WorldWideScience

Sample records for permissible communications paths

  1. Path Models of Vocal Emotion Communication.

    Directory of Open Access Journals (Sweden)

    Tanja Bänziger

    Full Text Available We propose to use a comprehensive path model of vocal emotion communication, encompassing encoding, transmission, and decoding processes, to empirically model data sets on emotion expression and recognition. The utility of the approach is demonstrated for two data sets from two different cultures and languages, based on corpora of vocal emotion enactment by professional actors and emotion inference by naïve listeners. Lens model equations, hierarchical regression, and multivariate path analysis are used to compare the relative contributions of objectively measured acoustic cues in the enacted expressions and subjective voice cues as perceived by listeners to the variance in emotion inference from vocal expressions for four emotion families (fear, anger, happiness, and sadness. While the results confirm the central role of arousal in vocal emotion communication, the utility of applying an extended path modeling framework is demonstrated by the identification of unique combinations of distal cues and proximal percepts carrying information about specific emotion families, independent of arousal. The statistical models generated show that more sophisticated acoustic parameters need to be developed to explain the distal underpinnings of subjective voice quality percepts that account for much of the variance in emotion inference, in particular voice instability and roughness. The general approach advocated here, as well as the specific results, open up new research strategies for work in psychology (specifically emotion and social perception research and engineering and computer science (specifically research and development in the domain of affective computing, particularly on automatic emotion detection and synthetic emotion expression in avatars.

  2. 11 CFR 114.15 - Permissible use of corporate and labor organization funds for certain electioneering communications.

    Science.gov (United States)

    2010-01-01

    ... 11 Federal Elections 1 2010-01-01 2010-01-01 false Permissible use of corporate and labor organization funds for certain electioneering communications. 114.15 Section 114.15 Federal Elections FEDERAL ELECTION COMMISSION GENERAL CORPORATE AND LABOR ORGANIZATION ACTIVITY § 114.15 Permissible use of corporate...

  3. SDN-based path hopping communication against eavesdropping attack

    Science.gov (United States)

    Zhang, Chuanhao; Bu, Youjun; Zhao, Zheng

    2016-10-01

    Network eavesdropping is one of the most popular means used by cyber attackers, which has been a severe threat to network communication security. Adversaries could capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as username and password etc. Traditional network usually uses static network configuration, and existing defense methods, including firewall, IDS, IPS etc., cannot prevent eavesdropping, which has no distinguishing characteristic. Network eavesdropping become silent during most of the time of the attacking process, which is why it is difficult to discover and to defend. But A successful eavesdropping attack also has its' precondition, which is the target path should be relatively stable and has enough time of duration. So, In order to resolve this problem, it has to work on the network architecture. In this paper, a path hopping communication(PHC) mechanism based on Software Define Network (SDN) was proposed to solve this problem. In PHC, Ends in communication packets as well as the routing paths were changed dynamically. Therefore, the traffic would be distributed to multiple flows and transmitted along different paths. so that Network eavesdropping attack could be prevented effectively. It was concluded that PHC was able to increase the overhead of Network eavesdropping, as well as the difficulty of communication data recovery.

  4. ITS Multi-path Communications Access Decision Scheme

    Directory of Open Access Journals (Sweden)

    Miroslav Svitek

    2008-02-01

    Full Text Available Intelligent Transport Systems (ITS require widely spread and guarantied quality communications services. Method of ITS decomposition to set of subsystems and quantification of communications subsystems parameters is introduced. Due to typical complexity of the IST solution and mobility as the typical system elements property idea of communications systems with multipath multivendor structures is adopted. Resolution of seamless switching within a set of available wireless access solutions is presented. CALM based system or specifically designed and configured L3/L2 switching can be relevant solution for multi-path access communication system. These systems meet requirements of the seamless secure communications functionality within even extensive cluster of moving objects. Competent decision processes based on precisely quantified system requirements and each performance indicator tolerance range must be implemented to keep service up and running with no influence of continuously changing conditions in time and served space. Method of different paths service quality evaluation and selection of the best possible active communications access path is introduced. Proposed approach is based on Kalman filtering, which separates reasonable part of noise and also allows prediction of the individual parameters near future behavior. Presented classification algorithm applied on filtered measured data combined with deterministic parameters is trained using training data, i.e. combination of parameters vectors line and relevant decisions. Quality of classification is dependent on the size and quality of the training sets. This method is studied within projects e-Ident, DOTEK and SRATVU which are elaborating results of project CAMNA.

  5. Communication Between Volcanoes: a Possible Path

    Science.gov (United States)

    Linde, A. T.; Sacks, I. S.

    2002-12-01

    could provide a mechanism for communication between the volcanoes.

  6. Alternative Path Communication in Wide-Scale Cluster-Tree Wireless Sensor Networks Using Inactive Periods.

    Science.gov (United States)

    Leão, Erico; Montez, Carlos; Moraes, Ricardo; Portugal, Paulo; Vasques, Francisco

    2017-05-06

    The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable technology to deploy wide-scale Wireless Sensor Networks (WSNs). These networks are usually designed to support convergecast traffic, where all communication paths go through the PAN (Personal Area Network) coordinator. Nevertheless, peer-to-peer communication relationships may be also required for different types of WSN applications. That is the typical case of sensor and actuator networks, where local control loops must be closed using a reduced number of communication hops. The use of communication schemes optimised just for the support of convergecast traffic may result in higher network congestion and in a potentially higher number of communication hops. Within this context, this paper proposes an Alternative-Route Definition (ARounD) communication scheme for WSNs. The underlying idea of ARounD is to setup alternative communication paths between specific source and destination nodes, avoiding congested cluster-tree paths. These alternative paths consider shorter inter-cluster paths, using a set of intermediate nodes to relay messages during their inactive periods in the cluster-tree network. Simulation results show that the ARounD communication scheme can significantly decrease the end-to-end communication delay, when compared to the use of standard cluster-tree communication schemes. Moreover, the ARounD communication scheme is able to reduce the network congestion around the PAN coordinator, enabling the reduction of the number of message drops due to queue overflows in the cluster-tree network.

  7. The Role of Sexual Communication in Couples' Sexual Outcomes: A Dyadic Path Analysis.

    Science.gov (United States)

    Jones, Adam C; Robinson, W David; Seedall, Ryan B

    2017-10-16

    In a study of 142 couples, we gathered survey data to show how sexual communication influences sexual and relationship satisfaction as well as sexual and orgasm frequency. In two dyadic data path analyses, we observed the significant paths of influence that sexual communication has on sexual and relationship satisfaction, as well as sexual and orgasm frequency. Our findings revealed greater amounts of sexual communication were associated with increased orgasm frequency in women and greater relationship and sexual satisfaction in both sexes. We also observed important differences in the associations of sexual communication and general communication on satisfaction levels. With these analyses, we expand the current literature to broaden our understanding of the role that sexual communication plays in committed relationships. © 2017 American Association for Marriage and Family Therapy.

  8. A Novel Dual Separate Paths (DSP) Algorithm Providing Fault-Tolerant Communication for Wireless Sensor Networks.

    Science.gov (United States)

    Tien, Nguyen Xuan; Kim, Semog; Rhee, Jong Myung; Park, Sang Yoon

    2017-07-25

    Fault tolerance has long been a major concern for sensor communications in fault-tolerant cyber physical systems (CPSs). Network failure problems often occur in wireless sensor networks (WSNs) due to various factors such as the insufficient power of sensor nodes, the dislocation of sensor nodes, the unstable state of wireless links, and unpredictable environmental interference. Fault tolerance is thus one of the key requirements for data communications in WSN applications. This paper proposes a novel path redundancy-based algorithm, called dual separate paths (DSP), that provides fault-tolerant communication with the improvement of the network traffic performance for WSN applications, such as fault-tolerant CPSs. The proposed DSP algorithm establishes two separate paths between a source and a destination in a network based on the network topology information. These paths are node-disjoint paths and have optimal path distances. Unicast frames are delivered from the source to the destination in the network through the dual paths, providing fault-tolerant communication and reducing redundant unicast traffic for the network. The DSP algorithm can be applied to wired and wireless networks, such as WSNs, to provide seamless fault-tolerant communication for mission-critical and life-critical applications such as fault-tolerant CPSs. The analyzed and simulated results show that the DSP-based approach not only provides fault-tolerant communication, but also improves network traffic performance. For the case study in this paper, when the DSP algorithm was applied to high-availability seamless redundancy (HSR) networks, the proposed DSP-based approach reduced the network traffic by 80% to 88% compared with the standard HSR protocol, thus improving network traffic performance.

  9. One subject, many paths. Transmedia communication in journalism

    Directory of Open Access Journals (Sweden)

    André Fagundes Pase

    2012-06-01

    Full Text Available Transmedia communication is used mainly in fiction, but also in journalism. This paper analyzes the informational synergy of transmedia in the news field. Through a conceptual digression, we discuss the word transmedia, as defined by Jenkins (2006, cross-media and multimedia, explaining the differences between all those concepts – sometimes treated by some authors as synonyms, although they are not. The ideas are revisited and verified through the study of Inside Disaster, a Canadian documentary about the 2010 Haitian earthquake that offers news by means of game, hypertext and video. Above all, we propose a reflection on the implications of the transmedia experience applied to journalism, a look at transmedia communication thinking not only about technology, but searching for a cultural and social interpretation, in a cultural perspective of the study of technology and journalism.

  10. ONE SUBJECT, MANY PATHS. TRANSMEDIA COMMUNICATION IN JOURNALISM

    Directory of Open Access Journals (Sweden)

    Ana Cecília Bisso Nunes

    2012-06-01

    Full Text Available Transmedia communication is used mainly in fiction, but also in journalism. This paper analyzes the informational synergy of transmedia in the news field. Through a conceptual digression, we discuss the word transmedia, as defined by Jenkins (2006, cross-media and multimedia, explaining the differences between all those concepts – sometimes treated by some authors as synonyms, although they are not. The ideas are revisited and verified through the study of Inside Disaster, a Canadian documentary about the 2010 Haitian earthquake that offers news by means of game, hypertext and video. Above all, we propose a reflection on the implications of the transmedia experience applied to journalism, a look at transmedia communication thinking not only about technology, but searching for a cultural and social interpretation, in a cultural perspective of the study of technology and journalism.

  11. A novel communication mechanism based on node potential multi-path routing

    Science.gov (United States)

    Bu, Youjun; Zhang, Chuanhao; Jiang, YiMing; Zhang, Zhen

    2016-10-01

    With the network scales rapidly and new network applications emerge frequently, bandwidth supply for today's Internet could not catch up with the rapid increasing requirements. Unfortunately, irrational using of network sources makes things worse. Actual network deploys single-next-hop optimization paths for data transmission, but such "best effort" model leads to the imbalance use of network resources and usually leads to local congestion. On the other hand Multi-path routing can use the aggregation bandwidth of multi paths efficiently and improve the robustness of network, security, load balancing and quality of service. As a result, multi-path has attracted much attention in the routing and switching research fields and many important ideas and solutions have been proposed. This paper focuses on implementing the parallel transmission of multi next-hop data, balancing the network traffic and reducing the congestion. It aimed at exploring the key technologies of the multi-path communication network, which could provide a feasible academic support for subsequent applications of multi-path communication networking. It proposed a novel multi-path algorithm based on node potential in the network. And the algorithm can fully use of the network link resource and effectively balance network link resource utilization.

  12. A Path Model of Political Cognitions and Attitudes, Communication, and Voting Behavior in a Congressional Election.

    Science.gov (United States)

    Kimsey, William D.; Atwood, L. Erwin

    A path model was developed to assess the effects of early campaign cognitions and attitudes on media use and interpersonal communication, subsequent cognitions, attitudes, and vote. Two interpretations of possible outcomes were postulated: agenda setting, and uses and gratifications. It was argued that an agenda-setting interpretation would be…

  13. Distance Dependence of Path Loss for Millimeter Wave Inter-Vehicle Communications

    Directory of Open Access Journals (Sweden)

    M. Fujise

    2004-12-01

    Full Text Available Millimeter-wave path loss between two cars was measured to obtainthe general applicable distance for inter-vehicle communication systemsin real environments. An abrupt and substantial increase in path lossdue to interruption, curves, and different-lane traveling has been amajor concern in inter-vehicle communications. The path lossmeasurements were carried out using 60-GHz CW radiowaves and standardhorn antennas on metropolitan highways and regular roads. Because thepropagation loss is traffic-dependent, the highways were classifiedinto uncrowded and crowded highways, and the regular roads wereclassified into uncrowded and crowded roads. The path loss for thehighways exhibited 2nd-power-law attenuation and that for the regularroads exhibited 1st-power-law attenuation with an increase ininter-vehicle distance. Additional losses of 15 dB for the highways and5 dB for the regular roads were observed when the inter-vehicledistance was more than approximately 30 m. Thus, we were able todemonstrate millimeter-wave inter-vehicle communications at aninter-vehicle distance of more than 100 m.

  14. Neurons show the path: tip-to-nucleus communication in filamentous fungal development and pathogenesis.

    Science.gov (United States)

    Etxebeste, Oier; Espeso, Eduardo A

    2016-09-01

    Multiple fungal species penetrate substrates and accomplish host invasion through the fast, permanent and unidirectional extension of filamentous cells known as hyphae. Polar growth of hyphae results, however, in a significant increase in the distance between the polarity site, which also receives the earliest information about ambient conditions, and nuclei, where adaptive responses are executed. Recent studies demonstrate that these long distances are overcome by signal transduction pathways which convey sensory information from the polarity site to nuclei, controlling development and pathogenesis. The present review compares the striking connections of the mechanisms for long-distance communication in hyphae with those from neurons, and discusses the importance of their study in order to understand invasion and dissemination processes of filamentous fungi, and design strategies for developmental control in the future. © FEMS 2016. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  15. Medieval Settlement Formation in Catalonia: Villages, their Territories and communication paths

    Directory of Open Access Journals (Sweden)

    Jordi BOLÒS

    2014-04-01

    Full Text Available This study focuses its attention on Catalonia and points to the importance of using several literary sources as a means of identifying the main characteristics of Catalan settlements throughout the Early Middle Ages (6th-10th Centuries. Apart from the need to use written and archaeological documents, the study highlights the importance of understanding and interpreting place-names and of reconstructing landscape history. Special emphasis is placed on the interest of interpreting by means of consulting documents, maps and orthophotomaps as witnesses that allow us to know the boundaries of the Early Medieval settlements. At the centre of these boundaries stand several small population centres (hamlets and a church. Several agricultural territories of various villages are reconstructed. Likewise, the study relates population with communication paths, churches and necropolis of the Early Middle Ages.

  16. Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication

    Directory of Open Access Journals (Sweden)

    Reihaneh Safavi-Naini

    2018-01-01

    Full Text Available Moving target defense (MTD strategies have been widely studied for securing computer systems. We consider using MTD strategies to provide long-term cryptographic security for message transmission against an eavesdropping adversary who has access to a quantum computer. In such a setting, today’s widely used cryptographic systems including Diffie-Hellman key agreement protocol and RSA cryptosystem will be insecure and alternative solutions are needed. We will use a physical assumption, existence of multiple communication paths between the sender and the receiver, as the basis of security, and propose a cryptographic system that uses this assumption and an MTD strategy to guarantee efficient long-term information theoretic security even when only a single path is not eavesdropped. Following the approach of Maleki et al., we model the system using a Markov chain, derive its transition probabilities, propose two security measures, and prove results that show how to calculate these measures using transition probabilities. We define two types of attackers that we call risk-taking and risk-averse and compute our proposed measures for the two types of adversaries for a concrete MTD strategy. We will use numerical analysis to study tradeoffs between system parameters, discuss our results, and propose directions for future research.

  17. Maximum permissible dose

    International Nuclear Information System (INIS)

    Anon.

    1979-01-01

    This chapter presents a historic overview of the establishment of radiation guidelines by various national and international agencies. The use of maximum permissible dose and maximum permissible body burden limits to derive working standards is discussed

  18. A packet loss compliant logic-based communication alogoritham for cooperative path following control

    Digital Repository Service at National Institute of Oceanography (India)

    Rego, F.; Aguiar, A.P.; Pascoal, A.M.

    logic takes into account the topology of the communication network, the fact that communications are discrete, and the cost of exchanging information. We also address explicitly communication losses and bounded delays. Conditions are derived under which...

  19. Combined Effect of Random Transmit Power Control and Inter-Path Interference Cancellation on DS-CDMA Packet Mobile Communications

    Science.gov (United States)

    Kudoh, Eisuke; Ito, Haruki; Wang, Zhisen; Adachi, Fumiyuki

    In mobile communication systems, high speed packet data services are demanded. In the high speed data transmission, throughput degrades severely due to severe inter-path interference (IPI). Recently, we proposed a random transmit power control (TPC) to increase the uplink throughput of DS-CDMA packet mobile communications. In this paper, we apply IPI cancellation in addition to the random TPC. We derive the numerical expression of the received signal-to-interference plus noise power ratio (SINR) and introduce IPI cancellation factor. We also derive the numerical expression of system throughput when IPI is cancelled ideally to compare with the Monte Carlo numerically evaluated system throughput. Then we evaluate, by Monte-Carlo numerical computation method, the combined effect of random TPC and IPI cancellation on the uplink throughput of DS-CDMA packet mobile communications.

  20. Permission Marketing and Privacy Concerns - Why Do Customers (Not) Grant Permissions?

    NARCIS (Netherlands)

    Krafft, Manfred; Arden, Christine M.; Verhoef, Peter C.

    Little is known about the influence of motivators that drive consumers to grant permission to be contacted via personalized communication. In this study, a framework is developed to investigate the effect of select drivers of consumers granting permission to receive personalized messages. The

  1. Communication: importance sampling including path correlation in semiclassical initial value representation calculations for time correlation functions.

    Science.gov (United States)

    Pan, Feng; Tao, Guohua

    2013-03-07

    Full semiclassical (SC) initial value representation (IVR) for time correlation functions involves a double phase space average over a set of two phase points, each of which evolves along a classical path. Conventionally, the two initial phase points are sampled independently for all degrees of freedom (DOF) in the Monte Carlo procedure. Here, we present an efficient importance sampling scheme by including the path correlation between the two initial phase points for the bath DOF, which greatly improves the performance of the SC-IVR calculations for large molecular systems. Satisfactory convergence in the study of quantum coherence in vibrational relaxation has been achieved for a benchmark system-bath model with up to 21 DOF.

  2. Permissible Delay in Payments

    Directory of Open Access Journals (Sweden)

    Yung-Fu Huang

    2007-01-01

    Full Text Available The main purpose of this paper wants to investigate the optimal retailer's lot-sizing policy with two warehouses under partially permissible delay in payments within the economic order quantity (EOQ framework. In this paper, we want to extend that fully permissible delay in payments to the supplier would offer the retailer partially permissible delay in payments. That is, the retailer must make a partial payment to the supplier when the order is received. Then the retailer must pay off the remaining balance at the end of the permissible delay period. In addition, we want to add the assumption that the retailer's storage space is limited. That is, the retailer will rent the warehouse to store these exceeding items when the order quantity is larger than retailer's storage space. Under these conditions, we model the retailer's inventory system as a cost minimization problem to determine the retailer's optimal cycle time and optimal order quantity. Three theorems are developed to efficiently determine the optimal replenishment policy for the retailer. Finally, numerical examples are given to illustrate these theorems and obtained a lot of managerial insights.

  3. Distributed computing system with dual independent communications paths between computers and employing split tokens

    Science.gov (United States)

    Rasmussen, Robert D. (Inventor); Manning, Robert M. (Inventor); Lewis, Blair F. (Inventor); Bolotin, Gary S. (Inventor); Ward, Richard S. (Inventor)

    1990-01-01

    This is a distributed computing system providing flexible fault tolerance; ease of software design and concurrency specification; and dynamic balance of the loads. The system comprises a plurality of computers each having a first input/output interface and a second input/output interface for interfacing to communications networks each second input/output interface including a bypass for bypassing the associated computer. A global communications network interconnects the first input/output interfaces for providing each computer the ability to broadcast messages simultaneously to the remainder of the computers. A meshwork communications network interconnects the second input/output interfaces providing each computer with the ability to establish a communications link with another of the computers bypassing the remainder of computers. Each computer is controlled by a resident copy of a common operating system. Communications between respective ones of computers is by means of split tokens each having a moving first portion which is sent from computer to computer and a resident second portion which is disposed in the memory of at least one of computer and wherein the location of the second portion is part of the first portion. The split tokens represent both functions to be executed by the computers and data to be employed in the execution of the functions. The first input/output interfaces each include logic for detecting a collision between messages and for terminating the broadcasting of a message whereby collisions between messages are detected and avoided.

  4. Android Permission Model

    OpenAIRE

    Birendra, Chalise

    2016-01-01

    The recent evolution on the smart phone technology has made its application market huge and less secure. Every single day large number of apps introduced in the android market (mostly on google play store) without any particular inspections which creates a lot of security issues and they remain unresolved. There are a lot of recent and increasing security issues which are mostly caused by the android apps. Mainly, the access of user data through the apps relied on the users given permission t...

  5. Rethinking Permissioned Blockchains

    OpenAIRE

    Vukolic, Marko

    2017-01-01

    Current blockchain platforms, especially the recent permissioned systems, have architectural limitations: smart contracts run sequentially, all node executes all smart contracts, consensus protocols are hard-coded, the trust model is static and not exible, and non-determinism in smart-contract execution poses serious problems. Overcoming these limitations is critical for improving both functional properties of blockchains, such as con dentiality and consistency, as well as their non-functiona...

  6. FROM TEXT TO STAGE PERFORMANCE (IN SEARCH OF PATHS OF COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Dubravka Crnojević-Carić

    2015-01-01

    Full Text Available This paper explores the acting in an interdisciplinary way, linking the insights that come from theory and pedagogy of acting and theater studies (Branko Gavella, Michail Chekhov, Konstantin Stanislavsky, Lee Strasberg, Cicely Berry, Antonin Artaud, as well as from contemporary insights of neuroscience (Antonio Damasio, Michel Lacroix, Rosa Alice Branco. By analysing the creative process of the actor, I’ll speak about the nature of speech acts. The actor has the privilege to explore different forms of the communication, as well as speech acts. The creative process of the actor will be analysed through the several work phases (the process of text reading, the individual introduction with the text, the group reading rehearsal, the misenscene rehearsal, tech rehearsal, as well as public performance. During the work processes on a play, communication participants are changing and they adopt the various strategies of communication. An actor is the one who practices how to re-direct his attention, as well as speech act: he pays attention to the partner, to the director, technical staff, imaginary ideal spectators and real present auditorium. The paper thematises so-called “attention circles” which are defining the speech of actor. Nature of “attention circle” is changing during the performance. All of the above (the creative process of the actor is somehow connected with the everydays communication and with the communication during the public presentation of the default topics. A separate part of this paper will be dedicated to those differences. In this paper I will also consider distinction between the speech act which has pragmatic function in the form of so-called “civil honesty” and position which requires “credibility and organic truth” in order to maintain the interplay between the actors/speakers and spectators /listeners.

