between high or low percentage ball possession teams (HPBPT and LPBPT) across different playing positions. Match performance data were collected from English Premier League matches using a multiple-camera system. Data were examined using linear regression, a 2 × 5 factorial analysis of variance and discriminant analysis. Playing against weak opposition was associated with an increase (P variables (P variables that discriminated performance between HPBPT and LPBPT were different for various playing positions, although the number of successful passes was the most common discriminating variable. The results demonstrate that HPBPT and LPBPT developed different possession strategies during matches and that selected variables such as successful passes were identified to explain these data trends across various playing positions. Combinations of variables could be used to develop a probabilistic model for predicting time spent in possession by teams.

  12. Locus of marking typology in the possessive NP: A new approach

    NARCIS (Netherlands)

    van Rijn, M.

    2016-01-01

    This study takes a semantic approach to Nichols’ influential locus of marking typology, as applied to the possessive noun phrase. In this approach, a careful distinction is made between two semantic types of dependency relations: those between inherently relational nouns and their argument

  13. Arcobacter spp. possess two very short flagellins of which FlaA is essential for motility

    NARCIS (Netherlands)

    Ho, H.; Lipman, L.J.A.; Wösten, M.M.S.M.; van Asten, A.J.; Gaastra, W.

    2008-01-01

    Like Campylobacter and Helicobacter spp., Arcobacter spp. possess two flagellin genes (flaA and flaB) located adjacent to each other. The aim of this study was to characterize the flagellin proteins of Arcobacter spp., because these proteins are known virulence factors in the Epsilonproteobacteria,

  14. What does it mean to be possessed by a spirit or demon? Some ...

    African Journals Online (AJOL)

    2015-07-08

    Jul 8, 2015 ... that engage in possession include a wide range of spirit types and characters. They might ... Research shows that contaminants (such as poisons, germs and irritants) evoke a ... that they can either not escape from or have been exposed to – thus either .... that takes place on several planes at once. (p. 422).

  15. Love and Art Strike Back: A.S. Byatt’s Possession: A Romance

    DEFF Research Database (Denmark)

    Mogensen, Tine Engel

    2004-01-01

    Possession can be seen as an enactment of the conflicts between a number of powerful - and quite classic - extremes (anatomy-romance, intellectual experience-sensuous experience, theory-art, reason-love, irony-pathos), which, in the aesthetic experience of the reader, it overcomes and transcends....

  16. Stability at the half pin–frame interface on external fixation constructs

    OpenAIRE

    Alexios Dimitrios Iliadis; Parag Kumar Jaiswal; Jay Meswania; Gordon Blunn; David Goodier; Peter Calder

    2016-01-01

    Abstract A mechanical study investigating the use of two different methods (grub and bolt screws) to secure external fixation half pins to circular frames. A four part experiment: (1) Grub and bolt screws were used to secure half pins in Taylor Spatial frames. Loosening torques were measured using a calibrated torque wrench. (2) Using universal testing machine (UTM), axial loading was applied to establish thresholds for loosening in grub and bolt screw constructs. (3) We established the appli...

  17. Machine learning strategies for systems with invariance properties

    Science.gov (United States)

    Ling, Julia; Jones, Reese; Templeton, Jeremy

    2016-08-01

    In many scientific fields, empirical models are employed to facilitate computational simulations of engineering systems. For example, in fluid mechanics, empirical Reynolds stress closures enable computationally-efficient Reynolds Averaged Navier Stokes simulations. Likewise, in solid mechanics, constitutive relations between the stress and strain in a material are required in deformation analysis. Traditional methods for developing and tuning empirical models usually combine physical intuition with simple regression techniques on limited data sets. The rise of high performance computing has led to a growing availability of high fidelity simulation data. These data open up the possibility of using machine learning algorithms, such as random forests or neural networks, to develop more accurate and general empirical models. A key question when using data-driven algorithms to develop these empirical models is how domain knowledge should be incorporated into the machine learning process. This paper will specifically address physical systems that possess symmetry or invariance properties. Two different methods for teaching a machine learning model an invariance property are compared. In the first method, a basis of invariant inputs is constructed, and the machine learning model is trained upon this basis, thereby embedding the invariance into the model. In the second method, the algorithm is trained on multiple transformations of the raw input data until the model learns invariance to that transformation. Results are discussed for two case studies: one in turbulence modeling and one in crystal elasticity. It is shown that in both cases embedding the invariance property into the input features yields higher performance at significantly reduced computational training costs.

  18. Skepticism, Contextualism, Externalism and Modality

    Directory of Open Access Journals (Sweden)

    Ron Wilburn

    2006-12-01

    Full Text Available In this paper, I argue for the following claims. Contextualist strategies to tame or localize epistemic skepticism are hopeless if contextualist factors are construed internalistically. However, because efforts to contextualize externalism via subjunctive conditional analysis court circularity, it is only on an internalistic interpretation that contextualist strategies can even be motivated. While these claims do not give us an argument for skepticism, they do give us an argument that contextualism, as such, is not likely to provide us with an argument against skepticism.

  19. Leveraging External Sources of Innovation

    DEFF Research Database (Denmark)

    West, Joel; Bogers, Marcel

    2014-01-01

    own specific set of mechanisms and conditions. Integrating innovations has been mostly studied from an absorptive capacity perspective, with less attention given to the impact of competencies and culture (including “not invented here”). Commercializing innovations puts the most emphasis on how......” in a way inconsistent with earlier definitions in innovation management. The paper concludes with recommendations for future research that include examining the end-to-end innovation commercialization process, and studying the moderators and limits of leveraging external sources of innovation....

  20. Ankle fusion stability: a biomechanical comparison of external versus internal fixation.

    Science.gov (United States)

    Hoover, Justin R; Santrock, Robert D; James, William C

    2011-04-11

    This biomechanical study compares bimalleolar external fixation to conventional crossed-screw construct in terms of stability and compression for ankle arthrodesis. The goals of the study were to determine which construct is more stable with bending and torsional forces, and to determine which construct achieves more compression.Fourth-generation bone composite tibia and talocalcaneal models were made to 50th percentile anatomic specifications. Fourteen ankle fusion constructs were created with bimalleolar external fixators and 14 with crossed-screw constructs. Ultimate bend, torque, and compression testing were completed on the external fixator and crossed-screw constructs using a multidirectional Materials Testing Machine (MTS Systems Corp, Eden Prairie, Minnesota). Ultimate bend testing revealed a statistically significant difference (P=.0022) with the mean peak load to failure for the external fixator constructs of 973.2 N compared to 612.5 N for the crossed-screw constructs. Ultimate torque testing revealed the mean peak torque to failure for the external fixator construct was 80.2 Nm and 28.1 Nm for the crossed-screw construct, also a statistically significant difference (P=.0001). The compression testing yielded no statistically significant difference (P=.9268) between the average failure force of the external fixator construct (81.6 kg) and the crossed-screw construct (81.2 kg).With increased stiffness in both bending and torsion and comparable compressive strengths, bimalleolar external fixation is an excellent option for tibiotalar ankle arthrodesis.