  7. Establishment path and management innovation of mutually beneficial nonprofit organization (MBNPO: A study based on integrated marketing communications (IMC theory

    Directory of Open Access Journals (Sweden)

    Kwang-yong Shin

    2017-05-01

    Full Text Available Purpose - Research about the modern mutually beneficial nonprofit organizations (MBNPOs has great value because of the increasingly important role that the MBNPO plays in society. The establishment and management of MBNPOs are critical for its development. Design/methodology/approach - Integrated marketing communications (IMC theory is applied to the research on establishment and management innovation. The establishment of MBNPOs needs four sequential steps: identifying the target group, providing services to meet the demand of stakeholders, designing appropriate communication tactics and deploying proper organizational structure to accomplish efficient communication. Findings - Three types of approach enable traditional enterprises to transform into MBNPOs: product innovation, operational innovation and synergetic development. The application of IMC theory accomplishes management innovation of MBNPOs in three aspects: leading market-orientation specific to stakeholder-orientation, making management innovation systematic in MBNPOs and clarifying targets of management innovation in MBNPOs. Originality/value - This is one of the first examinations of establishment path and management innovation of MBNPO based on IMC theory.

  8. Communication: Predictive partial linearized path integral simulation of condensed phase electron transfer dynamics

    International Nuclear Information System (INIS)

    Huo, Pengfei; Miller, Thomas F. III; Coker, David F.

    2013-01-01

    A partial linearized path integral approach is used to calculate the condensed phase electron transfer (ET) rate by directly evaluating the flux-flux/flux-side quantum time correlation functions. We demonstrate for a simple ET model that this approach can reliably capture the transition between non-adiabatic and adiabatic regimes as the electronic coupling is varied, while other commonly used semi-classical methods are less accurate over the broad range of electronic couplings considered. Further, we show that the approach reliably recovers the Marcus turnover as a function of thermodynamic driving force, giving highly accurate rates over four orders of magnitude from the normal to the inverted regimes. We also demonstrate that the approach yields accurate rate estimates over five orders of magnitude of inverse temperature. Finally, the approach outlined here accurately captures the electronic coherence in the flux-flux correlation function that is responsible for the decreased rate in the inverted regime

  9. Short communication: Genetic lag represents commercial herd genetic merit more accurately than the 4-path selection model.

    Science.gov (United States)

    Dechow, C D; Rogers, G W

    2018-05-01

    Expectation of genetic merit in commercial dairy herds is routinely estimated using a 4-path genetic selection model that was derived for a closed population, but commercial herds using artificial insemination sires are not closed. The 4-path model also predicts a higher rate of genetic progress in elite herds that provide artificial insemination sires than in commercial herds that use such sires, which counters other theoretical assumptions and observations of realized genetic responses. The aim of this work is to clarify whether genetic merit in commercial herds is more accurately reflected under the assumptions of the 4-path genetic response formula or by a genetic lag formula. We demonstrate by tracing the transmission of genetic merit from parents to offspring that the rate of genetic progress in commercial dairy farms is expected to be the same as that in the genetic nucleus. The lag in genetic merit between the nucleus and commercial farms is a function of sire and dam generation interval, the rate of genetic progress in elite artificial insemination herds, and genetic merit of sires and dams. To predict how strategies such as the use of young versus daughter-proven sires, culling heifers following genomic testing, or selective use of sexed semen will alter genetic merit in commercial herds, genetic merit expectations for commercial herds should be modeled using genetic lag expectations. Copyright © 2018 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  10. Path Dependency

    OpenAIRE

    Mark Setterfield

    2015-01-01

    Path dependency is defined, and three different specific concepts of path dependency – cumulative causation, lock in, and hysteresis – are analyzed. The relationships between path dependency and equilibrium, and path dependency and fundamental uncertainty are also discussed. Finally, a typology of dynamical systems is developed to clarify these relationships.

  11. Take control of permissions in Leopard

    CERN Document Server

    Tanaka, Brian

    2009-01-01

    Permissions problems got you down? Turn to Unix expert Brian Tanaka's unique guide to the permissions in Mac OS X 10.5 Leopard that control access to your files, folders, and disks. You'll learn how to keep files private, when to set Ignore Permissions, what happens when you repair permissions, how to delete stuck files, and the best ways to solve permissions-related problems. Advanced concepts include the sticky bit, Leopard's more-important access control lists, bit masks, and symbolic versus absolute ways to set permissions. The book covers how to take control of permissions via the Finder

  12. The influence of marketing communications on the consumer path to purchase for both online and in-store purchases

    OpenAIRE

    Pallant, Jason

    2017-01-01

    This thesis examines the way online browsing and online or in-store purchasing behaviours evolve across the purchases customers make from a brand, and how this is influenced by the marketing communications that customers receive from that brand and its competitors. A sample of customers of three different retail brands are tracked over a two year period, and changes to browsing and purchase behaviour are observed. A model is developed which predicts the way customers are most likely to evolve...

  13. Path Expressions

    Science.gov (United States)

    1975-06-01

    Traditionally, synchronization of concurrent processes is coded in line by operations on semaphores or similar objects. Path expressions move the...discussion about a variety of synchronization primitives . An analysis of their relative power is found in [3]. Path expressions do not introduce yet...another synchronization primitive . A path expression relates to such primitives as a for- or while-statement of an ALGOL-like language relates to a JUMP

  14. 17 CFR 230.433 - Conditions to permissible post-filing free writing prospectuses.

    Science.gov (United States)

    2010-04-01

    ... writing prospectus used at the same time as a communication in a business combination transaction subject... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Conditions to permissible post... Prospectuses § 230.433 Conditions to permissible post-filing free writing prospectuses. (a) Scope of section...

  15. Maximum permissible voltage of YBCO coated conductors

    Energy Technology Data Exchange (ETDEWEB)

    Wen, J.; Lin, B.; Sheng, J.; Xu, J.; Jin, Z. [Department of Electrical Engineering, Shanghai Jiao Tong University, Shanghai (China); Hong, Z., E-mail: zhiyong.hong@sjtu.edu.cn [Department of Electrical Engineering, Shanghai Jiao Tong University, Shanghai (China); Wang, D.; Zhou, H.; Shen, X.; Shen, C. [Qingpu Power Supply Company, State Grid Shanghai Municipal Electric Power Company, Shanghai (China)

    2014-06-15

    Highlights: • We examine three kinds of tapes’ maximum permissible voltage. • We examine the relationship between quenching duration and maximum permissible voltage. • Continuous I{sub c} degradations under repetitive quenching where tapes reaching maximum permissible voltage. • The relationship between maximum permissible voltage and resistance, temperature. - Abstract: Superconducting fault current limiter (SFCL) could reduce short circuit currents in electrical power system. One of the most important thing in developing SFCL is to find out the maximum permissible voltage of each limiting element. The maximum permissible voltage is defined as the maximum voltage per unit length at which the YBCO coated conductors (CC) do not suffer from critical current (I{sub c}) degradation or burnout. In this research, the time of quenching process is changed and voltage is raised until the I{sub c} degradation or burnout happens. YBCO coated conductors test in the experiment are from American superconductor (AMSC) and Shanghai Jiao Tong University (SJTU). Along with the quenching duration increasing, the maximum permissible voltage of CC decreases. When quenching duration is 100 ms, the maximum permissible of SJTU CC, 12 mm AMSC CC and 4 mm AMSC CC are 0.72 V/cm, 0.52 V/cm and 1.2 V/cm respectively. Based on the results of samples, the whole length of CCs used in the design of a SFCL can be determined.

  16. 12 CFR 703.14 - Permissible investments.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Permissible investments. 703.14 Section 703.14 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS INVESTMENT AND DEPOSIT ACTIVITIES § 703.14 Permissible investments. (a) Variable rate investment. A Federal...

  17. Path Dependence

    DEFF Research Database (Denmark)

    Madsen, Mogens Ove

    Begrebet Path Dependence blev oprindelig udviklet inden for New Institutionel Economics af bl.a. David, Arthur og North. Begrebet har spredt sig vidt i samfundsvidenskaberne og undergået en udvikling. Dette paper propagerer for at der er sket så en så omfattende udvikling af begrebet, at man nu kan...... tale om 1. og 2. generation af Path Dependence begrebet. Den nyeste udvikling af begrebet har relevans for metodologi-diskusionerne i relation til Keynes...

  18. Path Creation

    DEFF Research Database (Denmark)

    Karnøe, Peter; Garud, Raghu

    2012-01-01

    This paper employs path creation as a lens to follow the emergence of the Danish wind turbine cluster. Supplier competencies, regulations, user preferences and a market for wind power did not pre-exist; all had to emerge in a tranformative manner involving multiple actors and artefacts. Competenc......This paper employs path creation as a lens to follow the emergence of the Danish wind turbine cluster. Supplier competencies, regulations, user preferences and a market for wind power did not pre-exist; all had to emerge in a tranformative manner involving multiple actors and artefacts....... Competencies emerged through processes and mechanisms such as co-creation that implicated multiple learning processes. The process was not an orderly linear one as emergent contingencies influenced the learning processes. An implication is that public policy to catalyse clusters cannot be based...

  19. A Dynamic Operation Permission Technique Based on an MFM Model and Numerical Simulation

    International Nuclear Information System (INIS)

    Akio, Gofuku; Masahiro, Yonemura

    2011-01-01

    It is important to support operator activities to an abnormal plant situation where many counter actions are taken in relatively short time. The authors proposed a technique called dynamic operation permission to decrease human errors without eliminating creative idea of operators to cope with an abnormal plant situation by checking if the counter action taken is consistent with emergency operation procedure. If the counter action is inconsistent, a dynamic operation permission system warns it to operators. It also explains how and why the counter action is inconsistent and what influence will appear on the future plant behavior by a qualitative influence inference technique based on a model by the Mf (Multilevel Flow Modeling). However, the previous dynamic operation permission is not able to explain quantitative effects on plant future behavior. Moreover, many possible influence paths are derived because a qualitative reasoning does not give a solution when positive and negative influences are propagated to the same node. This study extends the dynamic operation permission by combining the qualitative reasoning and the numerical simulation technique. The qualitative reasoning based on an Mf model of plant derives all possible influence propagation paths. Then, a numerical simulation gives a prediction of plant future behavior in the case of taking a counter action. The influence propagation that does not coincide with the simulation results is excluded from possible influence paths. The extended technique is implemented in a dynamic operation permission system for an oil refinery plant. An MFM model and a static numerical simulator are developed. The results of dynamic operation permission for some abnormal plant situations show the improvement of the accuracy of dynamic operation permission and the quality of explanation for the effects of the counter action taken

  20. Investigation of Prediction Accuracy, Sensitivity, and Parameter Stability of Large-Scale Propagation Path Loss Models for 5G Wireless Communications

    DEFF Research Database (Denmark)

    Sun, Shu; Rappaport, Theodore S.; Thomas, Timothy

    2016-01-01

    This paper compares three candidate large-scale propagation path loss models for use over the entire microwave and millimeter-wave (mmWave) radio spectrum: the alpha–beta–gamma (ABG) model, the close-in (CI) free-space reference distance model, and the CI model with a frequency-weighted path loss...... exponent (CIF). Each of these models has been recently studied for use in standards bodies such as 3rd Generation Partnership Project (3GPP) and for use in the design of fifth generation wireless systems in urban macrocell, urban microcell, and indoor office and shopping mall scenarios. Here, we compare...

  1. Influence of Permissive Parenting on Youth Farm Risk Behaviors.

    Science.gov (United States)

    Jinnah, Hamida A; Stoneman, Zolinda

    2016-01-01

    Farm youth continue to experience high rates of injuries and premature deaths as a result of agricultural activities. Increased parental permissiveness is positively associated with many different types of high-risk behaviors in youth. This study explored whether permissive parenting (fathering and mothering) predicts youth unsafe behaviors on the farm. Data were analyzed for 67 youth and their parents. Families were recruited from a statewide farm publication, through youth organizations (i.e., FFA [Future Farmers of America]), local newspapers, farmer referrals, and through the Cooperative Extension Network. Hierarchical multiple regression was completed. Results revealed that fathers and mothers who practiced lax-inconsistent disciplining were more likely to have youth who indulged in unsafe farm behaviors. Key hypotheses confirmed that permissive parenting (lax-inconsistent disciplining) by parents continued to predict youth unsafe farm behaviors, even after youth age, youth gender, youth personality factor of risk-taking, and father's unsafe behaviors (a measure associated with modeling) were all taken into account. A key implication is that parents may play an important role in influencing youth farm safety behaviors. Parents (especially fathers) need to devote time to discuss farm safety with their youth. Farm safety interventions need to involve parents as well as address and respect the culture and values of families. Interventions need to focus not only on safe farm practices, but also promote positive parenting practices, including increased parent-youth communication about safety, consistent disciplining strategies, and increased monitoring and modeling of safe farm behaviors by parents.

  2. Permissive Subsorted Partial Logic in CASL

    DEFF Research Database (Denmark)

    Cerioli, Maura; Haxthausen, Anne Elisabeth; Krieg-Brückner, Bernd

    1997-01-01

    This paper presents a permissive subsorted partial logic used in the CoFI Algebraic Specification Language. In contrast to other order-sorted logics, subsorting is not modeled by set inclusions, but by injective embeddings allowing for more general models in which subtypes can have different data...

  3. User-centric android flexible permissions

    NARCIS (Netherlands)

    Scoccia, Gian Luca; Malavolta, Ivano; Autili, Marco; Di Salle, Amleto; Inverardi, Paola

    2017-01-01

    Privacy in mobile apps is a fundamental aspect to be considered, particularly with regard to meeting end user expectations. Due to the rigidities of the Android permission model, desirable trade-offs are not allowed. End users are confined into a secondary role, having the only option of choosing

  4. Gender Differences In Premarital Sexual Permissiveness Among ...

    African Journals Online (AJOL)

    This paper examined the concept of premariatal sexual permissiveness among selected University undergraduates in a state owned university in Nigeria, believing that the policy of non-residential status of the University will facilitate premarital sexual activity among the students. Using a total of 400 purposively selected ...

  5. Developing a Multidimensional Checklist for Evaluating Language-Learning Websites Coherent with the Communicative Approach: A Path for the Knowing-How-to-Do Enhancement

    Science.gov (United States)

    Moncada Linares, Sthephanny; Díaz Romero, Andrea Carolina

    2016-01-01

    As a result of the rapid development of Information and Communication Technology (ICT) and the growing interest in Internet-based tools for language classroom, it has become a pressing need for educators to locate, evaluate and select the most appropriate language-learning digital resources that foster more communicative and meaningful learning…

  6. Cooperative path planning of unmanned aerial vehicles

    CERN Document Server

    Tsourdos, Antonios; Shanmugavel, Madhavan

    2010-01-01

    An invaluable addition to the literature on UAV guidance and cooperative control, Cooperative Path Planning of Unmanned Aerial Vehicles is a dedicated, practical guide to computational path planning for UAVs. One of the key issues facing future development of UAVs is path planning: it is vital that swarm UAVs/ MAVs can cooperate together in a coordinated manner, obeying a pre-planned course but able to react to their environment by communicating and cooperating. An optimized path is necessary in order to ensure a UAV completes its mission efficiently, safely, and successfully. Focussing on the path planning of multiple UAVs for simultaneous arrival on target, Cooperative Path Planning of Unmanned Aerial Vehicles also offers coverage of path planners that are applicable to land, sea, or space-borne vehicles. Cooperative Path Planning of Unmanned Aerial Vehicles is authored by leading researchers from Cranfield University and provides an authoritative resource for researchers, academics and engineers working in...

  7. Rationalizing the Permissibility of Mosque Decoration

    Directory of Open Access Journals (Sweden)

    Spahic Omer

    2016-06-01

    Full Text Available This paper discusses the subject of mosque decoration and some of the criteria which determine its permissibility or otherwise. Some aspects of the matter are somewhat sensitive and double-edged. Thus, the paper presents an objective, balanced and scientific account of the theme, steering clear of the sentimental aspects of the evidences often put forth by both the proponents and opponents of mosque decoration. The main thrusts of the paper are the issues pertaining to the legitimacy of decoration in general, the subject of the function of mosques vis-à-vis their decoration, as well as the broad guidelines that regulate mosque decoration emphasizing the decoration of the mihrab (praying niche area and the qiblah wall. The paper concludes that in principle mosque decoration is permissible so long as it conforms to the requirements of the Islamic spirituality and the quintessence of genuine Islamic art and architecture.

  8. Asian International Students at an Australian University: Mapping the Paths between Integrative Motivation, Competence in L2 Communication, Cross-Cultural Adaptation and Persistence with Structural Equation Modelling

    Science.gov (United States)

    Yu, Baohua

    2013-01-01

    This study examined the interrelationships of integrative motivation, competence in second language (L2) communication, sociocultural adaptation, academic adaptation and persistence of international students at an Australian university. Structural equation modelling demonstrated that the integrative motivation of international students has a…

  9. A permissive graphical patcher for supercollider synths

    OpenAIRE

    Dufeu, Frédéric

    2016-01-01

    This article presents the first version of a permissive graphical patcher (referred to in the text as SCPGP) dedicated to fluid interconnection and control of SuperCollider Synths. With SCPGP, the user programs her/his SynthDefs normally as code in the SuperCollider environment, along with a minimal amount of additional information on these SynthDefs, and programs Patterns according to a simple SuperCollider-compliant syntax.\\ud From the execution of this SuperCollider session, the SCPGP inte...

  10. COMMUNICATIONS

    CERN Multimedia

    L. Taylor and D. Barney

    2010-01-01

    CMS Centres, Outreach and the 7 TeV Media Event The new CMS Communications group is now established and is addressing three areas that are critical to CMS as it enters the physics operations phase: - Communications Infrastructure, including almost 50 CMS Centres Worldwide, videoconferencing systems, and CERN meeting rooms - Information systems, including the internal and external Web sites as well as the document preparation and management systems - Outreach and Education activities, including working with print, radio and TV media, visits to CMS, and exhibitions. The group has been active in many areas, with the highest priority being accorded to needs of CMS operations and preparations for the major media event planned for 7 TeV collisions. Unfortunately the CMS Centre@CERN suffered a major setback when, on 21st December, a cooling water pipe froze and burst on the floor above the CMS Centre main room. Water poured through the ceiling, flooding the floor and soaking some of the consoles, before e...

  11. COMMUNICATIONS

    CERN Multimedia

    A. Petrilli

    2013-01-01

    The organisation of the Open Days at the end of September was the single biggest effort of the CMS Communications Group this year. We would like to thank all volunteers for their hard work to show our Point 5 facilities and explain science and technology to the general public. During two days more than 5,000 people visited the CMS detector underground and profited from the surface activities, which included an exhibition on CMS, a workshop on superconductivity, and an activity for our younger visitors involving wooden Kapla blocks. The Communications Group took advantage of the preparations to produce new CMS posters that can be reused at other venues. Event display images have been produced not just for this occasion but also for other exhibits, education purposes, publications etc. During the Open Days, Gilles Jobin, 2012 winner of CERN Collide@CERN prize, performed his Quantum show in Point 5, with the light installation of German artist Julius von Bismarck. Image 3: CERN Open Days at CMS wel...

  12. Robot Lies in Health Care: When Is Deception Morally Permissible?

    Science.gov (United States)

    Matthias, Andreas

    2015-06-01

    Autonomous robots are increasingly interacting with users who have limited knowledge of robotics and are likely to have an erroneous mental model of the robot's workings, capabilities, and internal structure. The robot's real capabilities may diverge from this mental model to the extent that one might accuse the robot's manufacturer of deceiving the user, especially in cases where the user naturally tends to ascribe exaggerated capabilities to the machine (e.g. conversational systems in elder-care contexts, or toy robots in child care). This poses the question, whether misleading or even actively deceiving the user of an autonomous artifact about the capabilities of the machine is morally bad and why. By analyzing trust, autonomy, and the erosion of trust in communicative acts as consequences of deceptive robot behavior, we formulate four criteria that must be fulfilled in order for robot deception to be morally permissible, and in some cases even morally indicated.

  13. Path Creation, Path Dependence and Breaking Away from the Path

    OpenAIRE

    Wang, Jens; Hedman, Jonas; Tuunainen, Virpi Kristiina

    2016-01-01

    The explanation of how and why firms succeed or fail is a recurrent research challenge. This is particularly important in the context of technological innovations. We focus on the role of historical events and decisions in explaining such success and failure. Using a case study of Nokia, we develop and extend a multi-layer path dependence framework. We identify four layers of path dependence: technical, strategic and leadership, organizational, and external collaboration. We show how path dep...

  14. Control over Permissible Short Emergency Overloads in Power Transformers

    Directory of Open Access Journals (Sweden)

    V. A. Anischenko

    2010-01-01

    Full Text Available The paper proposes a method for determination a permissible duration of short intermittent overloads of power transformers that permits to avoid non-permissible over-heating of winding insulation and fully utilize overloading transformer ability.

  15. Android Multi-Level System Permission Management Approach

    OpenAIRE

    Luo, Yang; Zhang, Qixun; Shen, Qingni; Liu, Hongzhi; Wu, Zhonghai

    2017-01-01

    With the expansion of the market share occupied by the Android platform, security issues (especially application security) have become attention focus of researchers. In fact, the existing methods lack the capabilities to manage application permissions without root privilege. This study proposes a dynamic management mechanism of Android application permissions based on security policies. The paper first describes the permissions by security policies, then implementes permission checking code ...

  16. 30 CFR 62.130 - Permissible exposure level.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Permissible exposure level. 62.130 Section 62... REGULATIONS OCCUPATIONAL NOISE EXPOSURE § 62.130 Permissible exposure level. (a) The mine operator must assure that no miner is exposed during any work shift to noise that exceeds the permissible exposure level. If...

  17. A Symbolic Approach to Permission Accounting for Concurrent Reasoning

    NARCIS (Netherlands)

    Huisman, Marieke; Mostowski, Wojciech

    2015-01-01

    Permission accounting is fundamental to modular, thread-local reasoning about concurrent programs. This paper presents a new, symbolic system for permission accounting. In existing systems, permissions are numeric value-based and refer to the current thread only. Our system is based on symbolic

  18. Feynman's path integrals and Bohm's particle paths

    International Nuclear Information System (INIS)

    Tumulka, Roderich

    2005-01-01

    Both Bohmian mechanics, a version of quantum mechanics with trajectories, and Feynman's path integral formalism have something to do with particle paths in space and time. The question thus arises how the two ideas relate to each other. In short, the answer is, path integrals provide a re-formulation of Schroedinger's equation, which is half of the defining equations of Bohmian mechanics. I try to give a clear and concise description of the various aspects of the situation. (letters and comments)

  19. Path coupling and aggregate path coupling

    CERN Document Server

    Kovchegov, Yevgeniy

    2018-01-01

    This book describes and characterizes an extension to the classical path coupling method applied to statistical mechanical models, referred to as aggregate path coupling. In conjunction with large deviations estimates, the aggregate path coupling method is used to prove rapid mixing of Glauber dynamics for a large class of statistical mechanical models, including models that exhibit discontinuous phase transitions which have traditionally been more difficult to analyze rigorously. The book shows how the parameter regions for rapid mixing for several classes of statistical mechanical models are derived using the aggregate path coupling method.

  20. Legal Permissibility of Unilateral Humanitarian Interventions

    Directory of Open Access Journals (Sweden)

    Petra Perisic

    2013-03-01

    Full Text Available The paper explores the status of unilateral humanitarian interventions in international law. The United Nations Charter prohibits the use of force, except in case of self-defense and the collective action authorized by the Security Council. The question is whether the non-existence of unilateral humanitarian intervention among these exceptions means that they are not in conformity with the Charter and if so, whether the right to such interventions exists as the part of customary law. The issue has become even more controversial after the adoption of the “responsibility to protect” principle. Findings of legal scholars on this issue differ significantly. This paper analyzes and interprets the Charter provisions in order to answer the question of compatibility of humanitarian interventions with the Charter and examines the state practice in order to conclude whether the customary law rule allowing the humanitarian intervention exists. The conclusion of the paper is that there is no evidence to support the contentions that interventions without the Security Council authorization are permissible, although there are elements which point to the possibility of the creation of customary law allowing them.

  1. Is the maximum permissible radiation burden for the population indeed permissible

    International Nuclear Information System (INIS)

    Renesse, R.L. van.

    1975-01-01

    It is argued that legislation based on the ICRP doses will, under economical influences, lead to a situation where the population is exposed to radiation doses near the maximum permissible dose. Due to cumulative radiation effects, this will introduce unacceptable health risks. Therefore, it will be necessary to lower the legal dose limit of 170 millrem per year per person by a factor 10 to 20

  2. Challenges to obtaining parental permission for child participation in a school-based waterpipe tobacco smoking prevention intervention in Qatar.

    Science.gov (United States)

    Nakkash, Rima T; Al Mulla, Ahmad; Torossian, Lena; Karhily, Roubina; Shuayb, Lama; Mahfoud, Ziyad R; Janahi, Ibrahim; Al Ansari, Al Anoud; Afifi, Rema A

    2014-09-30

    Involving children in research studies requires obtaining parental permission. A school-based intervention to delay/prevent waterpipe use for 7th and 8th graders in Qatar was developed, and parental permission requested. Fifty three percent (2308/4314) of the parents returned permission forms; of those 19.5% of the total (840/4314) granted permission. This paper describes the challenges to obtaining parental permission. No research to date has described such challenges in the Arab world. A random sample of 40 schools in Doha, Qatar was selected for inclusion in the original intervention. Permission forms were distributed to parents for approval of their child's participation. The permission forms requested that parents indicate their reasons for non-permission if they declined. These were categorized into themes. In order to understand reasons for non-permission, interviews with parents were conducted. Phone numbers of parents were requested from the school administration; 12 of the 40 schools (30%) agreed to provide the contact information. A random sample of 28 parents from 12 schools was interviewed to reach data saturation. Thematic analysis was used to analyze their responses. Reasons for non-permission documented in both the forms and interviews included: poor timing; lack of interest; the child not wanting to participate; and the child living in a smoke-free environment. Interviews provided information on important topics to include in the consent forms, parents' decision-making processes regarding their child's participation, and considerations for communicating with parents. Many parents also indicated that this was the first time they had been asked to give an informed consent for their child's participation in a study. Results indicate that more attention needs to be given to the informed parental consent process. Researchers should consider enhancing both the methods of communicating information as well the specific information provided. Before

  3. Quantitative Security Risk Assessment of Android Permissions and Applications

    OpenAIRE

    Wang , Yang; Zheng , Jun; Sun , Chen; Mukkamala , Srinivas

    2013-01-01

    Part 6: Mobile Computing; International audience; The booming of the Android platform in recent years has attracted the attention of malware developers. However, the permissions-based model used in Android system to prevent the spread of malware, has shown to be ineffective. In this paper, we propose DroidRisk, a framework for quantitative security risk assessment of both Android permissions and applications (apps) based on permission request patterns from benign apps and malware, which aims ...

  4. Fractional path planning and path tracking

    International Nuclear Information System (INIS)

    Melchior, P.; Jallouli-Khlif, R.; Metoui, B.

    2011-01-01

    This paper presents the main results of the application of fractional approach in path planning and path tracking. A new robust path planning design for mobile robot was studied in dynamic environment. The normalized attractive force applied to the robot is based on a fictitious fractional attractive potential. This method allows to obtain robust path planning despite robot mass variation. The danger level of each obstacles is characterized by the fractional order of the repulsive potential of the obstacles. Under these conditions, the robot dynamic behavior was studied by analyzing its X - Y path planning with dynamic target or dynamic obstacles. The case of simultaneously mobile obstacles and target is also considered. The influence of the robot mass variation is studied and the robustness analysis of the obtained path shows the robustness improvement due to the non integer order properties. Pre shaping approach is used to reduce system vibration in motion control. Desired systems inputs are altered so that the system finishes the requested move without residual vibration. This technique, developed by N.C. Singer and W.P.Seering, is used for flexible structure control, particularly in the aerospace field. In a previous work, this method was extended for explicit fractional derivative systems and applied to second generation CRONE control, the robustness was also studied. CRONE (the French acronym of C ommande Robuste d'Ordre Non Entier ) control system design is a frequency-domain based methodology using complex fractional integration.

  5. Digital communication system

    International Nuclear Information System (INIS)

    Union, D.C.

    1980-01-01

    A digital communication system for communicating among two central consoles and a plurality of local controllers, e.g. in a radiation and monitoring system, provides communication between each of the consoles and all of the local controllers via dual paths. Each path is independent of the other and each extends from one of the consoles to all of the local controllers from opposite directions, thereby forming a unique non-continuous loop. (author)

  6. 46 CFR 115.700 - Permission for repairs and alterations.

    Science.gov (United States)

    2010-10-01

    ... replacement in kind, of electrical wiring, fuel lines, tanks, boilers and other pressure vessels, and steering... 46 Shipping 4 2010-10-01 2010-10-01 false Permission for repairs and alterations. 115.700 Section... AND CERTIFICATION Repairs and Alterations § 115.700 Permission for repairs and alterations. (a...

  7. 46 CFR 176.700 - Permission for repairs and alterations.

    Science.gov (United States)

    2010-10-01

    ... repair or replacement, other than replacement in kind, of electrical wiring, fuel lines, tanks, boilers... 46 Shipping 7 2010-10-01 2010-10-01 false Permission for repairs and alterations. 176.700 Section... (UNDER 100 GROSS TONS) INSPECTION AND CERTIFICATION Repairs and Alterations § 176.700 Permission for...

  8. 14 CFR 399.35 - Special tariff permission.

    Science.gov (United States)

    2010-01-01

    ... PROCEEDINGS) POLICY STATEMENTS STATEMENTS OF GENERAL POLICY Policies Relating to Rates and Tariffs § 399.35 Special tariff permission. (a) Definition. As used in this section, to grant STP means to approve a... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Special tariff permission. 399.35 Section...

  9. 42 CFR 433.66 - Permissible provider-related donations.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Permissible provider-related donations. 433.66... Requirements State Financial Participation § 433.66 Permissible provider-related donations. (a) General rule... provider-related donations without a reduction in FFP, only in accordance with the requirements of this...

  10. 45 CFR 1639.4 - Permissible representation of eligible clients.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Permissible representation of eligible clients... CORPORATION WELFARE REFORM § 1639.4 Permissible representation of eligible clients. Recipients may represent an individual eligible client who is seeking specific relief from a welfare agency. [62 FR 30766...

  11. The ecological determination of the permissible concentrations for radioactive contamination

    International Nuclear Information System (INIS)

    Kononovich, A.L.

    1996-01-01

    It is supposed that all inhabitants of the ecosystem are enjoying equal rights. The report describes the approximate method of ecology normalizing of the permissible radionuclide concentrations. Definition of the permissible concentration is made by an indirect way, since the defining criterion is unknown

  12. May I sleep in your bed? Getting permission to book

    NARCIS (Netherlands)

    Karlsson, L.; Kemperman, A.D.A.M.; Dolnicar, S.

    2017-01-01

    Demand for tourist accommodation offered on peer-to-peer networks is skyrocketing. In such networks tourists can only book if the accommodation provider (host) gives their permission. Needing permission to book accommodation is radically new in tourism. No hotel, motel or B&B assesses a tourist

  13. Path-dependent functions

    International Nuclear Information System (INIS)

    Khrapko, R.I.

    1985-01-01

    A uniform description of various path-dependent functions is presented with the help of expansion of the type of the Taylor series. So called ''path-integrals'' and ''path-tensor'' are introduced which are systems of many-component quantities whose values are defined for arbitrary paths in coordinated region of space in such a way that they contain a complete information on the path. These constructions are considered as elementary path-dependent functions and are used instead of power monomials in the usual Taylor series. Coefficients of such an expansion are interpreted as partial derivatives dependent on the order of the differentiations or else as nonstandard cavariant derivatives called two-point derivatives. Some examples of pathdependent functions are presented.Space curvature tensor is considered whose geometrica properties are determined by the (non-transitive) translator of parallel transport of a general type. Covariant operation leading to the ''extension'' of tensor fiels is pointed out

  14. Iterated Leavitt Path Algebras

    International Nuclear Information System (INIS)

    Hazrat, R.

    2009-11-01

    Leavitt path algebras associate to directed graphs a Z-graded algebra and in their simplest form recover the Leavitt algebras L(1,k). In this note, we introduce iterated Leavitt path algebras associated to directed weighted graphs which have natural ± Z grading and in their simplest form recover the Leavitt algebras L(n,k). We also characterize Leavitt path algebras which are strongly graded. (author)

  15. Pulled Motzkin paths

    Energy Technology Data Exchange (ETDEWEB)

    Janse van Rensburg, E J, E-mail: rensburg@yorku.c [Department of Mathematics and Statistics, York University, Toronto, ON, M3J 1P3 (Canada)

    2010-08-20

    In this paper the models of pulled Dyck paths in Janse van Rensburg (2010 J. Phys. A: Math. Theor. 43 215001) are generalized to pulled Motzkin path models. The generating functions of pulled Motzkin paths are determined in terms of series over trinomial coefficients and the elastic response of a Motzkin path pulled at its endpoint (see Orlandini and Whittington (2004 J. Phys. A: Math. Gen. 37 5305-14)) is shown to be R(f) = 0 for forces pushing the endpoint toward the adsorbing line and R(f) = f(1 + 2cosh f))/(2sinh f) {yields} f as f {yields} {infinity}, for forces pulling the path away from the X-axis. In addition, the elastic response of a Motzkin path pulled at its midpoint is shown to be R(f) = 0 for forces pushing the midpoint toward the adsorbing line and R(f) = f(1 + 2cosh (f/2))/sinh (f/2) {yields} 2f as f {yields} {infinity}, for forces pulling the path away from the X-axis. Formal combinatorial identities arising from pulled Motzkin path models are also presented. These identities are the generalization of combinatorial identities obtained in directed paths models to their natural trinomial counterparts.

  16. Pulled Motzkin paths

    Science.gov (United States)

    Janse van Rensburg, E. J.

    2010-08-01

    In this paper the models of pulled Dyck paths in Janse van Rensburg (2010 J. Phys. A: Math. Theor. 43 215001) are generalized to pulled Motzkin path models. The generating functions of pulled Motzkin paths are determined in terms of series over trinomial coefficients and the elastic response of a Motzkin path pulled at its endpoint (see Orlandini and Whittington (2004 J. Phys. A: Math. Gen. 37 5305-14)) is shown to be R(f) = 0 for forces pushing the endpoint toward the adsorbing line and R(f) = f(1 + 2cosh f))/(2sinh f) → f as f → ∞, for forces pulling the path away from the X-axis. In addition, the elastic response of a Motzkin path pulled at its midpoint is shown to be R(f) = 0 for forces pushing the midpoint toward the adsorbing line and R(f) = f(1 + 2cosh (f/2))/sinh (f/2) → 2f as f → ∞, for forces pulling the path away from the X-axis. Formal combinatorial identities arising from pulled Motzkin path models are also presented. These identities are the generalization of combinatorial identities obtained in directed paths models to their natural trinomial counterparts.

  17. Pulled Motzkin paths

    International Nuclear Information System (INIS)

    Janse van Rensburg, E J

    2010-01-01

    In this paper the models of pulled Dyck paths in Janse van Rensburg (2010 J. Phys. A: Math. Theor. 43 215001) are generalized to pulled Motzkin path models. The generating functions of pulled Motzkin paths are determined in terms of series over trinomial coefficients and the elastic response of a Motzkin path pulled at its endpoint (see Orlandini and Whittington (2004 J. Phys. A: Math. Gen. 37 5305-14)) is shown to be R(f) = 0 for forces pushing the endpoint toward the adsorbing line and R(f) = f(1 + 2cosh f))/(2sinh f) → f as f → ∞, for forces pulling the path away from the X-axis. In addition, the elastic response of a Motzkin path pulled at its midpoint is shown to be R(f) = 0 for forces pushing the midpoint toward the adsorbing line and R(f) = f(1 + 2cosh (f/2))/sinh (f/2) → 2f as f → ∞, for forces pulling the path away from the X-axis. Formal combinatorial identities arising from pulled Motzkin path models are also presented. These identities are the generalization of combinatorial identities obtained in directed paths models to their natural trinomial counterparts.

  18. A concept of dynamic permission mechanism on android

    Science.gov (United States)

    Aron, Lukas; Hanacek, Petr

    2016-02-01

    This paper discuss the main security topic in mobile security area and this topic is protect user against the leakage of data. This work primarily contains the proposal of concept of dynamic permission mechanism for Android operating system. This mechanism deals with assignment or enforcement permissions to the application according to files that the application works with. Application has set of permissions that can use, but if the user opens confident files the application permissions should change its permission set and there should not be possible leakage of this secret data. The permissions set should be stricter according to opened confidential file or more open (without restriction) if the file is not secret file. The concept proposes the solution for protecting this data leakage. Idea covers rule that user should be avoided of change this permissions himself, but this behavior should be dynamic, automatic and independent. This proposal is mainly aimed to Android operating system, but the concept can be applied to other mobile platforms with some implementation changes.

  19. Multi-Dimensional Path Queries

    DEFF Research Database (Denmark)

    Bækgaard, Lars

    1998-01-01

    to create nested path structures. We present an SQL-like query language that is based on path expressions and we show how to use it to express multi-dimensional path queries that are suited for advanced data analysis in decision support environments like data warehousing environments......We present the path-relationship model that supports multi-dimensional data modeling and querying. A path-relationship database is composed of sets of paths and sets of relationships. A path is a sequence of related elements (atoms, paths, and sets of paths). A relationship is a binary path...

  20. Unique Path Partitions

    DEFF Research Database (Denmark)

    Bessenrodt, Christine; Olsson, Jørn Børling; Sellers, James A.

    2013-01-01

    We give a complete classification of the unique path partitions and study congruence properties of the function which enumerates such partitions.......We give a complete classification of the unique path partitions and study congruence properties of the function which enumerates such partitions....

  1. Hamiltonian path integrals

    International Nuclear Information System (INIS)

    Prokhorov, L.V.

    1982-01-01

    The properties of path integrals associated with the allowance for nonstandard terms reflecting the operator nature of the canonical variables are considered. Rules for treating such terms (''equivalence rules'') are formulated. Problems with a boundary, the behavior of path integrals under canonical transformations, and the problem of quantization of dynamical systems with constraints are considered in the framework of the method

  2. Is the publication of exit poll results morally permissible?

    DEFF Research Database (Denmark)

    Sønderholm, Jørn

    2016-01-01

    This article is about exit polls. It addresses the question of whether or not it is morally permissible to publish exit poll results. The conclusion of the article is that an affirmative answer should be given to this question. In section 2, the master argument in favor of the moral permissibility...... of the publication of exit poll results is introduced. This is a strong argument. It is, however, argued that it might be the case that the conclusion of this argument should be rejected if there are other, and weightier, arguments against the idea that the publication of exit poll results is morally permissible....... In section 3, the strongest arguments against the moral permissibility of the publication of exit poll results are outlined and discussed. The conclusion of this section is that all these arguments fail in their intended purpose. The conclusion of the article is therefore justified....

  3. comparative analysis of path loss prediction models for urban

    African Journals Online (AJOL)

    the acceptable minimum MSE value of 6dB for good signal propagation. Keywords: macrocellular areas ... itate high-speed data communications in ad- dition to voice calls. ... On the basis of the mobile radio environment, path loss predic-.

  4. Path integration quantization

    International Nuclear Information System (INIS)

    DeWitt-Morette, C.

    1983-01-01

    Much is expected of path integration as a quantization procedure. Much more is possible if one recognizes that path integration is at the crossroad of stochastic and differential calculus and uses the full power of both stochastic and differential calculus in setting up and computing path integrals. In contrast to differential calculus, stochastic calculus has only comparatively recently become an instrument of thought. It has nevertheless already been used in a variety of challenging problems, for instance in the quantization problem. The author presents some applications of the stochastic scheme. (Auth.)

  5. Two dimensional simplicial paths

    International Nuclear Information System (INIS)

    Piso, M.I.

    1994-07-01

    Paths on the R 3 real Euclidean manifold are defined as 2-dimensional simplicial strips which are orbits of the action of a discrete one-parameter group. It is proven that there exists at least one embedding of R 3 in the free Z-module generated by S 2 (x 0 ). The speed is defined as the simplicial derivative of the path. If mass is attached to the simplex, the free Lagrangian is proportional to the width of the path. In the continuum limit, the relativistic form of the Lagrangian is recovered. (author). 7 refs

  6. Contrasting amino acid profiles among permissive and non-permissive hosts of Candidatus Liberibacter asiaticus, putative causal agent of Huanglongbing.

    Directory of Open Access Journals (Sweden)

    Mamoudou Sétamou

    Full Text Available Huanglongbing is a devastating disease of citrus. In this study, a comprehensive profile of phloem sap amino acids (AA in four permissive host plants of Candidatus Liberibacter asiaticus (CLas and three non-permissive Rutaceae plants was conducted to gain a better understanding of host factors that may promote or suppress the bacterium. The AA profiles of Diaphorina citri nymphs and adults were similarly analyzed. A total of 38 unique AAs were detected in phloem sap of the various plants and D. citri samples, with phloem sap of young shoots containing more AAs and at higher concentrations than their mature counterparts. All AAs detected in phloem sap of non-permissive plants were also present in CLas -permissive hosts plus additional AAs in the latter class of plants. However, the relative composition of 18 commonly shared AAs varied between CLas -permissive hosts and non-permissive plants. Multivariate analysis with a partial least square discriminant methodology revealed a total of 12 AAs as major factors affecting CLas host status, of which seven were positively related to CLas tolerance/resistance and five positively associated with CLas susceptibility. Most of the AAs positively associated with CLas susceptibility were predominantly of the glutamate family, notably stressed-induced AAs such as arginine, GABA and proline. In contrast, AAs positively correlated with CLas tolerance/resistance were mainly of the serine family. Further analysis revealed that whereas the relative proportions of AAs positively associated with CLas susceptibility did not vary with host developmental stages, those associated with CLas tolerance/resistance increased with flush shoot maturity. Significantly, the proline-to-glycine ratio was determined to be an important discriminating factor for CLas permissivity with higher values characteristic of CLas -permissive hosts. This ratio could be exploited as a biomarker in HLB-resistance breeding programs.

  7. Zero-Slack, Noncritical Paths

    Science.gov (United States)

    Simons, Jacob V., Jr.

    2017-01-01

    The critical path method/program evaluation and review technique method of project scheduling is based on the importance of managing a project's critical path(s). Although a critical path is the longest path through a network, its location in large projects is facilitated by the computation of activity slack. However, logical fallacies in…

  8. Groebner Finite Path Algebras

    OpenAIRE

    Leamer, Micah J.

    2004-01-01

    Let K be a field and Q a finite directed multi-graph. In this paper I classify all path algebras KQ and admissible orders with the property that all of their finitely generated ideals have finite Groebner bases. MS

  9. Path planning in changeable environments

    NARCIS (Netherlands)

    Nieuwenhuisen, D.

    2007-01-01

    This thesis addresses path planning in changeable environments. In contrast to traditional path planning that deals with static environments, in changeable environments objects are allowed to change their configurations over time. In many cases, path planning algorithms must facilitate quick

  10. Permissive hypercapnia and risk for brain injury and developmental impairment.

    Science.gov (United States)

    Hagen, Erika W; Sadek-Badawi, Mona; Carlton, David P; Palta, Mari

    2008-09-01

    Permissive hypercapnia is a respiratory-care strategy that is used to reduce the risk for lung injury. The goal of this study was to evaluate whether permissive hypercapnia is associated with higher risk for intraventricular hemorrhage and early childhood behavioral and functional problems than normocapnia among very low birth weight infants. Very low birth weight infants from a statewide cohort were eligible for this study when they were born at <32 weeks' gestational age and survived at least 24 hours. Infants were classified as receiving a permissive hypercapnia, normocapnia, or unclassifiable respiratory strategy during the first 24 hours after birth according to an algorithm based on Pco(2) values and respiratory-treatment decisions that were abstracted from medical charts. Intraventricular hemorrhage diagnosis was also abstracted from the medical chart. Behavioral and functional outcomes were assessed by parent interview at 2 to 3 years. Logistic regression was used to evaluate the relationship between intraventricular hemorrhage and respiratory strategy; ordinary linear regression was used to evaluate differences in behavior and function scores between children by respiratory strategy. Infants who received a permissive hypercapnia strategy were not more likely to have intraventricular hemorrhage than those with normocapnia. There were no differences in any of the behavioral or functional scores among children according to respiratory strategy. There was a significant interaction between care strategy and 1-minute Apgar score, indicating that infants with lower Apgar scores may be at higher risk for intraventricular hemorrhage with permissive hypercapnia. This study suggests that permissive hypercapnia does not increase risk for brain injury and impairment among very low birth weight children. The interaction between respiratory strategy and Apgar score is a potential worrisome exception to this conclusion. Future research should further evaluate the effect

  11. Permissible annual depositions and radionuclide concentrations in air

    International Nuclear Information System (INIS)

    Belyaev, V.A.; Golovko, M.Yu.

    1993-01-01

    It is established that it necessary to take into account the other ways of radionuclide intake apart from the inhalation one when determining the standards for radionuclide contamination of the atmospheric air. Whereby it is proposed to standardize annual depositions rather than permissible concentration in the atmospheric air for the ways related to radionuclide releases on the ground surface, which is explained by ambiguity of their dry deposition rate from the air. Formulae and results of calculation of standard characteristics are presented. The permissible radionuclide depositions, related to the intake through food chains are calculated with account for diet diversity, agroclimatic and phenological parameters in different regions of the country

  12. Quivers of Bound Path Algebras and Bound Path Coalgebras

    Directory of Open Access Journals (Sweden)

    Dr. Intan Muchtadi

    2010-09-01

    Full Text Available bras and coalgebras can be represented as quiver (directed graph, and from quiver we can construct algebras and coalgebras called path algebras and path coalgebras. In this paper we show that the quiver of a bound path coalgebra (resp. algebra is the dual quiver of its bound path algebra (resp. coalgebra.

  13. Permissive Parenting, Deviant Peer Affiliations, and Delinquent Behavior in Adolescence: the Moderating Role of Sympathetic Nervous System Reactivity.

    Science.gov (United States)

    Hinnant, J Benjamin; Erath, Stephen A; Tu, Kelly M; El-Sheikh, Mona

    2016-08-01

    The present study examined two measures of sympathetic nervous system (SNS) activity as moderators of the indirect path from permissive parenting to deviant peer affiliations to delinquency among a community sample of adolescents. Participants included 252 adolescents (M = 15.79 years; 53 % boys; 66 % European American, 34 % African American). A multi-method design was employed to address the research questions. Two indicators of SNS reactivity, skin conductance level reactivity (SCLR) and cardiac pre-ejection period reactivity (PEPR) were examined. SNS activity was measured during a baseline period and a problem-solving task (star-tracing); reactivity was computed as the difference between the task and baseline periods. Adolescents reported on permissive parenting, deviant peer affiliations, externalizing behaviors, and substance use (alcohol, marijuana). Analyses revealed indirect effects between permissive parenting and delinquency via affiliation with deviant peers. Additionally, links between permissive parenting to affiliation with deviant peers and affiliation with deviant peers to delinquency was moderated by SNS reactivity. Less SNS reactivity (less PEPR and/or less SCLR) were risk factors for externalizing problems and alcohol use. Findings highlight the moderating role of SNS reactivity in parenting and peer pathways that may contribute to adolescent delinquency and point to possibilities of targeted interventions for vulnerable youth.

  14. Paths correlation matrix.

    Science.gov (United States)

    Qian, Weixian; Zhou, Xiaojun; Lu, Yingcheng; Xu, Jiang

    2015-09-15

    Both the Jones and Mueller matrices encounter difficulties when physically modeling mixed materials or rough surfaces due to the complexity of light-matter interactions. To address these issues, we derived a matrix called the paths correlation matrix (PCM), which is a probabilistic mixture of Jones matrices of every light propagation path. Because PCM is related to actual light propagation paths, it is well suited for physical modeling. Experiments were performed, and the reflection PCM of a mixture of polypropylene and graphite was measured. The PCM of the mixed sample was accurately decomposed into pure polypropylene's single reflection, pure graphite's single reflection, and depolarization caused by multiple reflections, which is consistent with the theoretical derivation. Reflection parameters of rough surface can be calculated from PCM decomposition, and the results fit well with the theoretical calculations provided by the Fresnel equations. These theoretical and experimental analyses verify that PCM is an efficient way to physically model light-matter interactions.

  15. Leavitt path algebras

    CERN Document Server

    Abrams, Gene; Siles Molina, Mercedes

    2017-01-01

    This book offers a comprehensive introduction by three of the leading experts in the field, collecting fundamental results and open problems in a single volume. Since Leavitt path algebras were first defined in 2005, interest in these algebras has grown substantially, with ring theorists as well as researchers working in graph C*-algebras, group theory and symbolic dynamics attracted to the topic. Providing a historical perspective on the subject, the authors review existing arguments, establish new results, and outline the major themes and ring-theoretic concepts, such as the ideal structure, Z-grading and the close link between Leavitt path algebras and graph C*-algebras. The book also presents key lines of current research, including the Algebraic Kirchberg Phillips Question, various additional classification questions, and connections to noncommutative algebraic geometry. Leavitt Path Algebras will appeal to graduate students and researchers working in the field and related areas, such as C*-algebras and...

  16. Verification of Snapshotable Trees using Access Permissions and Typestate

    DEFF Research Database (Denmark)

    Mehnert, Hannes; Aldrich, Jonathan

    2012-01-01

    We use access permissions and typestate to specify and ver- ify a Java library that implements snapshotable search trees, as well as some client code. We formalize our approach in the Plural tool, a sound modular typestate checking tool. We describe the challenges to verify- ing snapshotable tree...

  17. 50 CFR 216.252 - Permissible methods of taking.

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS REGULATIONS GOVERNING THE TAKING AND IMPORTING OF MARINE MAMMALS Taking Marine Mammals Incidental to Conducting Precision Strike Weapon Missions in the Gulf of Mexico § 216.252 Permissible methods of taking. (a) Under Letters of Authorization issued pursuant to...

  18. 50 CFR 216.213 - Permissible methods of taking.

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS REGULATIONS GOVERNING THE TAKING AND IMPORTING OF MARINE MAMMALS Taking of Marine Mammals Incidental to Explosive Severance Activities Conducted During Offshore Structure Removal Operations on the Outer Continental Shelf in the U.S. Gulf of Mexico § 216.213 Permissible...

  19. Substantiation of the permissible radioactive contamination of working clothes

    International Nuclear Information System (INIS)

    Shcherbakov, V.L.; Korostin, A.S.

    1977-01-01

    A permissible level of working clothes contamination was determined on the base of the main migration routes of radioactive contaminants: permeation directly through the clothes into subclothes space on skin surface, emission into the air with amount of contaminants subsequently got by the organism of a working person through inhalation as well as transfer in the process of contacting of contaminated working clothes and surfaces of premises equipment, working person hands with amount of contaminants posteriorly got by the organism by alimentary or inhalation ways. Using the experimental and literature data available the permissible levels of working clothes contamination for the mentioned migration routes of radioactive materials have been calculated. According to the data obtained the permissible levels of working clothes contamination must not exceed 4 alpha-part/(cm 2 xmin) for contamination with high-tonic isotopes, 20 alpha-part./(cm 2 xmin) with other alpha-detine isotopes, 1000 beta-part./(cm 2 xmin) with beta-active ones. The permissible level of contamination of additional materials of the individual protection in the case of their contamination with high-tonic alpha-actine isotopes must not exceed 50 alpha-part./(cm 2 xmin), 200 alpha-part./(cm 2 xmin) for contamination th other alpha-active isotopes and 400 beta-part./(cm 2 xmin) with beta-active isotopes

  20. Maximum Permissible Concentrations and Negligible Concentrations for pesticides

    NARCIS (Netherlands)

    Crommentuijn T; Kalf DF; Polder MD; Posthumus R; Plassche EJ van de; CSR

    1997-01-01

    Maximum Permissible Concentrations (MPCs) and Negligible Concentrations (NCs) derived for a series of pesticides are presented in this report. These MPCs and NCs are used by the Ministry of Housing, Spatial Planning and the Environment (VROM) to set Environmental Quality Objectives. For some of the

  1. 26 CFR 1.422-5 - Permissible provisions.

    Science.gov (United States)

    2010-04-01

    ... of the incentive stock option are subject to a substantial risk of forfeiture and not transferable...) INCOME TAXES Certain Stock Options § 1.422-5 Permissible provisions. (a) General rule. An option that otherwise qualifies as an incentive stock option does not fail to be an incentive stock option merely...

  2. Appendices for: Improper Signaling in Two-Path Relay Channels

    KAUST Repository

    Gaafar, Mohamed

    2016-12-01

    This document contains the appendices for the work in “Improper Signaling in Two-Path Relay Channels,” which is submitted to 2017 IEEE International Conference on Communications (ICC) Workshop on Full-Duplex Communications for Future Wireless Networks, Paris, France.

  3. Appendices for: Improper Signaling in Two-Path Relay Channels

    KAUST Repository

    Gaafar, Mohamed; Amin, Osama; Schaefer, Rafael F.; Alouini, Mohamed-Slim

    2016-01-01

    This document contains the appendices for the work in “Improper Signaling in Two-Path Relay Channels,” which is submitted to 2017 IEEE International Conference on Communications (ICC) Workshop on Full-Duplex Communications for Future Wireless Networks, Paris, France.

  4. The Thinnest Path Problem

    Science.gov (United States)

    2016-07-22

    be reduced to TP in -D UDH for any . We then show that the 2-D disk hypergraph constructed in the proof of Theorem 1 can be modified to an exposed...transmission range that induces hy- peredge , i.e., (3) GAO et al.: THINNEST PATH PROBLEM 1181 Theorem 5 shows that the covered area of the path...representation of (the two hyperedges rooted at from the example given in Fig. 6 are illustrated in green and blue, respectively). step, we show in this

  5. Path dependence and creation

    DEFF Research Database (Denmark)

    Garud, Raghu; Karnøe, Peter

    This edited volume stems from a conference held in Copenhagen that the authors ran in August of 1997. The authors, aware of the recent work in evolutionary theory and the science of chaos and complexity, challenge the sometimes deterministic flavour of this work. They are interested in uncovering...... the place of agency in these theories that take history so seriously. In the end, they are as interested in path creation and destruction as they are in path dependence. This book is compiled of both theoretical and empirical writing. It shows relatively well-known industries such as the automobile...

  6. Reparametrization in the path integral

    International Nuclear Information System (INIS)

    Storchak, S.N.

    1983-01-01

    The question of the invariance of a measure in the n-dimensional path integral under the path reparametrization is considered. The non-invariance of the measure through the jacobian is suggeste. After the path integral reparametrization the representatioq for the Green's function of the Hamilton operator in terms of the path integral with the classical Hamiltonian has been obtained

  7. Parental alcohol use, alcohol-related problems, and alcohol-specific attitudes, alcohol-specific communication, and adolescent excessive alcohol use and alcohol-related problems: An indirect path model

    NARCIS (Netherlands)

    Mares, S.H.W.; Vorst, H. van der; Engels, R.C.M.E.; Lichtwarck-Aschoff, A.

    2011-01-01

    Alcohol-specific parent-child communication has often been studied in relation to regular alcohol use of adolescents. However, it might be as important to focus on adolescent problematic alcohol use. In addition, the way parents communicate with their children about alcohol might depend on their own

  8. MEASURING PATH DEPENDENCY

    Directory of Open Access Journals (Sweden)

    Peter Juhasz

    2017-03-01

    Full Text Available While risk management gained popularity during the last decades even some of the basic risk types are still far out of focus. One of these is path dependency that refers to the uncertainty of how we reach a certain level of total performance over time. While decision makers are careful in accessing how their position will look like the end of certain periods, little attention is given how they will get there through the period. The uncertainty of how a process will develop across a shorter period of time is often “eliminated” by simply choosing a longer planning time interval, what makes path dependency is one of the most often overlooked business risk types. After reviewing the origin of the problem we propose and compare seven risk measures to access path. Traditional risk measures like standard deviation of sub period cash flows fail to capture this risk type. We conclude that in most cases considering the distribution of the expected cash flow effect caused by the path dependency may offer the best method, but we may need to use several measures at the same time to include all the optimisation limits of the given firm

  9. Compact wireless control network protocol with fast path switching

    Directory of Open Access Journals (Sweden)

    Yasutaka Kawamoto

    2017-08-01

    Full Text Available Sensor network protocol stacks require the addition or adjustment of functions based on customer requirements. Sensor network protocols that require low delay and low packet error rate (PER, such as wireless control networks, often adopt time division multiple access (TDMA. However, it is difficult to add or adjust functions in protocol stacks that use TDMA methods. Therefore, to add or adjust functions easily, we propose NES-SOURCE, a compact wireless control network protocol with a fast path-switching function. NES-SOURCE is implemented using carrier sense multiple access/collision avoidance (CSMA/CA rather than TDMA. Wireless control networks that use TDMA prevent communication failure by duplicating the communication path. If CSMA/CA networks use duplicate paths, collisions occur frequently, and communication will fail. NES-SOURCE switches paths quickly when communication fails, which reduces the effect of communication failures. Since NES-SOURCE is implemented using CSMA/CA rather than TDMA, the implementation scale is less than one-half that of existing network stacks. Furthermore, since NES-SOURCE’s code complexity is low, functions can be added or adjusted easily and quickly. Communication failures occur owing to changes in the communication environment and collisions. Experimental results demonstrate that the proposed NES-SOURCE’s path-switching function reduces the amount of communication failures when the communication environment changes owing to human movement and others. Furthermore, we clarify the relationships among the probability of a changing communication environment, the collision occurrence rate, and the PER of NES-SOURCE.

  10. Larval diet affects mosquito development and permissiveness to Plasmodium infection

    OpenAIRE

    Gendrin, MEM; Christophides; Linenberg, Inbar

    2016-01-01

    The larval stages of malaria vector mosquitoes develop in water pools, feeding mostly on microorganisms and environmental detritus. Richness in the nutrient supply to larvae influences the development and metabolism of larvae and adults. Here, we investigated the effects of larval diet on the development, microbiota content and permissiveness to Plasmodium of Anopheles coluzzii . We tested three fish diets often used to rear mosquitoes in the laboratory, including two pelleted diets, Dr. Clar...

  11. Account of low temperature hardening in calculation of permissible stresses

    International Nuclear Information System (INIS)

    Novikov, N.V.; Ul'yanenko, A.P.; Gorodyskij, N.I.

    1980-01-01

    Suggested is a calculation scheme of permissible stresses with the account of temperature hardening for steels and alloys, the dependences of strength, plasticity and rupture work of which on cooling temperature do not have threshold changes in a wide range of low temperatures (from 300 to 4.2 K). Application of the suggested scheme is considered on the example of 12Kh18N10T austenitic chromium-nickel steel

  12. The calculation of maximum permissible exposure levels for laser radiation

    International Nuclear Information System (INIS)

    Tozer, B.A.

    1979-01-01

    The maximum permissible exposure data of the revised standard BS 4803 are presented as a set of decision charts which ensure that the user automatically takes into account such details as pulse length and pulse pattern, limiting angular subtense, combinations of multiple wavelength and/or multiple pulse lengths, etc. The two decision charts given are for the calculation of radiation hazards to skin and eye respectively. (author)

  13. Permissiveness toward tobacco sponsorship undermines tobacco control support in Africa.

    Science.gov (United States)

    Ayo-Yusuf, Olalekan A; Olutola, Bukola G; Agaku, Israel T

    2016-06-01

    School personnel, who are respected members of the community, may exert significant influence on policy adoption. This study assessed the impact of school personnel's permissiveness toward tobacco industry sponsorship activities on their support for complete bans on tobacco advertisements, comprehensive smoke-free laws and increased tobacco prices. Representative data were obtained from the Global School Personnel Survey for 29 African countries (n = 17 929). Adjusted prevalence ratios (aPR) were calculated using multi-variable Poisson regression models to assess the impact of permissiveness toward tobacco sponsorship activities on support for tobacco control policies (p industry should be allowed to sponsor school events were significantly less likely to support complete bans on tobacco advertisements [aPR = 0.89; 95% confidence interval (CI) 0.84-0.95] and comprehensive smoke-free laws (aPR = 0.95; 95% CI 0.92-0.98). In contrast, support for complete tobacco advertisement bans was more likely among those who believed that the tobacco industry encourages youths to smoke (aPR = 1.27; 95% CI 1.17-1.37), and among those who taught about health sometimes (aPR = 1.06; 95% CI 1.01-1.11) or a lot (aPR = 1.05; 95% CI 1.01-1.10) compared with those who did not teach about health at all. These findings underscore the need to educate school personnel on tobacco industry's strategies to undermine tobacco control policies. This may help to build school personnel support for laws intended to reduce youth susceptibility, experimentation and established use of tobacco products. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  14. Legitimate Permissions And Specifity Of Their Enforceability In Modern Russia

    Directory of Open Access Journals (Sweden)

    Vitaly Subochev

    2014-01-01

    Full Text Available Northern Caucasus Institute of Advanced Training (branch of Krasnodar University of Ministry of Internal Affairs of Russia, 123, Malbahova Street, Nalshik, 360016, Russia. Abstract: The article investigates the basic legal permissions in Russian law - legal rights, freedoms and legitimate interests. Potential of these means of legal regulation is examined as well as their common features and essential differences. Authors argue that the effectiveness of the mechanism of legal regulation largely depends on the proper use of legal permissions. Particular attention is paid to such kind of legal mean as a legitimate interest. The article draws attention to the fact that if a legal right or freedom are such kind of permissions which are guaranteed by the law in order to sustain certain demands of subjects of law, the legitimate interest is qualitatively different mean of regulation. The authors suggest considering a legitimate interest as reflected in the objective law legal possibility of subjects of law to enjoy certain social benefits and to seek protection from the state authorities in order to meet their interests which are not contradictory to provisions of law. Qualitative difference between legitimate interest and legal right and freedom is that the legitimate interest is an opportunity, guaranteed to a lesser extent than the permitted behavior within a legal right or freedom. Legitimate interest is a mere permission, admitted by the state and to some extent supported by it. But legal right and freedom - are those means of regulation, which are directly approved and sanctioned by the state which presuppose duty of a person to a particular behavior. The author's vision of the specifity of legal enforcement of legitimate admissions is presented.

  15. LEGITIMATE PERMISSIONS AND SPECIFITY OF THEIR ENFORCEABILITY IN MODERN RUSSIA

    Directory of Open Access Journals (Sweden)

    Vitaly Subochev

    2014-01-01

    Full Text Available Northern Caucasus Institute of Advanced Training (branch of Krasnodar University of Ministry of Internal Affairs of Russia, 123, Malbahova Street, Nalshik, 360016, Russia. Abstract: The article investigates the basic legal permissions in Russian law - legal rights, freedoms and legitimate interests. Potential of these means of legal regulation is examined as well as their common features and essential differences. Authors argue that the effectiveness of the mechanism of legal regulation largely depends on the proper use of legal permissions. Particular attention is paid to such kind of legal mean as a legitimate interest. The article draws attention to the fact that if a legal right or freedom are such kind of permissions which are guaranteed by the law in order to sustain certain demands of subjects of law, the legitimate interest is qualitatively different mean of regulation. The authors suggest considering a legitimate interest as reflected in the objective law legal possibility of subjects of law to enjoy certain social benefits and to seek protection from the state authorities in order to meet their interests which are not contradictory to provisions of law. Qualitative difference between legitimate interest and legal right and freedom is that the legitimate interest is an opportunity, guaranteed to a lesser extent than the permitted behavior within a legal right or freedom. Legitimate interest is a mere permission, admitted by the state and to some extent supported by it. But legal right and freedom - are those means of regulation, which are directly approved and sanctioned by the state which presuppose duty of a person to a particular behavior. The author's vision of the specifity of legal enforcement of legitimate admissions is presented.

  16. Android Apps and Permissions: Security and Privacy Risks

    OpenAIRE

    Boksasp, Trond; Utnes, Eivind

    2012-01-01

    This thesis investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. During the course of this project, a large data set consisting of applications published on Google Play and three different third-party Android application markets was collected over a two-month period. These applications are analysed using manual pattern recognition and k-mea...

  17. Parental permissiveness, control, and affect and drug use among adolescents.

    Science.gov (United States)

    Becoña, Elisardo; Martínez, Úrsula; Calafat, Amador; Fernández-Hermida, José Ramón; Juan, Montse; Sumnall, Harry; Mendes, Fernando; Gabrhelík, Roman

    2013-01-01

    Parents play an important role in determining the risk of children's drug use. The aim of this study was to analyse how certain family-related variables (permissiveness toward drug use, and parental control and affect) were linked to the use of alcohol, tobacco and cannabis, based on young people's self-report of such variables. The sample was composed of 1,428 school children (51.8% males) aged between 11 and 19 from Mallorca (Spain). We found that the young people who perceived their parents as permissive and those who perceived less maternal control and higher levels of both paternal and maternal affect were more likely to use alcohol, tobacco and cannabis. Sex differences were found within this pattern. Variables of maternal affect and control were not influential among males, whereas the general pattern was maintained among females. This study highlights the importance of perceived permissiveness and the need of considering parent's and children's gender when providing control and affect, as fathers will influence male children whereas mothers will influence female children.

  18. [Behavior of Orf virus in permissive and nonpermissive systems].

    Science.gov (United States)

    Büttner, M; Czerny, C P; Schumm, M

    1995-04-01

    Dogs were immunized i.m. with attenuated poxvirus vaccines (vaccinia virus, Orf-virus) and a bovine herpesvirus-1 (BHV-1) vaccine. After intradermal (i.d.) application of the vaccine viruses a specific delayed type hypersensitivity (DTH) reaction of the skin occurred only with vaccinia virus. The i.d. application of Orf-virus caused a short-term, non-specific inflammatory reaction of the skin, even in dogs not immunized with Orf-virus. Out of 30 sera from Orf-virus immunized beagles (n = 4) only eight were found reactive to Orf-virus in a competition ELISA. Three sera from dogs not Orf-virus immunized but skin-tested with the virus contained low antibody titers. Using indirect immunofluorescence (IIF) in flow cytometry, the existence of Orf-virus antigens was examined on the surface and in the cytoplasm of permissive (BFK and Vero)- and questionable permissive MDCK cells. The canine kidney MDCK cell line was found to be non-permissive for Orf-virus replication; the occurrence of an Orf-(ecthyma contagiosum) like disease in dogs is unlikely.

  19. Nonadiabatic transition path sampling

    International Nuclear Information System (INIS)

    Sherman, M. C.; Corcelli, S. A.

    2016-01-01

    Fewest-switches surface hopping (FSSH) is combined with transition path sampling (TPS) to produce a new method called nonadiabatic path sampling (NAPS). The NAPS method is validated on a model electron transfer system coupled to a Langevin bath. Numerically exact rate constants are computed using the reactive flux (RF) method over a broad range of solvent frictions that span from the energy diffusion (low friction) regime to the spatial diffusion (high friction) regime. The NAPS method is shown to quantitatively reproduce the RF benchmark rate constants over the full range of solvent friction. Integrating FSSH within the TPS framework expands the applicability of both approaches and creates a new method that will be helpful in determining detailed mechanisms for nonadiabatic reactions in the condensed-phase.

  20. PATHS groundwater hydrologic model

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.W.; Schur, J.A.

    1980-04-01

    A preliminary evaluation capability for two-dimensional groundwater pollution problems was developed as part of the Transport Modeling Task for the Waste Isolation Safety Assessment Program (WISAP). Our approach was to use the data limitations as a guide in setting the level of modeling detail. PATHS Groundwater Hydrologic Model is the first level (simplest) idealized hybrid analytical/numerical model for two-dimensional, saturated groundwater flow and single component transport; homogeneous geology. This document consists of the description of the PATHS groundwater hydrologic model. The preliminary evaluation capability prepared for WISAP, including the enhancements that were made because of the authors' experience using the earlier capability is described. Appendixes A through D supplement the report as follows: complete derivations of the background equations are provided in Appendix A. Appendix B is a comprehensive set of instructions for users of PATHS. It is written for users who have little or no experience with computers. Appendix C is for the programmer. It contains information on how input parameters are passed between programs in the system. It also contains program listings and test case listing. Appendix D is a definition of terms.

  1. On the reachability and observability of path and cycle graphs

    OpenAIRE

    Parlangeli, Gianfranco; Notarstefano, Giuseppe

    2011-01-01

    In this paper we investigate the reachability and observability properties of a network system, running a Laplacian based average consensus algorithm, when the communication graph is a path or a cycle. More in detail, we provide necessary and sufficient conditions, based on simple algebraic rules from number theory, to characterize all and only the nodes from which the network system is reachable (respectively observable). Interesting immediate corollaries of our results are: (i) a path graph...

  2. Shortest Paths and Vehicle Routing

    DEFF Research Database (Denmark)

    Petersen, Bjørn

    This thesis presents how to parallelize a shortest path labeling algorithm. It is shown how to handle Chvátal-Gomory rank-1 cuts in a column generation context. A Branch-and-Cut algorithm is given for the Elementary Shortest Paths Problem with Capacity Constraint. A reformulation of the Vehicle...... Routing Problem based on partial paths is presented. Finally, a practical application of finding shortest paths in the telecommunication industry is shown....

  3. ESTABLISHMENT OF THE PERMISSIBLE TRAIN SPEED ON THE CURVED TURNOUTS

    Directory of Open Access Journals (Sweden)

    O. M. Patlasov

    2016-04-01

    Full Text Available Purpose. Turnouts play a key role in the railway transportation process. One-sided and many-sided curved turnouts were railed over the last 20 years in difficult conditions (curved sections, yard necks. They have a number of geometric features, unlike the conventional one-sided turnouts. Today the normative documents prohibit laying such turnouts in curved track sections and only partially regulate the assessment procedure of their real condition. The question of establishment the permissible train speed within the curved turnouts is still open. In this regard, authors propose to set the train speed according to the driving comfort criterion using the results of field measurements of ordinates from the baseline for the particular curved turnout. Methodology. The article considers the criteria using which one can set the permissible speed on the turnouts. It defines the complexity of their application, advantages and disadvantages. Findings. The work analyzes the speed distribution along the length of the real curved turnout for the forward and lateral directions. It establishes the change rate values of unbalanced accelerations for the existing norms of the curved track sections maintenance according to the difference in the adjacent bend versine at speeds up to 160 km/h. Originality. A method for establishing the trains’ speed limit within the curved turnouts was developed. It takes into account the actual geometric position in the plan of forward and lateral turnout directions. This approach makes it possible to establish a barrier places in plan on the turnouts limiting the train speed. Practical value. The proposed method makes it possible to objectively assess and set the trains’ permissible speed on the basis of the ordinate measurement of the forward and lateral directions of the curved turnouts from the baseline using the driving comfort criteria. The method was tested using real turnouts, which are located within the Pridneprovsk

  4. Swedish or American heterosexual college youth: who is more permissive?

    Science.gov (United States)

    Weinberg, M S; Lottes, I L; Shaver, F M

    1995-08-01

    Theories of human sexuality have proposed that two factors reduce the double standard of sexuality and lead to a convergence of male and female sexual behavior: the degree of social benefits and amount of power women have in basic societal institutions and the extent to which a society accepts permissive sexual norms. As these factors increase, the strength of the double standard will decrease and the convergence between male and female behaviors will increase. Compared to the United States, Sweden has instituted more policies to promote gender equality and has been thought to accept more permissive premarital sexual attitudes. The focus of the research reported here is to examine country and gender differences in sexual attitudes and sexual behavior for a sample of university students in the United States (N = 407) and Sweden (N = 570). Results indicate that Swedish students endorsed more similar sexual standards for women and men and reported more accepting attitudes than did American students. For sexual behavior, American men reported the most sexual experience, Swedish men the least, with the women of both countries generally in the middle category. Notwithstanding this more permissive behavior on the part of American men, gender convergence with respect to sexual behavior is stronger in Sweden on several of the dimensions examined: age of first engaging in partner-related sexual activities for those who were sexually experienced, relationship with first partner, number of partners both in the last year and in their lifetime, and affective reactions to first coitus. Gender convergence, however, is weaker in Sweden than in the United States with respect to the incidence and frequency of various sexual activities and the degree of satisfaction with current sex life. Findings are discussed with respect to the questions they raise about the current theories that framed this research and the differential amount of sex education provided in the two countries.

  5. Parental feeding practices predict authoritative, authoritarian, and permissive parenting styles.

    Science.gov (United States)

    Hubbs-Tait, Laura; Kennedy, Tay Seacord; Page, Melanie C; Topham, Glade L; Harrist, Amanda W

    2008-07-01

    Our goal was to identify how parental feeding practices from the nutrition literature link to general parenting styles from the child development literature to understand how to target parenting practices to increase effectiveness of interventions. Stand-alone parental feeding practices could be targeted independently. However, parental feeding practices linked to parenting styles require interventions treating underlying family dynamics as a whole. To predict parenting styles from feeding practices and to test three hypotheses: restriction and pressure to eat are positively related whereas responsibility, monitoring, modeling, and encouraging are negatively related to an authoritarian parenting style; responsibility, monitoring, modeling, and encouraging are positively related whereas restriction and pressure to eat are negatively related to an authoritative parenting style; a permissive parenting style is negatively linked with all six feeding practices. Baseline data of a randomized-controlled intervention study. Two hundred thirty-nine parents (93.5% mothers) of first-grade children (134 boys, 105 girls) enrolled in rural public schools. Parental responses to encouraging and modeling questionnaires and the Child Feeding Questionnaire, as well as parenting styles measured by the Parenting Styles and Dimensions Questionnaire. Correlation and regression analyses. Feeding practices explained 21%, 15%, and 8% of the variance in authoritative, authoritarian, and permissive parenting, respectively. Restriction, pressure to eat, and monitoring (negative) significantly predicted an authoritarian style (Hypothesis 1); responsibility, restriction (negative), monitoring, and modeling predicted an authoritative style (Hypothesis 2); and modeling (negative) and restriction significantly predicted a permissive style (Hypothesis 3). Parental feeding practices with young children predict general parenting styles. Interventions that fail to address underlying parenting styles

  6. Rocket Flight Path

    Directory of Open Access Journals (Sweden)

    Jamie Waters

    2014-09-01

    Full Text Available This project uses Newton’s Second Law of Motion, Euler’s method, basic physics, and basic calculus to model the flight path of a rocket. From this, one can find the height and velocity at any point from launch to the maximum altitude, or apogee. This can then be compared to the actual values to see if the method of estimation is a plausible. The rocket used for this project is modeled after Bullistic-1 which was launched by the Society of Aeronautics and Rocketry at the University of South Florida.

  7. JAVA PathFinder

    Science.gov (United States)

    Mehhtz, Peter

    2005-01-01

    JPF is an explicit state software model checker for Java bytecode. Today, JPF is a swiss army knife for all sort of runtime based verification purposes. This basically means JPF is a Java virtual machine that executes your program not just once (like a normal VM), but theoretically in all possible ways, checking for property violations like deadlocks or unhandled exceptions along all potential execution paths. If it finds an error, JPF reports the whole execution that leads to it. Unlike a normal debugger, JPF keeps track of every step how it got to the defect.

  8. Hamiltonian path integrals

    International Nuclear Information System (INIS)

    Prokhorov, L.V.

    1982-01-01

    Problems related to consideration of operator nonpermutability in Hamiltonian path integral (HPI) are considered in the review. Integrals are investigated using trajectories in configuration space (nonrelativistic quantum mechanics). Problems related to trajectory integrals in HPI phase space are discussed: the problem of operator nonpermutability consideration (extra terms problem) and corresponding equivalence rules; ambiguity of HPI usual recording; transition to curvilinear coordinates. Problem of quantization of dynamical systems with couplings has been studied. As in the case of canonical transformations, quantization of the systems with couplings of the first kind requires the consideration of extra terms

  9. Path to Prosperity

    OpenAIRE

    Wolfowitz,Paul

    2006-01-01

    Paul Wolfowitz, President of the World Bank, discussed Singapore's remarkable progress along the road from poverty to prosperity which has also been discovered by many other countries in East Asia and around the world. He spoke of how each country must find its own path for people to pursue the same dreams of the chance to go to school, the security of a good job, and the ability to provide a better future for their children. Throughout the world, and importantly in the developing world, ther...

  10. Secure Path Selection under Random Fading

    Directory of Open Access Journals (Sweden)

    Furqan Jameel

    2017-05-01

    Full Text Available Application-oriented Wireless Sensor Networks (WSNs promises to be one of the most useful technologies of this century. However, secure communication between nodes in WSNs is still an unresolved issue. In this context, we propose two protocols (i.e. Optimal Secure Path (OSP and Sub-optimal Secure Path (SSP to minimize the outage probability of secrecy capacity in the presence of multiple eavesdroppers. We consider dissimilar fading at the main and wiretap link and provide detailed evaluation of the impact of Nakagami-m and Rician-K factors on the secrecy performance of WSNs. Extensive simulations are performed to validate our findings. Although the optimal scheme ensures more security, yet the sub-optimal scheme proves to be a more practical approach to secure wireless links.

  11. Larval diet affects mosquito development and permissiveness to Plasmodium infection.

    Science.gov (United States)

    Linenberg, Inbar; Christophides, George K; Gendrin, Mathilde

    2016-12-02

    The larval stages of malaria vector mosquitoes develop in water pools, feeding mostly on microorganisms and environmental detritus. Richness in the nutrient supply to larvae influences the development and metabolism of larvae and adults. Here, we investigated the effects of larval diet on the development, microbiota content and permissiveness to Plasmodium of Anopheles coluzzii. We tested three fish diets often used to rear mosquitoes in the laboratory, including two pelleted diets, Dr. Clarke's Pool Pellets and Nishikoi Fish Pellets, and one flaked diet, Tetramin Fish-Flakes. Larvae grow and develop faster and produce bigger adults when feeding on both types of pellets compared with flakes. This correlates with a higher microbiota load in pellet-fed larvae, in agreement with the known positive effect of the microbiota on mosquito development. Larval diet also significantly influences the prevalence and intensity of Plasmodium berghei infection in adults, whereby Nishikoi Fish Pellets-fed larvae develop into adults that are highly permissive to parasites and survive longer after infection. This correlates with a lower amount of Enterobacteriaceae in the midgut microbiota. Together, our results shed light on the influence of larval feeding on mosquito development, microbiota and vector competence; they also provide useful data for mosquito rearing.

  12. Procedures for permission of installation of nuclear power stations

    International Nuclear Information System (INIS)

    Narita, Yoriaki

    1980-01-01

    The locations of atomic power stations are first selected by electric power enterprises in consultation with the Ministry of International Trade and Industry or under the guidance of authorities concerned. The surveys of the climate, topography, water and plants in the planned sites and the influences of nuclear power generation to the surrounding areas are made by the enterprisers under the administrative guidance of the MITI. Secondly, the basic project shall be submitted to and decided by the Power Resource Development Council headed by the Prime Minister (Article 10, the Power Resource Development Law). The Council shall, if necessary, call for the attendance of the governors of prefectures concerned and hear their opinions (Article 11, the Law). As the third and most complicated phase, various procedures include; (a) permission of the changes of electrical facilities under the Electricity Enterprises Act; (b) authorization of the installation of reactors under the Nuclear Reactor Regulation Law; (c) permission or authorization under other regulations including the Agricultural Land Act, etc.; (d) additional procedures related to the indemnification to fishery and so forth. Finally the reactors are to be operated after receiving the certificates of the Minister of ITI on the inspections of construction works, nuclear fuel materials used for the reactors and welding processes of reactor containment vessels, boilers, turbines, etc. (Okada, K.)

  13. World nuclear energy paths

    International Nuclear Information System (INIS)

    Connolly, T.J.; Hansen, U.; Jaek, W.; Beckurts, K.H.

    1979-01-01

    In examing the world nuclear energy paths, the following assumptions were adopted: the world economy will grow somewhat more slowly than in the past, leading to reductions in electricity demand growth rates; national and international political impediments to the deployment of nuclear power will gradually disappear over the next few years; further development of nuclear power will proceed steadily, without serious interruption but with realistic lead times for the introduction of advanced technologies. Given these assumptions, this paper attempts a study of possible world nuclear energy developments, disaggregated on a regional and national basis. The scenario technique was used and a few alternative fuel-cycle scenarios were developed. Each is an internally consistent model of technically and economically feasible paths to the further development of nuclear power in an aggregate of individual countries and regions of the world. The main purpose of this modeling exercise was to gain some insight into the probable international locations of reactors and other nuclear facilities, the future requirements for uranium and for fuel-cycle services, and the problems of spent-fuel storage and waste management. The study also presents an assessment of the role that nuclear power might actually play in meeting future world energy demand

  14. Path Complexity in Virtual Water Maze Navigation: Differential Associations with Age, Sex, and Regional Brain Volume.

    Science.gov (United States)

    Daugherty, Ana M; Yuan, Peng; Dahle, Cheryl L; Bender, Andrew R; Yang, Yiqin; Raz, Naftali

    2015-09-01

    Studies of human navigation in virtual maze environments have consistently linked advanced age with greater distance traveled between the start and the goal and longer duration of the search. Observations of search path geometry suggest that routes taken by older adults may be unnecessarily complex and that excessive path complexity may be an indicator of cognitive difficulties experienced by older navigators. In a sample of healthy adults, we quantify search path complexity in a virtual Morris water maze with a novel method based on fractal dimensionality. In a two-level hierarchical linear model, we estimated improvement in navigation performance across trials by a decline in route length, shortening of search time, and reduction in fractal dimensionality of the path. While replicating commonly reported age and sex differences in time and distance indices, a reduction in fractal dimension of the path accounted for improvement across trials, independent of age or sex. The volumes of brain regions associated with the establishment of cognitive maps (parahippocampal gyrus and hippocampus) were related to path dimensionality, but not to the total distance and time. Thus, fractal dimensionality of a navigational path may present a useful complementary method of quantifying performance in navigation. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  15. Paths of Cultural Systems

    Directory of Open Access Journals (Sweden)

    Paul Ballonoff

    2017-12-01

    Full Text Available A theory of cultural structures predicts the objects observed by anthropologists. We here define those which use kinship relationships to define systems. A finite structure we call a partially defined quasigroup (or pdq, as stated by Definition 1 below on a dictionary (called a natural language allows prediction of certain anthropological descriptions, using homomorphisms of pdqs onto finite groups. A viable history (defined using pdqs states how an individual in a population following such history may perform culturally allowed associations, which allows a viable history to continue to survive. The vector states on sets of viable histories identify demographic observables on descent sequences. Paths of vector states on sets of viable histories may determine which histories can exist empirically.

  16. Propagators and path integrals

    Energy Technology Data Exchange (ETDEWEB)

    Holten, J.W. van

    1995-08-22

    Path-integral expressions for one-particle propagators in scalar and fermionic field theories are derived, for arbitrary mass. This establishes a direct connection between field theory and specific classical point-particle models. The role of world-line reparametrization invariance of the classical action and the implementation of the corresponding BRST-symmetry in the quantum theory are discussed. The presence of classical world-line supersymmetry is shown to lead to an unwanted doubling of states for massive spin-1/2 particles. The origin of this phenomenon is traced to a `hidden` topological fermionic excitation. A different formulation of the pseudo-classical mechanics using a bosonic representation of {gamma}{sub 5} is shown to remove these extra states at the expense of losing manifest supersymmetry. (orig.).

  17. innovation path exploration

    Directory of Open Access Journals (Sweden)

    Li Jian

    2016-01-01

    Full Text Available The world has entered the information age, all kinds of information technologies such as cloud technology, big data technology are in rapid development, and the “Internet plus” appeared. The main purpose of “Internet plus” is to provide an opportunity for the further development of the enterprise, the enterprise technology, business and other aspects of factors combine. For enterprises, grasp the “Internet plus” the impact of the market economy will undoubtedly pave the way for the future development of enterprises. This paper will be on the innovation path of the enterprise management “Internet plus” era tied you study, hope to be able to put forward some opinions and suggestions.

  18. Maximum permissible concentration (MPC) values for spontaneously fissioning radionuclides

    International Nuclear Information System (INIS)

    Ford, M.R.; Snyder, W.S.; Dillman, L.T.; Watson, S.B.

    1976-01-01

    The radiation hazards involved in handling certain of the transuranic nuclides that exhibit spontaneous fission as a mode of decay were reaccessed using recent advances in dosimetry and metabolic modeling. Maximum permissible concentration (MPC) values in air and water for occupational exposure (168 hr/week) were calculated for 244 Pu, 246 Cm, 248 Cm, 250 Cf, 252 Cf, 254 Cf, /sup 254m/Es, 255 Es, 254 Fm, and 256 Fm. The half-lives, branching ratios, and principal modes of decay of the parent-daughter members down to a member that makes a negligible contribution to the dose are given, and all daughters that make a significant contribution to the dose to body organs following inhalation or ingestion are included in the calculations. Dose commitments for body organs are also given

  19. Estimating permissible /sup 129/I-emission rates

    Energy Technology Data Exchange (ETDEWEB)

    Huebschmann, W G

    1976-06-01

    A mathematical method of iodine release limitation is presented which, in assessing the radiological effectiveness of /sup 129/I, takes advantage of the fact that the chemical behaviour of /sup 129/I resembles that of /sup 131/I and relies on the already extensive knowledge of the chemical and biological behaviour of /sup 131/I. If this method is used for calculating permissible /sup 129/I emission rates it is stated that no unnecessary restrictions need be imposed on a fuel reprocessing plant and that the grazing season for the pasture-cow-milk pathway can be taken into account. The concept is currently in use at the Karlsruhe Nuclear Research Center and seems to be appropriate for licensing of nuclear fuel reprocessing plants.

  20. Statistic method of research reactors maximum permissible power calculation

    International Nuclear Information System (INIS)

    Grosheva, N.A.; Kirsanov, G.A.; Konoplev, K.A.; Chmshkyan, D.V.

    1998-01-01

    The technique for calculating maximum permissible power of a research reactor at which the probability of the thermal-process accident does not exceed the specified value, is presented. The statistical method is used for the calculations. It is regarded that the determining function related to the reactor safety is the known function of the reactor power and many statistically independent values which list includes the reactor process parameters, geometrical characteristics of the reactor core and fuel elements, as well as random factors connected with the reactor specific features. Heat flux density or temperature is taken as a limiting factor. The program realization of the method discussed is briefly described. The results of calculating the PIK reactor margin coefficients for different probabilities of the thermal-process accident are considered as an example. It is shown that the probability of an accident with fuel element melting in hot zone is lower than 10 -8 1 per year for the reactor rated power [ru

  1. Study on the determination of permissible concentration in sea food

    International Nuclear Information System (INIS)

    Lee, C.M.; Lee, K.J.; Lee, W.K.

    2002-01-01

    Radioactive permissible concentration limit using the data which is suitable for Koreans is not established. In this paper, concentration limit is determined by using Korean food intake. Ministry of science of technology will adopt the new recommendation soon, so at this paper, dose limit of new value in ICRP 60 is used. Experts who have studied on this area worry about over-exposure by estimation of the case that intake contaminated a food by one radionuclide, therefore, complex intake limit is determined about all kinds of fishery products to solve this problem. Derived Food Concentration in single food divided by S(number of samples) and N(number of radionuclides) gives Complex intake limit (Derived Food Concentration in plural food). The value of N and S in this study is 3 and 12 respectively

  2. Can ‘Mobile Platform’ and ‘Permission Marketing’ dance a tango to the consumers' tune? Modeling adoption of ‘SMS based Permission Advertising’

    OpenAIRE

    Prerna Bamoriya

    2015-01-01

    Many a times situation of advertising clutter is further aggrieved by the markers’ intrusive practices i.e. not asking for consumer’s explicit permission. It results in consumers’ alienation and reduced advertising effectiveness. Solution could be integration of Permission Marketing with an innovative advertising platform like Mobile. This study aimed to develop and validate a comprehensive model for understanding consumers’ adoption behavior towards SMS Based Permission Advertising (SBPA). F...

  3. Path integral in Snyder space

    Energy Technology Data Exchange (ETDEWEB)

    Mignemi, S., E-mail: smignemi@unica.it [Dipartimento di Matematica e Informatica, Università di Cagliari, Viale Merello 92, 09123 Cagliari (Italy); INFN, Sezione di Cagliari, Cittadella Universitaria, 09042 Monserrato (Italy); Štrajn, R. [Dipartimento di Matematica e Informatica, Università di Cagliari, Viale Merello 92, 09123 Cagliari (Italy); INFN, Sezione di Cagliari, Cittadella Universitaria, 09042 Monserrato (Italy)

    2016-04-29

    The definition of path integrals in one- and two-dimensional Snyder space is discussed in detail both in the traditional setting and in the first-order formalism of Faddeev and Jackiw. - Highlights: • The definition of the path integral in Snyder space is discussed using phase space methods. • The same result is obtained in the first-order formalism of Faddeev and Jackiw. • The path integral formulation of the two-dimensional Snyder harmonic oscillator is outlined.

  4. Path integral in Snyder space

    International Nuclear Information System (INIS)

    Mignemi, S.; Štrajn, R.

    2016-01-01

    The definition of path integrals in one- and two-dimensional Snyder space is discussed in detail both in the traditional setting and in the first-order formalism of Faddeev and Jackiw. - Highlights: • The definition of the path integral in Snyder space is discussed using phase space methods. • The same result is obtained in the first-order formalism of Faddeev and Jackiw. • The path integral formulation of the two-dimensional Snyder harmonic oscillator is outlined.

  5. DICOM involving XML path-tag

    Science.gov (United States)

    Zeng, Qiang; Yao, Zhihong; Liu, Lei

    2011-03-01

    Digital Imaging and Communications in Medicine (DICOM) is a standard for handling, storing, printing, and transmitting information in medical imaging. XML (Extensible Markup Language) is a set of rules for encoding documents in machine-readable form which has become more and more popular. The combination of these two is very necessary and promising. Using XML tags instead of numeric labels in DICOM files will effectively increase the readability and enhance the clear hierarchical structure of DICOM files. However, due to the fact that the XML tags rely heavily on the orders of the tags, the strong data dependency has a lot of influence on the flexibility of inserting and exchanging data. In order to improve the extensibility and sharing of DICOM files, this paper introduces XML Path-Tag to DICOM. When a DICOM file is converted to XML format, adding simple Path-Tag into the DICOM file in place of complex tags will keep the flexibility of a DICOM file while inserting data elements and give full play to the advantages of the structure and readability of an XML file. Our method can solve the weak readability problem of DICOM files and the tedious work of inserting data into an XML file. In addition, we set up a conversion engine that can transform among traditional DICOM files, XML-DCM and XML-DCM files involving XML Path-Tag efficiently.

  6. Religiosity and Premarital Sexual Permissiveness: A Response to the Reiss-Heltsley and Broderick Debate

    Science.gov (United States)

    Ruppel, Howard J., Jr.

    1970-01-01

    When religiosity among college students was measured by Faulkner and DeJong's 5-D Scale of Religiosity" and the Reiss scale was used to measure permissiveness, the expected stronger relationship between religiosity and permissiveness in groups with traditions of low sexual permissiveness than in groups with traditions of high sexual…

  7. Discovering Euler Circuits and Paths through a Culturally Relevant Lesson

    Science.gov (United States)

    Robichaux, Rebecca R.; Rodrigue, Paulette R.

    2006-01-01

    This article describes a middle school discrete mathematics lesson that uses the context of catching crawfish to provide students with a hands-on experience related to Euler circuits and paths. The lesson promotes mathematical communication through the use of cooperative learning as well as connections between mathematics and the real world…

  8. 24 CFR 4.26 - Permissible and impermissible disclosures.

    Science.gov (United States)

    2010-04-01

    ... official audit, inquiry or investigation, if the disclosure is made to an auditor or investigator authorized by the HUD Inspector General to conduct the audit or investigation; (6) Legal activities... purpose of: (1) Communication of the applicant's failure to qualify, after a preliminary review for...

  9. Human T Lymphocytes Are Permissive for Dengue Virus Replication.

    Science.gov (United States)

    Silveira, Guilherme F; Wowk, Pryscilla F; Cataneo, Allan H D; Dos Santos, Paula F; Delgobo, Murilo; Stimamiglio, Marco A; Lo Sarzi, Maria; Thomazelli, Ana Paula F S; Conchon-Costa, Ivete; Pavanelli, Wander R; Antonelli, Lis R V; Báfica, André; Mansur, Daniel S; Dos Santos, Claudia N Duarte; Bordignon, Juliano

    2018-05-15

    Dengue virus (DV) infection can cause either a self-limiting flu-like disease or a threatening hemorrhage that may evolve to shock and death. A variety of cell types, such as dendritic cells, monocytes, and B cells, can be infected by DV. However, despite the role of T lymphocytes in the control of DV replication, there remains a paucity of information on possible DV-T cell interactions during the disease course. In the present study, we have demonstrated that primary human naive CD4 + and CD8 + T cells are permissive for DV infection. Importantly, both T cell subtypes support viral replication and secrete viable virus particles. DV infection triggers the activation of both CD4 + and CD8 + T lymphocytes, but preactivation of T cells reduces the susceptibility of T cells to DV infection. Interestingly, the cytotoxicity-inducing protein granzyme A is highly secreted by human CD4 + but not CD8 + T cells after exposure to DV in vitro Additionally, using annexin V and polycaspase assays, we have demonstrated that T lymphocytes, in contrast to monocytes, are resistant to DV-induced apoptosis. Strikingly, both CD4 + and CD8 + T cells were found to be infected with DV in acutely infected dengue patients. Together, these results show that T cells are permissive for DV infection in vitro and in vivo , suggesting that this cell population may be a viral reservoir during the acute phase of the disease. IMPORTANCE Infection by dengue virus (DV) causes a flu-like disease that can evolve to severe hemorrhaging and death. T lymphocytes are important cells that regulate antibody secretion by B cells and trigger the death of infected cells. However, little is known about the direct interaction between DV and T lymphocytes. Here, we show that T lymphocytes from healthy donors are susceptible to infection by DV, leading to cell activation. Additionally, T cells seem to be resistant to DV-induced apoptosis, suggesting a potential role as a viral reservoir in humans. Finally, we show

  10. Two Generations of Path Dependence

    DEFF Research Database (Denmark)

    Madsen, Mogens Ove

      Even if there is no fully articulated and generally accepted theory of Path Dependence it has eagerly been taken up across a wide range of social sciences - primarily coming from economics. Path Dependence is most of all a metaphor that offers reason to believe, that some political, social...

  11. Chromatic roots and hamiltonian paths

    DEFF Research Database (Denmark)

    Thomassen, Carsten

    2000-01-01

    We present a new connection between colorings and hamiltonian paths: If the chromatic polynomial of a graph has a noninteger root less than or equal to t(n) = 2/3 + 1/3 (3)root (26 + 6 root (33)) + 1/3 (3)root (26 - 6 root (33)) = 1.29559.... then the graph has no hamiltonian path. This result...

  12. On Hilbert space of paths

    International Nuclear Information System (INIS)

    Exner, P.; Kolerov, G.I.

    1980-01-01

    A Hilbert space of paths, the elements of which are determined by trigonometric series, was proposed and used recently by Truman. This space is shown to consist precisely of all absolutely continuous paths ending in the origin with square-integrable derivatives

  13. Hazards and maximum permissible doses of radiation for man

    International Nuclear Information System (INIS)

    Walinder, G.

    1977-11-01

    Maximum permissible dose levels are primarely based on risks for genetic damage and cancer. The reason for this is the observation that such late effects of radiation seem to arise even after doses that are to low to give rise to acute effects. In contrast to the tumour incidence found in irradiated human populations no genetic effects of radiation have been observed in man. This does not mean that genetic effects have not been induced but that it has been impossible to find an increase or to discern them among all the congenital defects, that can not be ascribed to the irradiation. As a consequence, the radiological risk estimation has been concentrated on the hazard of malignant diseases. Tumour risks are generally expressed as excess rates of incidence and mortality per million persons per rem. These figures are, however, not obtained from direct epidemiological observations but have been calculated from such data under the assumption of a linear relationship between effect and radiation dose. This formal extrapolation of observed data involves an uncertainty which, of course, is proportionately greater for the calculated effects in the millirem range. However, although the calculated tumour risks can not be said to be founded on direct scientific evidence, there are scientific reasons to believe that the figures derived from the formal extrapolations constitute an upper limit of possible ri02050

  14. Behavior of water gel permissibles in coal mines

    Energy Technology Data Exchange (ETDEWEB)

    Ribovich, J.; Watson, R.W.

    1979-01-01

    This paper presents an overview of the successful use of water gel permissibles, since their introduction in 1970, with an emphasis on some problems of behavior in their field application. One is the metal clip or ties used to seal the water gel package. Miners are occasionally hit by the 2.4 mm metal wire expelled from boreholes in normal shooting operations. Manufacturers have consequently reduced the mass of the metal ties by 25-50%, providing a partial solution. Another problem concerned two reported instances of misfired water gel burning after coal shooting operations. Extensive tests have offered no satisfactory solution as yet, except to point up a principal shortcoming of water gels: that of pressure desensitization. Two other factors affecting sensitivity, and possibly resulting in misfires, are low temperature and aging. There is a decline in air-gap sensitivity with prolonged storage but all approved water gels seem capable of meeting requirements for long periods under normal storage conditions. Low temperature tests indicate the majority of water gels become insensitive to a No. 6 EBC at temperatures easily attained in cold weather storage. An attempt was made to determine the minimum temperature at which a nitroglycerin-sensitized permisslbe could be initiated with a No. 8 cap; a particularly granular one was initiated as low as minus 196 C. (5 refs.) (In English)

  15. Hard paths, soft paths or no paths? Cross-cultural perceptions of water solutions

    Science.gov (United States)

    Wutich, A.; White, A. C.; White, D. D.; Larson, K. L.; Brewis, A.; Roberts, C.

    2014-01-01

    In this study, we examine how development status and water scarcity shape people's perceptions of "hard path" and "soft path" water solutions. Based on ethnographic research conducted in four semi-rural/peri-urban sites (in Bolivia, Fiji, New Zealand, and the US), we use content analysis to conduct statistical and thematic comparisons of interview data. Our results indicate clear differences associated with development status and, to a lesser extent, water scarcity. People in the two less developed sites were more likely to suggest hard path solutions, less likely to suggest soft path solutions, and more likely to see no path to solutions than people in the more developed sites. Thematically, people in the two less developed sites envisioned solutions that involve small-scale water infrastructure and decentralized, community-based solutions, while people in the more developed sites envisioned solutions that involve large-scale infrastructure and centralized, regulatory water solutions. People in the two water-scarce sites were less likely to suggest soft path solutions and more likely to see no path to solutions (but no more likely to suggest hard path solutions) than people in the water-rich sites. Thematically, people in the two water-rich sites seemed to perceive a wider array of unrealized potential soft path solutions than those in the water-scarce sites. On balance, our findings are encouraging in that they indicate that people are receptive to soft path solutions in a range of sites, even those with limited financial or water resources. Our research points to the need for more studies that investigate the social feasibility of soft path water solutions, particularly in sites with significant financial and natural resource constraints.

  16. Global Qualitative Flow-Path Modeling for Local State Determination in Simulation and Analysis

    Science.gov (United States)

    Malin, Jane T. (Inventor); Fleming, Land D. (Inventor)

    1998-01-01

    For qualitative modeling and analysis, a general qualitative abstraction of power transmission variables (flow and effort) for elements of flow paths includes information on resistance, net flow, permissible directions of flow, and qualitative potential is discussed. Each type of component model has flow-related variables and an associated internal flow map, connected into an overall flow network of the system. For storage devices, the implicit power transfer to the environment is represented by "virtual" circuits that include an environmental junction. A heterogeneous aggregation method simplifies the path structure. A method determines global flow-path changes during dynamic simulation and analysis, and identifies corresponding local flow state changes that are effects of global configuration changes. Flow-path determination is triggered by any change in a flow-related device variable in a simulation or analysis. Components (path elements) that may be affected are identified, and flow-related attributes favoring flow in the two possible directions are collected for each of them. Next, flow-related attributes are determined for each affected path element, based on possibly conflicting indications of flow direction. Spurious qualitative ambiguities are minimized by using relative magnitudes and permissible directions of flow, and by favoring flow sources over effort sources when comparing flow tendencies. The results are output to local flow states of affected components.

  17. Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection

    KAUST Repository

    Wang, Wei

    2014-10-07

    Android has been a major target of malicious applications (malapps). How to detect and keep the malapps out of the app markets is an ongoing challenge. One of the central design points of Android security mechanism is permission control that restricts the access of apps to core facilities of devices. However, it imparts a significant responsibility to the app developers with regard to accurately specifying the requested permissions and to the users with regard to fully understanding the risk of granting certain combinations of permissions. Android permissions requested by an app depict the app\\'s behavioral patterns. In order to help understanding Android permissions, in this paper, we explore the permission-induced risk in Android apps on three levels in a systematic manner. First, we thoroughly analyze the risk of an individual permission and the risk of a group of collaborative permissions. We employ three feature ranking methods, namely, mutual information, correlation coefficient, and T-test to rank Android individual permissions with respect to their risk. We then use sequential forward selection as well as principal component analysis to identify risky permission subsets. Second, we evaluate the usefulness of risky permissions for malapp detection with support vector machine, decision trees, as well as random forest. Third, we in depth analyze the detection results and discuss the feasibility as well as the limitations of malapp detection based on permission requests. We evaluate our methods on a very large official app set consisting of 310 926 benign apps and 4868 real-world malapps and on a third-party app sets. The empirical results show that our malapp detectors built on risky permissions give satisfied performance (a detection rate as 94.62% with a false positive rate as 0.6%), catch the malapps\\' essential patterns on violating permission access regulations, and are universally applicable to unknown malapps (detection rate as 74.03%).

  18. Recombinant pestivirus E2 glycoproteins prevent viral attachment to permissive and non permissive cells with different efficiency.

    Science.gov (United States)

    Asfor, A S; Wakeley, P R; Drew, T W; Paton, D J

    2014-08-30

    Bovine viral diarrhoea virus (BVDV) is an economically important animal pathogen, which like other pestiviruses has similar molecular biological features to hepaciviruses, including human Hepatitis C virus. The pestivirus E2 glycoproteins are the major target for virus-neutralising antibodies, as well as playing a role in receptor binding and host range restriction. In this study, recombinant E2 glycoproteins (rE2) derived from three different pestivirus species were examined for their inhibitory effects on pestivirus infectivity in cell culture. Histidine-tagged rE2 glycoproteins of BVDV type 2 strain 178003, BVDV type 1 strain Oregon C24V and CSFV strain Alfort 187 were produced in Spodoptera frugiperda insect cells and purified under native conditions. The ability of rE2 glycoprotein to inhibit the infection of permissive cells by both homologous and heterologous virus was compared, revealing that the inhibitory effects of rE2 glycoproteins correlated with the predicted similarity of the E2 structures in the recombinant protein and the test virus. This result suggests that the sequence and structure of E2 are likely to be involved in the host specificity of pestiviruses at their point of uptake into cells. Copyright © 2014 Elsevier B.V. All rights reserved.

  19. Optimal Paths in Gliding Flight

    Science.gov (United States)

    Wolek, Artur

    Underwater gliders are robust and long endurance ocean sampling platforms that are increasingly being deployed in coastal regions. This new environment is characterized by shallow waters and significant currents that can challenge the mobility of these efficient (but traditionally slow moving) vehicles. This dissertation aims to improve the performance of shallow water underwater gliders through path planning. The path planning problem is formulated for a dynamic particle (or "kinematic car") model. The objective is to identify the path which satisfies specified boundary conditions and minimizes a particular cost. Several cost functions are considered. The problem is addressed using optimal control theory. The length scales of interest for path planning are within a few turn radii. First, an approach is developed for planning minimum-time paths, for a fixed speed glider, that are sub-optimal but are guaranteed to be feasible in the presence of unknown time-varying currents. Next the minimum-time problem for a glider with speed controls, that may vary between the stall speed and the maximum speed, is solved. Last, optimal paths that minimize change in depth (equivalently, maximize range) are investigated. Recognizing that path planning alone cannot overcome all of the challenges associated with significant currents and shallow waters, the design of a novel underwater glider with improved capabilities is explored. A glider with a pneumatic buoyancy engine (allowing large, rapid buoyancy changes) and a cylindrical moving mass mechanism (generating large pitch and roll moments) is designed, manufactured, and tested to demonstrate potential improvements in speed and maneuverability.

  20. Lutzomyia migonei is a permissive vector competent for Leishmania infantum.

    Science.gov (United States)

    Guimarães, Vanessa Cristina Fitipaldi Veloso; Pruzinova, Katerina; Sadlova, Jovana; Volfova, Vera; Myskova, Jitka; Filho, Sinval Pinto Brandão; Volf, Petr

    2016-03-17

    Leishmania infantum is the most widespread etiological agent of visceral leishmaniasis (VL) in the world, with significant mortality rates in human cases. In Latin America, this parasite is primarily transmitted by Lutzomyia longipalpis, but the role of Lutzomyia migonei as a potential vector for this protozoan has been discussed. Laboratory and field investigations have contributed to this hypothesis; however, proof of the vector competence of L. migonei has not yet been provided. In this study, we evaluate for the first time the susceptibility of L. migonei to L. infantum. Females of laboratory-reared L. migonei were fed through a chick-skin membrane on rabbit blood containing L. infantum promastigotes, dissected at 1, 5 and 8 days post-infection (PI) and checked microscopically for the presence, intensity and localisation of Leishmania infections. In addition, morphometric analysis of L. infantum promastigotes was performed. High infection rates of both L. infantum strains tested were observed in L. migonei, with colonisation of the stomodeal valve already on day 5 PI. At the late-stage infection, most L. migonei females had their cardia and stomodeal valve colonised by high numbers of parasites, and no significant differences were found compared to the development in L. longipalpis. Metacyclic forms were found in all parasite-vector combinations since day 5 PI. We propose that Lutzomyia migonei belongs to sand fly species permissive to various Leishmania spp. Here we demonstrate that L. migonei is highly susceptible to the development of L. infantum. This, together with its known anthropophily, abundance in VL foci and natural infection by L. infantum, constitute important evidence that L. migonei is another vector of this parasite in Latin America.

  1. Perfect discretization of path integrals

    International Nuclear Information System (INIS)

    Steinhaus, Sebastian

    2012-01-01

    In order to obtain a well-defined path integral one often employs discretizations. In the case of General Relativity these generically break diffeomorphism symmetry, which has severe consequences since these symmetries determine the dynamics of the corresponding system. In this article we consider the path integral of reparametrization invariant systems as a toy example and present an improvement procedure for the discretized propagator. Fixed points and convergence of the procedure are discussed. Furthermore we show that a reparametrization invariant path integral implies discretization independence and acts as a projector onto physical states.

  2. Perfect discretization of path integrals

    Science.gov (United States)

    Steinhaus, Sebastian

    2012-05-01

    In order to obtain a well-defined path integral one often employs discretizations. In the case of General Relativity these generically break diffeomorphism symmetry, which has severe consequences since these symmetries determine the dynamics of the corresponding system. In this article we consider the path integral of reparametrization invariant systems as a toy example and present an improvement procedure for the discretized propagator. Fixed points and convergence of the procedure are discussed. Furthermore we show that a reparametrization invariant path integral implies discretization independence and acts as a projector onto physical states.

  3. Permissivity of the NCI-60 cancer cell lines to oncolytic Vaccinia Virus GLV-1h68

    International Nuclear Information System (INIS)

    Ascierto, Maria Libera; Bedognetti, Davide; Uccellini, Lorenzo; Rossano, Fabio; Ascierto, Paolo A; Stroncek, David F; Restifo, Nicholas P; Wang, Ena; Szalay, Aladar A; Marincola, Francesco M; Worschech, Andrea; Yu, Zhiya; Adams, Sharon; Reinboth, Jennifer; Chen, Nanhai G; Pos, Zoltan; Roychoudhuri, Rahul; Di Pasquale, Giovanni

    2011-01-01

    Oncolytic viral therapy represents an alternative therapeutic strategy for the treatment of cancer. We previously described GLV-1h68, a modified Vaccinia Virus with exclusive tropism for tumor cells, and we observed a cell line-specific relationship between the ability of GLV-1h68 to replicate in vitro and its ability to colonize and eliminate tumor in vivo. In the current study we surveyed the in vitro permissivity to GLV-1h68 replication of the NCI-60 panel of cell lines. Selected cell lines were also tested for permissivity to another Vaccinia Virus and a vesicular stomatitis virus (VSV) strain. In order to identify correlates of permissity to viral infection, we measured transcriptional profiles of the cell lines prior infection. We observed highly heterogeneous permissivity to VACV infection amongst the cell lines. The heterogeneity of permissivity was independent of tissue with the exception of B cell derivation. Cell lines were also tested for permissivity to another Vaccinia Virus and a vesicular stomatitis virus (VSV) strain and a significant correlation was found suggesting a common permissive phenotype. While no clear transcriptional pattern could be identified as predictor of permissivity to infection, some associations were observed suggesting multifactorial basis permissivity to viral infection. Our findings have implications for the design of oncolytic therapies for cancer and offer insights into the nature of permissivity of tumor cells to viral infection

  4. An Introduction to Path Analysis

    Science.gov (United States)

    Wolfe, Lee M.

    1977-01-01

    The analytical procedure of path analysis is described in terms of its use in nonexperimental settings in the social sciences. The description assumes a moderate statistical background on the part of the reader. (JKS)

  5. Probabilistic simulation of fermion paths

    International Nuclear Information System (INIS)

    Zhirov, O.V.

    1989-01-01

    Permutation symmetry of fermion path integral allows (while spin degrees of freedom are ignored) to use in its simulation any probabilistic algorithm, like Metropolis one, heat bath, etc. 6 refs., 2 tabs

  6. Performance evaluation of CPPM modulation in multi-path environments

    International Nuclear Information System (INIS)

    Tasev, Zarko; Kocarev, Ljupco

    2003-01-01

    Chaotic pulse position modulation (CPPM) is a novel technique to communicate with chaotic signals based upon pulse trains in which the intervals between two pulses are determined by chaotic dynamics of a pulse generator. Using numerical simulations we show that CPPM offers excellent multi-path performance. We simulated the CPPM radio system, which is designed for a WLAN application and operates in the 2.4 GHz ISM frequency band with IEEE 802.11 compliant channel spacing. In this case, the average performance loss due the multi-path for CPPM is less than 5 dB

  7. Performance evaluation of CPPM modulation in multi-path environments

    Energy Technology Data Exchange (ETDEWEB)

    Tasev, Zarko E-mail: ztasev@ucsd.edu; Kocarev, Ljupco E-mail: lkocarev@ucsd.edu

    2003-01-01

    Chaotic pulse position modulation (CPPM) is a novel technique to communicate with chaotic signals based upon pulse trains in which the intervals between two pulses are determined by chaotic dynamics of a pulse generator. Using numerical simulations we show that CPPM offers excellent multi-path performance. We simulated the CPPM radio system, which is designed for a WLAN application and operates in the 2.4 GHz ISM frequency band with IEEE 802.11 compliant channel spacing. In this case, the average performance loss due the multi-path for CPPM is less than 5 dB.

  8. Formal language constrained path problems

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C.; Jacob, R.; Marathe, M.

    1997-07-08

    In many path finding problems arising in practice, certain patterns of edge/vertex labels in the labeled graph being traversed are allowed/preferred, while others are disallowed. Motivated by such applications as intermodal transportation planning, the authors investigate the complexity of finding feasible paths in a labeled network, where the mode choice for each traveler is specified by a formal language. The main contributions of this paper include the following: (1) the authors show that the problem of finding a shortest path between a source and destination for a traveler whose mode choice is specified as a context free language is solvable efficiently in polynomial time, when the mode choice is specified as a regular language they provide algorithms with improved space and time bounds; (2) in contrast, they show that the problem of finding simple paths between a source and a given destination is NP-hard, even when restricted to very simple regular expressions and/or very simple graphs; (3) for the class of treewidth bounded graphs, they show that (i) the problem of finding a regular language constrained simple path between source and a destination is solvable in polynomial time and (ii) the extension to finding context free language constrained simple paths is NP-complete. Several extensions of these results are presented in the context of finding shortest paths with additional constraints. These results significantly extend the results in [MW95]. As a corollary of the results, they obtain a polynomial time algorithm for the BEST k-SIMILAR PATH problem studied in [SJB97]. The previous best algorithm was given by [SJB97] and takes exponential time in the worst case.

  9. Perfect discretization of path integrals

    OpenAIRE

    Steinhaus, Sebastian

    2011-01-01

    In order to obtain a well-defined path integral one often employs discretizations. In the case of General Relativity these generically break diffeomorphism symmetry, which has severe consequences since these symmetries determine the dynamics of the corresponding system. In this article we consider the path integral of reparametrization invariant systems as a toy example and present an improvement procedure for the discretized propagator. Fixed points and convergence of the procedure are discu...

  10. Aircraft path planning for optimal imaging using dynamic cost functions

    Science.gov (United States)

    Christie, Gordon; Chaudhry, Haseeb; Kochersberger, Kevin

    2015-05-01

    Unmanned aircraft development has accelerated with recent technological improvements in sensing and communications, which has resulted in an "applications lag" for how these aircraft can best be utilized. The aircraft are becoming smaller, more maneuverable and have longer endurance to perform sensing and sampling missions, but operating them aggressively to exploit these capabilities has not been a primary focus in unmanned systems development. This paper addresses a means of aerial vehicle path planning to provide a realistic optimal path in acquiring imagery for structure from motion (SfM) reconstructions and performing radiation surveys. This method will allow SfM reconstructions to occur accurately and with minimal flight time so that the reconstructions can be executed efficiently. An assumption is made that we have 3D point cloud data available prior to the flight. A discrete set of scan lines are proposed for the given area that are scored based on visibility of the scene. Our approach finds a time-efficient path and calculates trajectories between scan lines and over obstacles encountered along those scan lines. Aircraft dynamics are incorporated into the path planning algorithm as dynamic cost functions to create optimal imaging paths in minimum time. Simulations of the path planning algorithm are shown for an urban environment. We also present our approach for image-based terrain mapping, which is able to efficiently perform a 3D reconstruction of a large area without the use of GPS data.

  11. Path integration in conical space

    International Nuclear Information System (INIS)

    Inomata, Akira; Junker, Georg

    2012-01-01

    Quantum mechanics in conical space is studied by the path integral method. It is shown that the curvature effect gives rise to an effective potential in the radial path integral. It is further shown that the radial path integral in conical space can be reduced to a form identical with that in flat space when the discrete angular momentum of each partial wave is replaced by a specific non-integral angular momentum. The effective potential is found proportional to the squared mean curvature of the conical surface embedded in Euclidean space. The path integral calculation is compatible with the Schrödinger equation modified with the Gaussian and the mean curvature. -- Highlights: ► We study quantum mechanics on a cone by the path integral approach. ► The path integral depends only on the metric and the curvature effect is built in. ► The approach is consistent with the Schrödinger equation modified by an effective potential. ► The effective potential is found to be of the “Jensen–Koppe” and “da Costa” type.

  12. Path integrals on curved manifolds

    International Nuclear Information System (INIS)

    Grosche, C.; Steiner, F.

    1987-01-01

    A general framework for treating path integrals on curved manifolds is presented. We also show how to perform general coordinate and space-time transformations in path integrals. The main result is that one has to subtract a quantum correction ΔV ∝ ℎ 2 from the classical Lagrangian L, i.e. the correct effective Lagrangian to be used in the path integral is L eff = L-ΔV. A general prescription for calculating the quantum correction ΔV is given. It is based on a canonical approach using Weyl-ordering and the Hamiltonian path integral defined by the midpoint prescription. The general framework is illustrated by several examples: The d-dimensional rotator, i.e. the motion on the sphere S d-1 , the path integral in d-dimensional polar coordinates, the exact treatment of the hydrogen atom in R 2 and R 3 by performing a Kustaanheimo-Stiefel transformation, the Langer transformation and the path integral for the Morse potential. (orig.)

  13. Path-based Queries on Trajectory Data

    DEFF Research Database (Denmark)

    Krogh, Benjamin Bjerre; Pelekis, Nikos; Theodoridis, Yannis

    2014-01-01

    In traffic research, management, and planning a number of path-based analyses are heavily used, e.g., for computing turn-times, evaluating green waves, or studying traffic flow. These analyses require retrieving the trajectories that follow the full path being analyzed. Existing path queries cannot...... sufficiently support such path-based analyses because they retrieve all trajectories that touch any edge in the path. In this paper, we define and formalize the strict path query. This is a novel query type tailored to support path-based analysis, where trajectories must follow all edges in the path...... a specific path by only retrieving data from the first and last edge in the path. To correctly answer strict path queries existing network-constrained trajectory indexes must retrieve data from all edges in the path. An extensive performance study of NETTRA using a very large real-world trajectory data set...

  14. Permission-based Leadership and Change Management in Hong Kong's Nongovernment Organisations

    Directory of Open Access Journals (Sweden)

    Wong Michael

    2014-12-01

    Full Text Available This study addresses the management of transformational change by chief executives in nongovernment organisations (NGOs in Hong Kong. The study takes an exploratory approach with interviews of 18 chief executives from a cross section of Hong Kong's NGOs. The findings indicate that organisational transformation is driven by increasing competition within the NGO sector and from commercial firms, by a demand for greater transparency and by internal forces. These factors are countered by structural inertia. Leadership of the organisational transformation of an NGO is permission-based; agreement from the various stakeholders must be gained to execute a successful transformation. The chief executive should have a humanistic style and be visionary, ethical and participative. Constant communication and involvement facilitate this process. Through this approach, followers will have a greater commitment to the organisational transformation. Organisational change is a combination of planned and emergent processes. The chief executive should relax control and foster a nurturing environment for transformation. This research suggests a leadership style, behavioural approach and model for managing change that will provide chief executives and senior leaders with useful considerations and insights.

  15. An Ethics of Permission: A Response to the California End of Life Option Act.

    Science.gov (United States)

    Nelson, Craig

    2016-01-01

    An ethics of permission can be helpful in framing a response to the ethical differences surrounding the California End of Life Option Act. Law does not define morality, and reaching a moral understanding demands thorough reflection. An ethics of permission examines the ethical demands of a permissive law for both clinician and patient. Serving the good of the patient, respecting professional conscience, and following the law are three ethical elements. Although developing an ethics of permission includes these three elements, these elements do not exhaust all the moral implications involved. An ethics of permission also includes the importance of exercising professional tolerance in the honoring of clinicians who choose to participate or refuse to participate. In addition, an ethics of permission also provides insight in implementing just and fair behavior among medical professionals.

  16. FindPath: a Matlab solution for in silico design of synthetic metabolic pathways.

    Science.gov (United States)

    Vieira, Gilles; Carnicer, Marc; Portais, Jean-Charles; Heux, Stéphanie

    2014-10-15

    Several methods and computational tools have been developed to design novel metabolic pathways. A major challenge is evaluating the metabolic efficiency of the designed pathways in the host organism. Here we present FindPath, a unified system to predict and rank possible pathways according to their metabolic efficiency in the cellular system. This tool uses a chemical reaction database to generate possible metabolic pathways and exploits constraint-based models (CBMs) to identify the most efficient synthetic pathway to achieve the desired metabolic function in a given host microorganism. FindPath can be used with common tools for CBM manipulation and uses the standard SBML format for both input and output files. http://metasys.insa-toulouse.fr/software/findpath/. heux@insa-toulouse.fr Supplementary data are available at Bioinformatics online. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  17. Path integration on hyperbolic spaces

    Energy Technology Data Exchange (ETDEWEB)

    Grosche, C [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    1991-11-01

    Quantum mechanics on the hyperbolic spaces of rank one is discussed by path integration technique. Hyperbolic spaces are multi-dimensional generalisation of the hyperbolic plane, i.e. the Poincare upper half-plane endowed with a hyperbolic geometry. We evalute the path integral on S{sub 1} {approx equal} SO (n,1)/SO(n) and S{sub 2} {approx equal} SU(n,1)/S(U(1) x U(n)) in a particular coordinate system, yielding explicitly the wave-functions and the energy spectrum. Futhermore we can exploit a general property of all these spaces, namely that they can be parametrized by a pseudopolar coordinate system. This allows a separation in path integration over spheres and an additional path integration over the remaining hyperbolic coordinate, yielding effectively a path integral for a modified Poeschl-Teller potential. Only continuous spectra can exist in all the cases. For all the hyperbolic spaces of rank one we find a general formula for the largest lower bound (zero-point energy) of the spectrum which is given by E{sub O} = h{sup 2} /8m(m{sub {alpha}} +2m{sub 2} {alpha}){sup 2} (m {alpha} and m{sub 2}{alpha} denote the dimension of the root subspace corresponding to the roots {alpha} and 2{alpha}, respectively). I also discuss the case, where a constant magnetic field on H{sup n} is incorporated. (orig.).

  18. Path integration on hyperbolic spaces

    International Nuclear Information System (INIS)

    Grosche, C.

    1991-11-01

    Quantum mechanics on the hyperbolic spaces of rank one is discussed by path integration technique. Hyperbolic spaces are multi-dimensional generalisation of the hyperbolic plane, i.e. the Poincare upper half-plane endowed with a hyperbolic geometry. We evalute the path integral on S 1 ≅ SO (n,1)/SO(n) and S 2 ≅ SU(n,1)/S[U(1) x U(n)] in a particular coordinate system, yielding explicitly the wave-functions and the energy spectrum. Futhermore we can exploit a general property of all these spaces, namely that they can be parametrized by a pseudopolar coordinate system. This allows a separation in path integration over spheres and an additional path integration over the remaining hyperbolic coordinate, yielding effectively a path integral for a modified Poeschl-Teller potential. Only continuous spectra can exist in all the cases. For all the hyperbolic spaces of rank one we find a general formula for the largest lower bound (zero-point energy) of the spectrum which is given by E O = h 2 /8m(m α +2m 2 α) 2 (m α and m 2 α denote the dimension of the root subspace corresponding to the roots α and 2α, respectively). I also discuss the case, where a constant magnetic field on H n is incorporated. (orig.)

  19. Constraint-Based Local Search for Constrained Optimum Paths Problems

    Science.gov (United States)

    Pham, Quang Dung; Deville, Yves; van Hentenryck, Pascal

    Constrained Optimum Path (COP) problems arise in many real-life applications and are ubiquitous in communication networks. They have been traditionally approached by dedicated algorithms, which are often hard to extend with side constraints and to apply widely. This paper proposes a constraint-based local search (CBLS) framework for COP applications, bringing the compositionality, reuse, and extensibility at the core of CBLS and CP systems. The modeling contribution is the ability to express compositional models for various COP applications at a high level of abstraction, while cleanly separating the model and the search procedure. The main technical contribution is a connected neighborhood based on rooted spanning trees to find high-quality solutions to COP problems. The framework, implemented in COMET, is applied to Resource Constrained Shortest Path (RCSP) problems (with and without side constraints) and to the edge-disjoint paths problem (EDP). Computational results show the potential significance of the approach.

  20. Communication without communication

    Directory of Open Access Journals (Sweden)

    Bratina Boris R.

    2017-01-01

    Full Text Available This paper analyses the necessary conditions for successful communication. It is well known that post-modernity, described as an era of control, produces only decentralized, imploded subjectivities, who are neither able to question their own being nor to relate one with another in authentic bonds of communication. Today, virtual communication has become an ultimate model of every possible communication whatsoever. The authors, therefore, pose the question of conditions for possibility of subjectivities who would be able and apt for authentic communication, wherein faith, fidelity, truth, and capability of keeping one's word occupy the central place.

  1. Path generation algorithm for UML graphic modeling of aerospace test software

    Science.gov (United States)

    Qu, MingCheng; Wu, XiangHu; Tao, YongChao; Chen, Chao

    2018-03-01

    Aerospace traditional software testing engineers are based on their own work experience and communication with software development personnel to complete the description of the test software, manual writing test cases, time-consuming, inefficient, loopholes and more. Using the high reliability MBT tools developed by our company, the one-time modeling can automatically generate test case documents, which is efficient and accurate. UML model to describe the process accurately express the need to rely on the path is reached, the existing path generation algorithm are too simple, cannot be combined into a path and branch path with loop, or too cumbersome, too complicated arrangement generates a path is meaningless, for aerospace software testing is superfluous, I rely on our experience of ten load space, tailor developed a description of aerospace software UML graphics path generation algorithm.

  2. Improving Patient Safety: Improving Communication.

    Science.gov (United States)

    Bittner-Fagan, Heather; Davis, Joshua; Savoy, Margot

    2017-12-01

    Communication among physicians, staff, and patients is a critical element in patient safety. Effective communication skills can be taught and improved through training and awareness. The practice of family medicine allows for long-term relationships with patients, which affords opportunities for ongoing, high-quality communication. There are many barriers to effective communication, including patient factors, clinician factors, and system factors, but tools and strategies exist to address these barriers, improve communication, and engage patients in their care. Use of universal precautions for health literacy, appropriate medical interpreters, and shared decision-making are evidence-based tools that improve communication and increase patient safety. Written permission from the American Academy of Family Physicians is required for reproduction of this material in whole or in part in any form or medium.

  3. Path Integrals in Quantum Mechanics

    International Nuclear Information System (INIS)

    Louko, J

    2005-01-01

    Jean Zinn-Justin's textbook Path Integrals in Quantum Mechanics aims to familiarize the reader with the path integral as a calculational tool in quantum mechanics and field theory. The emphasis is on quantum statistical mechanics, starting with the partition function Tr exp(-β H) and proceeding through the diffusion equation to barrier penetration problems and their semiclassical limit. The 'real time' path integral is defined via analytic continuation and used for the path-integral representation of the nonrelativistic S-matrix and its perturbative expansion. Holomorphic and Grassmannian path integrals are introduced and applied to nonrelativistic quantum field theory. There is also a brief discussion of path integrals in phase space. The introduction includes a brief historical review of path integrals, supported by a bibliography with some 40 entries. As emphasized in the introduction, mathematical rigour is not a central issue in the book. This allows the text to present the calculational techniques in a very readable manner: much of the text consists of worked-out examples, such as the quartic anharmonic oscillator in the barrier penetration chapter. At the end of each chapter there are exercises, some of which are of elementary coursework type, but the majority are more in the style of extended examples. Most of the exercises indeed include the solution or a sketch thereof. The book assumes minimal previous knowledge of quantum mechanics, and some basic quantum mechanical notation is collected in an appendix. The material has a large overlap with selected chapters in the author's thousand-page textbook Quantum Field Theory and Critical Phenomena (2002 Oxford: Clarendon). The stand-alone scope of the present work has, however, allowed a more focussed organization of this material, especially in the chapters on, respectively, holomorphic and Grassmannian path integrals. In my view the book accomplishes its aim admirably and is eminently usable as a textbook

  4. From path integrals to anyons

    International Nuclear Information System (INIS)

    Canright, G.S.

    1992-01-01

    I offer a pedagogical review of the homotopy arguments for fractional statistics in two dimensions. These arguments arise naturally in path-integral language since they necessarily consider the properties of paths rather than simply permutations. The braid group replaces the permutation group as the basic structure for quantum statistics; hence properties of the braid group on several surfaces are briefly discussed. Finally, the question of multiple (real-space) occupancy is addressed; I suggest that the ''traditional'' treatment of this question (ie, an assumption that many-anyon wavefunctions necessarily vanish for multiple occupancy) needs reexamination

  5. 29 CFR 3.6 - Payroll deductions permissible with the approval of the Secretary of Labor.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Payroll deductions permissible with the approval of the Secretary of Labor. 3.6 Section 3.6 Labor Office of the Secretary of Labor CONTRACTORS AND SUBCONTRACTORS ON....6 Payroll deductions permissible with the approval of the Secretary of Labor. Any contractor or...

  6. 47 CFR 74.790 - Permissible service of digital TV translator and LPTV stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Permissible service of digital TV translator... DISTRIBUTIONAL SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.790 Permissible service of digital TV translator and LPTV stations. (a) Digital TV translator stations provide a means whereby the...

  7. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions

    DEFF Research Database (Denmark)

    Andersen, Mads Schaarup; Liu, Bin; Schaub, Florian

    2016-01-01

    Modern smartphone platforms have millions of apps, many of which request permissions to access private data and resources, like user accounts or location. While these smartphone platforms provide varying degrees of control over these permissions, the sheer number of decisions that users are expec...

  8. Axiomatizations of Banzhaf Permisson Values for Games with a Hierarchical Permission Structure.

    NARCIS (Netherlands)

    van den Brink, J.R.

    2010-01-01

    In games with a permission structure it is assumed that players in a cooperative transferable utility game are hierarchically ordered in the sense that there are players that need permission from other players before they are allowed to cooperate. We provide axiomatic characterizations of Banzhaf

  9. Permissive Parenting and Mental Health in College Students: Mediating Effects of Academic Entitlement

    Science.gov (United States)

    Barton, Alison L.; Hirsch, Jameson K.

    2016-01-01

    Objective: Student mental health may suffer due to unreasonable expectations associated with academic entitlement; permissive parenting may be one source of these expectations. The authors examined the role of academic entitlement as a mediator of the relationship between permissive parenting and psychological functioning. Participants:…

  10. 36 CFR 223.12 - Permission to cut, damage, or destroy trees without advertisement.

    Science.gov (United States)

    2010-07-01

    ... destroy trees without advertisement. 223.12 Section 223.12 Parks, Forests, and Public Property FOREST... § 223.12 Permission to cut, damage, or destroy trees without advertisement. Permission may be granted to cut, damage, or destroy trees, portions of trees, or other forest products on National Forest System...

  11. 20 CFR 416.1321 - Suspension for not giving us permission to contact financial institutions.

    Science.gov (United States)

    2010-04-01

    ... contact financial institutions. 416.1321 Section 416.1321 Employees' Benefits SOCIAL SECURITY....1321 Suspension for not giving us permission to contact financial institutions. (a) If you don't give us permission to contact any financial institution and request any financial records about you when...

  12. Isomorphisms and traversability of directed path graphs

    NARCIS (Netherlands)

    Broersma, Haitze J.; Li, Xueliang; Li, X.

    1998-01-01

    The concept of a line digraph is generalized to that of a directed path graph. The directed path graph $\\forw P_k(D)$ of a digraph $D$ is obtained by representing the directed paths on $k$ vertices of $D$ by vertices. Two vertices are joined by an arc whenever the corresponding directed paths in $D$

  13. Critical Path Driven Cosynthesis for Heterogeneous Target Architectures

    DEFF Research Database (Denmark)

    Bjørn-Jørgensen, Peter; Madsen, Jan

    1997-01-01

    This paper presents a critical path driven algorithm to produce a static schedule of a single-rate system onto a heterogeneous target architecture. Our algorithm is a list based scheduling algorithm which concurrently assigns tasks to processors and allocates nets to interprocessor communication........ Experimental results show that our algorithm is able to find good results, as compared to other methods, in small amount of CPU time....

  14. Land-mobile satellite excess path loss measurements

    Science.gov (United States)

    Hess, G. C.

    1980-05-01

    An experiment conducted with the ATS-6 satellite to determine the additional path loss over free-space loss experienced by land-mobile communication links is described. This excess path loss is measured as a function of 1) local environment, 2) vehicle heading, 3) link frequency, 4) satellite elevation angle, and 5) street side. A statistical description of excess loss developed from the data shows that the first two parameters dominate. Excess path loss on the order of 25 dB is typical in urban situations, but decreases to under 10 dB in suburban/rural areas. Spaced antenna selection diversity is found to provide only a slight decrease (4 dB, typically) in the urban excess path loss observed. Level crossing rates are depressed in satellite links relative to those of Rayleigh-faded terrestrial links, but increases in average fade durations tend to offset that advantage. The measurements show that the excess path loss difference between 860-MHz links and 1550-MHz links is generally negligible.

  15. Minimizing Communication in All-Pairs Shortest Paths

    Science.gov (United States)

    2013-02-13

    on a 16,384 vertex, 5% dense graph, is slightly faster using our approach (18.6 vs . 22.6 seconds) than using the replicated Johnson’s algorithm...Oracle and Samsung , as well as MathWorks. Research is also supported by DOE grants DE-SC0004938, DE-SC0005136, DE-SC0003959, DE-SC0008700, and AC02...Brickell, I. S. Dhillon, S. Sra, and J. A. Tropp. The metric nearness problem. SIAM J. Matrix Anal. Appl ., 30:375–396, 2008. [11] A. Buluç, J. R. Gilbert

  16. Fourth generation mobile communication the path to superfast connectivity

    CERN Document Server

    Curwen, Peter

    2014-01-01

    This up-to-date analysis of developments in 4G, or LTE, telecommunications is based on material from more than 1,000 sources. It examines every aspect of the technology as well as the progress of its introduction in each country where it has been licensed.

  17. Can ‘Mobile Platform’ and ‘Permission Marketing’ dance a tango to the consumers' tune? Modeling adoption of ‘SMS based Permission Advertising’

    Directory of Open Access Journals (Sweden)

    Prerna Bamoriya

    2015-12-01

    Full Text Available Many a times situation of advertising clutter is further aggrieved by the markers’ intrusive practices i.e. not asking for consumer’s explicit permission. It results in consumers’ alienation and reduced advertising effectiveness. Solution could be integration of Permission Marketing with an innovative advertising platform like Mobile. This study aimed to develop and validate a comprehensive model for understanding consumers’ adoption behavior towards SMS Based Permission Advertising (SBPA. For this, data was collected using systematic random sampling from 524 respondents and was analyzed using Structural Equation Modeling. Study revealed some critical variables along with complex relationships among such variables, in form of an empirically validated model. At last, study made some important implications for practitioners and researchers.

  18. Eyes On the Ground: Path Forward Analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Brost, Randolph; Little, Charles Q.; peter-stein, natacha; Wade, James Rokwel

    2018-03-01

    A previous report assesses our progress to date on the Eyes On the Ground project, and reviews lessons learned [1]. In this report, we address the implications of those lessons in defining the most productive path forward for the remainder of the project. We propose two main concepts: Interactive Diagnosis and Model-Driven Assistance. Among these, the Model-Driven Assistance concept appears the most promising. The Model-Driven Assistance concept is based on an approximate but useful model of a facility, which provides a unified representation for storing, viewing, and analyzing data that is known about the facility. This representation provides value to both inspectors and IAEA headquarters, and facilitates communication between the two. The concept further includes a lightweight, portable field tool to aid the inspector in executing a variety of inspection tasks, including capture of images and 3-d scan data. We develop a detailed description of this concept, including its system components, functionality, and example use cases. The envisioned tool would provide value by reducing inspector cognitive load, streamlining inspection tasks, and facilitating communication between the inspector and teams at IAEA headquarters. We conclude by enumerating the top implementation priorities to pursue in the remaining limited time of the project. Approved for public release; further dissemination unlimited.

  19. Topological Rankings in Communication Networks

    DEFF Research Database (Denmark)

    Aabrandt, Andreas; Hansen, Vagn Lundsgaard; Træholt, Chresten

    2015-01-01

    In the theory of communication the central problem is to study how agents exchange information. This problem may be studied using the theory of connected spaces in topology, since a communication network can be modelled as a topological space such that agents can communicate if and only...... if they belong to the same path connected component of that space. In order to study combinatorial properties of such a communication network, notions from algebraic topology are applied. This makes it possible to determine the shape of a network by concrete invariants, e.g. the number of connected components...

  20. Satellite communications principles and applications

    CERN Document Server

    Calcutt, David

    1994-01-01

    Satellites are increasingly used for global communications, as well as for radio and television transmissions. With the growth of mobile communications, and of digital technology, the use of satellite systems is set to expand substantially and already all students of electronics or communications engineering must study the subject.This book steers a middle path between offering a basic understanding of the process of communication by satellite and the methodology used; and the extensive mathematical analysis normally adopted in similar texts. It presents the basic concepts, using as mu

  1. DiversePathsJ: diverse shortest paths for bioimage analysis.

    Science.gov (United States)

    Uhlmann, Virginie; Haubold, Carsten; Hamprecht, Fred A; Unser, Michael

    2018-02-01

    We introduce a formulation for the general task of finding diverse shortest paths between two end-points. Our approach is not linked to a specific biological problem and can be applied to a large variety of images thanks to its generic implementation as a user-friendly ImageJ/Fiji plugin. It relies on the introduction of additional layers in a Viterbi path graph, which requires slight modifications to the standard Viterbi algorithm rules. This layered graph construction allows for the specification of various constraints imposing diversity between solutions. The software allows obtaining a collection of diverse shortest paths under some user-defined constraints through a convenient and user-friendly interface. It can be used alone or be integrated into larger image analysis pipelines. http://bigwww.epfl.ch/algorithms/diversepathsj. michael.unser@epfl.ch or fred.hamprecht@iwr.uni-heidelberg.de. Supplementary data are available at Bioinformatics online. © The Author(s) 2017. Published by Oxford University Press.

  2. Spreading paths in partially observed social networks

    Science.gov (United States)

    Onnela, Jukka-Pekka; Christakis, Nicholas A.

    2012-03-01

    Understanding how and how far information, behaviors, or pathogens spread in social networks is an important problem, having implications for both predicting the size of epidemics, as well as for planning effective interventions. There are, however, two main challenges for inferring spreading paths in real-world networks. One is the practical difficulty of observing a dynamic process on a network, and the other is the typical constraint of only partially observing a network. Using static, structurally realistic social networks as platforms for simulations, we juxtapose three distinct paths: (1) the stochastic path taken by a simulated spreading process from source to target; (2) the topologically shortest path in the fully observed network, and hence the single most likely stochastic path, between the two nodes; and (3) the topologically shortest path in a partially observed network. In a sampled network, how closely does the partially observed shortest path (3) emulate the unobserved spreading path (1)? Although partial observation inflates the length of the shortest path, the stochastic nature of the spreading process also frequently derails the dynamic path from the shortest path. We find that the partially observed shortest path does not necessarily give an inflated estimate of the length of the process path; in fact, partial observation may, counterintuitively, make the path seem shorter than it actually is.

  3. Spreading paths in partially observed social networks.

    Science.gov (United States)

    Onnela, Jukka-Pekka; Christakis, Nicholas A

    2012-03-01

    Understanding how and how far information, behaviors, or pathogens spread in social networks is an important problem, having implications for both predicting the size of epidemics, as well as for planning effective interventions. There are, however, two main challenges for inferring spreading paths in real-world networks. One is the practical difficulty of observing a dynamic process on a network, and the other is the typical constraint of only partially observing a network. Using static, structurally realistic social networks as platforms for simulations, we juxtapose three distinct paths: (1) the stochastic path taken by a simulated spreading process from source to target; (2) the topologically shortest path in the fully observed network, and hence the single most likely stochastic path, between the two nodes; and (3) the topologically shortest path in a partially observed network. In a sampled network, how closely does the partially observed shortest path (3) emulate the unobserved spreading path (1)? Although partial observation inflates the length of the shortest path, the stochastic nature of the spreading process also frequently derails the dynamic path from the shortest path. We find that the partially observed shortest path does not necessarily give an inflated estimate of the length of the process path; in fact, partial observation may, counterintuitively, make the path seem shorter than it actually is.

  4. A new model for deteriorating items with inflation under permissible delay in payments

    Directory of Open Access Journals (Sweden)

    R.P. Tripathi

    2014-05-01

    Full Text Available Inflation is an important factor influencing traditional economic order quality models. Marketing strategy depends on inflation due to public demand and availability of the materials. This paper presents an optimal inventory policy for deteriorating items using exponential demand rate under permissible delay in payments. Mathematical model has been derived under two cases: case I: cycle time is greater than or equal to permissible delay period, case II: cycle time is less than permissible delay period by considering holding cost as a function of time. Numerical examples and sensitivity analysis are given to reflect the numerical results. Mathematica software is used for finding optimal solutions.

  5. Stochastic control with rough paths

    International Nuclear Information System (INIS)

    Diehl, Joscha; Friz, Peter K.; Gassiat, Paul

    2017-01-01

    We study a class of controlled differential equations driven by rough paths (or rough path realizations of Brownian motion) in the sense of Lyons. It is shown that the value function satisfies a HJB type equation; we also establish a form of the Pontryagin maximum principle. Deterministic problems of this type arise in the duality theory for controlled diffusion processes and typically involve anticipating stochastic analysis. We make the link to old work of Davis and Burstein (Stoch Stoch Rep 40:203–256, 1992) and then prove a continuous-time generalization of Roger’s duality formula [SIAM J Control Optim 46:1116–1132, 2007]. The generic case of controlled volatility is seen to give trivial duality bounds, and explains the focus in Burstein–Davis’ (and this) work on controlled drift. Our study of controlled rough differential equations also relates to work of Mazliak and Nourdin (Stoch Dyn 08:23, 2008).

  6. Stochastic control with rough paths

    Energy Technology Data Exchange (ETDEWEB)

    Diehl, Joscha [University of California San Diego (United States); Friz, Peter K., E-mail: friz@math.tu-berlin.de [TU & WIAS Berlin (Germany); Gassiat, Paul [CEREMADE, Université Paris-Dauphine, PSL Research University (France)

    2017-04-15

    We study a class of controlled differential equations driven by rough paths (or rough path realizations of Brownian motion) in the sense of Lyons. It is shown that the value function satisfies a HJB type equation; we also establish a form of the Pontryagin maximum principle. Deterministic problems of this type arise in the duality theory for controlled diffusion processes and typically involve anticipating stochastic analysis. We make the link to old work of Davis and Burstein (Stoch Stoch Rep 40:203–256, 1992) and then prove a continuous-time generalization of Roger’s duality formula [SIAM J Control Optim 46:1116–1132, 2007]. The generic case of controlled volatility is seen to give trivial duality bounds, and explains the focus in Burstein–Davis’ (and this) work on controlled drift. Our study of controlled rough differential equations also relates to work of Mazliak and Nourdin (Stoch Dyn 08:23, 2008).

  7. Path modeling and process control

    DEFF Research Database (Denmark)

    Høskuldsson, Agnar; Rodionova, O.; Pomerantsev, A.

    2007-01-01

    and having three or more stages. The methods are applied to a process control of a multi-stage production process having 25 variables and one output variable. When moving along the process, variables change their roles. It is shown how the methods of path modeling can be applied to estimate variables...... be performed regarding the foreseeable output property y, and with respect to an admissible range of correcting actions for the parameters of the next stage. In this paper the basic principles of path modeling is presented. The mathematics is presented for processes having only one stage, having two stages...... of the next stage with the purpose of obtaining optimal or almost optimal quality of the output variable. An important aspect of the methods presented is the possibility of extensive graphic analysis of data that can provide the engineer with a detailed view of the multi-variate variation in data....

  8. Factorization-algebraization-path integration

    International Nuclear Information System (INIS)

    Inomata, A.; Wilson, R.

    1986-01-01

    The authors review the method of factorization proposed by Schroedinger of a quantum mechanical second-order linear differential equation into a product of two first-order differential operators, often referred to as ladder operators, as well as the modifications made to Schroedinger's method by Infeld and Hull. They then review the group theoretical treatments proposed by Miller of the Schroedinger-Infeld-Hull factorizations and go on to demonstrate the application of dynamical symmetry to path integral calculations. 30 references

  9. The path of code linting

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  10. Career path for operations personnel

    International Nuclear Information System (INIS)

    Asher, J.A.

    1985-01-01

    This paper explains how selected personnel can now obtain a Bachelor of Science degree in Physics with a Nuclear Power Operations option. The program went into effect the Fall of 1984. Another program was worked out in 1982 whereby students attending the Nuclear Operators Training Program could obtain an Associates of Science degree in Mechanical Engineering Technology at the end of two years of study. This paper presents tables and charts which describe these programs and outline the career path for operators

  11. Conditionally solvable path integral problems

    International Nuclear Information System (INIS)

    Grosche, C.

    1995-05-01

    Some specific conditionally exactly solvable potentials are discussed within the path integral formalism. They generalize the usually known potentials by the incorporation of a fractional power behaviour and strongly anharmonic terms. We find four different kinds of such potentials, the first is related to the Coulomb potential, the second is an anharmonic confinement potential, and the third and the fourth are related to the Manning-Rosen potential. (orig.)

  12. Path integrals in curvilinear coordinates

    International Nuclear Information System (INIS)

    Prokhorov, L.V.

    1984-01-01

    Integration limits are studied for presenting the path integral curvilinear coordinates. For spherical (and topoloqically equivalent) coordinates it is shown that in formulas involving classical action in the exponent integration over all variables should be carried out within infinite limits. Another peculiarity is associated with appearance of the operator q which provides a complete definition of the wave functions out of the physical region. arguments are given upporting the validity of the cited statament in the general case

  13. Progress of Digital Communication Technology

    Science.gov (United States)

    Yamazaki, Satoshi; Asano, David K.

    In wireless communications, since transmitted signals are scattered from many objects, many propagation paths with different time delays are formed. When transmitting and receiving while moving in such an environment, received signals will be affected by intricate selective fading in both the frequency and time domains. In this technical note, first, the mechanism of fading phenomena is clarified, changes in previous phase compensation technology are surveyed, and a foundation for digital wireless-communications technology is provided.

  14. Polygonal-path approximations on the path spaces of quantum-mechanical systems: properties of the polygonal paths

    International Nuclear Information System (INIS)

    Exner, P.; Kolerov, G.I.

    1981-01-01

    Properties of the subset of polygonal paths in the Hilbert space H of paths referring to a d-dimensional quantum-mechanical system are examined. Using the reproduction kernel technique we prove that each element of H is approximated by polygonal paths uniformly with respect to the ''norm'' of time-interval partitions. This result will be applied in the second part of the present paper to prove consistency of the uniform polygonal-path extension of the Feynman maps [ru

  15. Path Integrals in Quantum Mechanics

    International Nuclear Information System (INIS)

    Chetouani, L

    2005-01-01

    By treating path integrals the author, in this book, places at the disposal of the reader a modern tool for the comprehension of standard quantum mechanics. Thus the most important applications, such as the tunnel effect, the diffusion matrix, etc, are presented from an original point of view on the action S of classical mechanics while having it play a central role in quantum mechanics. What also emerges is that the path integral describes these applications more richly than are described traditionally by differential equations, and consequently explains them more fully. The book is certainly of high quality in all aspects: original in presentation, rigorous in the demonstrations, judicious in the choice of exercises and, finally, modern, for example in the treatment of the tunnel effect by the method of instantons. Moreover, the correspondence that exists between classical and quantum mechanics is well underlined. I thus highly recommend this book (the French version being already available) to those who wish to familiarize themselves with formulation by path integrals. They will find, in addition, interesting topics suitable for exploring further. (book review)

  16. Nonperturbative path integral expansion II

    International Nuclear Information System (INIS)

    Kaiser, H.J.

    1976-05-01

    The Feynman path integral representation of the 2-point function for a self-interacting Bose field is investigated using an expansion ('Path Integral Expansion', PIE) of the exponential of the kinetic term of the Lagrangian. This leads to a series - illustrated by a graph scheme - involving successively a coupling of more and more points of the lattice space commonly employed in the evaluation of path integrals. The values of the individual PIE graphs depend of course on the lattice constant. Two methods - Pade approximation and Borel-type extrapolation - are proposed to extract information about the continuum limit from a finite-order PIE. A more flexible PIE is possible by expanding besides the kinetic term a suitably chosen part of the interaction term too. In particular, if the co-expanded part is a mass term the calculation becomes only slightly more complicated than in the original formulation and the appearance of the graph scheme is unchanged. A significant reduction of the number of graphs and an improvement of the convergence of the PIE can be achieved by performing certain sums over an infinity of graph elements. (author)

  17. Distribution definition of path integrals

    International Nuclear Information System (INIS)

    Kerler, W.

    1979-01-01

    By starting from quantum mechanics it turns out that a rather general definition of quantum functional integrals can be given which is based on distribution theory. It applies also to curved space and provides clear rules for non-linear transformations. The refinements necessary in usual definitions of path integrals are pointed out. Since the quantum nature requires special care with time sequences, it is not the classical phase space which occurs in the phase-space form of the path integral. Feynman's configuration-space form only applies to a highly specialized situation, and therefore is not a very advantageous starting point for general investigations. It is shown that the commonly used substitutions of variables do not properly account for quantum effects. The relation to the traditional ordering problem is clarified. The distribution formulation has allowed to treat constrained systems directly at the quantum level, to complete the path integral formulation of the equivalence theorem, and to define functional integrals also for space translation after the transition to fields. (orig.)

  18. Permissive parenting and mental health in college students: Mediating effects of academic entitlement.

    Science.gov (United States)

    Barton, Alison L; Hirsch, Jameson K

    2016-01-01

    Student mental health may suffer due to unreasonable expectations associated with academic entitlement; permissive parenting may be one source of these expectations. The authors examined the role of academic entitlement as a mediator of the relationship between permissive parenting and psychological functioning. Participants were 524 undergraduate students at a single institution (52% female; age range = 18-22). Data collection was completed in May 2011. Cross-sectional design. Participants completed online self-report measures of parenting styles, academic entitlement, stress, depressive symptoms, and well-being. Permissive parenting was associated with greater academic entitlement and, in turn, to more perceived stress and poorer mental health. Mother/father differences were found in some cases. Academic entitlement may partially explain why permissive parenting is detrimentally related to mental health for college students. Implications for academic affairs and counseling include helping students develop an appreciation of the role of self-regulation in college success.

  19. Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection

    KAUST Repository

    Wang, Wei; Wang, Xing; Feng, Dawei; Liu, Jiqiang; Han, Zhen; Zhang, Xiangliang

    2014-01-01

    Android has been a major target of malicious applications (malapps). How to detect and keep the malapps out of the app markets is an ongoing challenge. One of the central design points of Android security mechanism is permission control

  20. Maximum permissible concentrations and negligible concentrations for antifouling substances. Irgarol 1051, dichlofluanid, ziram, chlorothalonil and TCMTB

    NARCIS (Netherlands)

    Wezel AP van; Vlaardingen P van; CSR

    2001-01-01

    This report presents maximum permissible concentrations and negligible concentrations that have been derived for various antifouling substances used as substitutes for TBT. Included here are Irgarol 1051, dichlofluanide, ziram, chlorothalonil and TCMTB.

  1. State-of-the-art literature review on permissive/protected left-turn control.

    Science.gov (United States)

    2013-06-01

    In spring 2010, the Illinois Department of Transportation initiated an areawide implementation to integrate the : flashing yellow arrow as the display for the left-turn permissive interval at more than 100 intersections operating : with protected/per...

  2. Assessment of permissible low-level releases of radionuclides into the marine environment

    International Nuclear Information System (INIS)

    Kryshev, I.I.; Sazykina, T.G.

    2002-01-01

    The subject of this paper is radio-ecological assessment of permissible low-level releases of radionuclides in sea waters ensuring the radiological protection of the human population, as well as marine biota. (author)

  3. Drug evaluation and the permissive principle: continuities and contradictions between standards and practices in antidepressant regulation.

    Science.gov (United States)

    Abraham, John; Davis, Courtney

    2009-08-01

    Pharmaceuticals are not permitted on to the market unless they are granted regulatory approval. The regulatory process is, therefore, crucial in whether or not a drug is widely prescribed. Regulatory agencies have developed standards of performance that pharmaceuticals are supposed to meet before entering the market. Regulation of technologies is often discussed by reference to the precautionary principle. In contrast, this paper develops the concept of the 'permissive principle' as a way of understanding the departure of regulators' practices from standards of drug efficacy to which regulatory agencies themselves subscribe. By taking a case study of antidepressant regulation in the UK and the USA, the mechanisms of permissive regulatory practices are examined. An STS methodology of both spatial (international) and temporal comparisons of regulatory practices with regulatory standards is employed to identify the nature and extent of the permissive regulation. It is found that the permissive principle was adopted by drug regulators in the UK and the USA, but more so by the former than the latter. Evidently, permissive regulation, which favours the commercial interests of the drug manufacturer, but is contrary to the interests of patients, may penetrate to the heart of regulatory science. On the other hand, permissive regulation of specific drugs should not be regarded as an inevitable result of marketing strategies and concomitant networks deployed by powerful pharmaceutical companies, because the extent of permissive regulation may vary according to the intra-institutional normative commitments of regulators to uphold their technical standards against the commercial interests of the manufacturer. Likely sociological factors that can account for such permissive regulatory practices are 'corporate bias', secrecy and excessive regulatory trust in the pharmaceutical industry in the UK, political expediency and ideological capture in the USA, combined in both countries

  4. Electron Inelastic-Mean-Free-Path Database

    Science.gov (United States)

    SRD 71 NIST Electron Inelastic-Mean-Free-Path Database (PC database, no charge)   This database provides values of electron inelastic mean free paths (IMFPs) for use in quantitative surface analyses by AES and XPS.

  5. Time optimal paths for high speed maneuvering

    Energy Technology Data Exchange (ETDEWEB)

    Reister, D.B.; Lenhart, S.M.

    1993-01-01

    Recent theoretical results have completely solved the problem of determining the minimum length path for a vehicle with a minimum turning radius moving from an initial configuration to a final configuration. Time optimal paths for a constant speed vehicle are a subset of the minimum length paths. This paper uses the Pontryagin maximum principle to find time optimal paths for a constant speed vehicle. The time optimal paths consist of sequences of axes of circles and straight lines. The maximum principle introduces concepts (dual variables, bang-bang solutions, singular solutions, and transversality conditions) that provide important insight into the nature of the time optimal paths. We explore the properties of the optimal paths and present some experimental results for a mobile robot following an optimal path.

  6. Procedures for permission under atomic energy laws in the Federal Republic of Germany

    International Nuclear Information System (INIS)

    Kuhnt, D.

    1980-01-01

    The selection of proper locations by the enterprisers responsible for projects is usually accompanied in recent years by the active location policy of the state. The application for the permission of locations and projects shall be filed to one or more ministries of the province where the facilities are to be installed. The papers describing the projects, especially safety reports and summaries shall be attached to the applications. The applications shall be published on a bulletin of the government office or daily newspapers, and every person has access to the applications, the safety reports and the summaries for two months. When objections are lodged within the period, closed hearings are held to examine the protests with attendance of the objector, the enterpriser of the project and the government office which has joined the decision. Following the phase of public participation and after the confirmation of facts highly important to the decision, fact examination is carried out with cooperation of specialists by the government office authorized for permission. As a special feature of the procedures under Atomgesetz, the government office is not necessarily obliged to give permission considering the safety policy, even when the pre-requisites of permission are all fulfilled. In other respects, permission may be offered for each partial installation of the facilities and various stages of operation by particular administrative measures (partial permission). The experiences of past 20 years indicate the virtual defects of the laws applied, and the amendment is urgently required. (Okada, K.)

  7. Perceived realism moderates the relation between sexualized media consumption and permissive sexual attitudes in Dutch adolescents.

    Science.gov (United States)

    Baams, Laura; Overbeek, Geertjan; Dubas, Judith Semon; Doornwaard, Suzan M; Rommes, Els; van Aken, Marcel A G

    2015-04-01

    This study examined whether the development of sexualized media consumption and permissive sexual attitudes would be more strongly interrelated when adolescents perceived sexualized media images as highly realistic. We used data from a three-wave longitudinal sample of 444 Dutch adolescents aged 13-16 years at baseline. Results from parallel process latent growth modeling multigroup analyses showed that higher initial levels of sexualized media consumption were associated with higher initial level of permissive sexual attitudes. Moreover, increases of sexualized media consumption over time were associated with increases of permissive sexual attitudes over time. Considering the moderation by perceived realism, we found these effects only for those who perceived sexualized media as more realistic. Findings for male and female adolescents were similar except for the relations between initial levels and subsequent development. Among male adolescents who perceived sexualized media images to be realistic, higher initial levels of permissive sexual attitudes were related to subsequent less rapid development of sexualized media consumption. For male adolescents who perceived sexualized media to be less realistic, higher initial levels of sexualized media consumption were related to a subsequent less rapid development of permissive sexual attitudes. These relations were not found for female adolescents. Overall, our results suggest that, in male and female adolescents, those with a high level of perceived realism showed a correlated development of sexualized media consumption and permissive sexual attitudes. These findings point to a need for extended information on how to guide adolescents in interpreting and handling sexualized media in everyday life.

  8. Resonant communicators, effective communicators. Communicator’s flow and credibility

    Directory of Open Access Journals (Sweden)

    Irene García-Ureta, Ph.D

    2012-01-01

    Full Text Available Communication studies have been integrating the latest developments in cognitive sciences and acknowledging the importance of understanding the subjective processes involved in communication. This article argues that communication studies should also take into account the psychology of the communicator. This article presents the theoretical basis and the results of a training programme designed for audiovisual communicators. The programme is based on the theories of self-efficacy and flow and seeks to improve students’ communication competencies through the use of presentation techniques and psychological skills to tackle communication apprehension. The programme involves an active methodology that is based on modelling, visualisation, immediate feedback and positive reinforcement. A repeated-measures ANOVA shows that the programme successfully decreases the level of communication apprehension, improves the perceived self-efficacy, improves the psychological state needed to perform better in front of the cameras (flow, and improves students’ communication skills. A path analysis proved that the perceived self-efficacy and anxiety levels predict the level of flow during the communication act. At the end of the training programme, those who experienced higher levels of flow and enjoyment during the communication task achieved higher quality levels in their communication exercise. It is concluded that the concepts of self-efficacy and flow facilitate advancing in the understanding of the factors that determine a communicator’s credibility and ability to connect with the audience.

  9. Classical and quantum dynamics from classical paths to path integrals

    CERN Document Server

    Dittrich, Walter

    2016-01-01

    Graduate students who want to become familiar with advanced computational strategies in classical and quantum dynamics will find here both the fundamentals of a standard course and a detailed treatment of the time-dependent oscillator, Chern-Simons mechanics, the Maslov anomaly and the Berry phase, to name a few. Well-chosen and detailed examples illustrate the perturbation theory, canonical transformations, the action principle and demonstrate the usage of path integrals. This new edition has been revised and enlarged with chapters on quantum electrodynamics, high energy physics, Green’s functions and strong interaction.

  10. Breakout Session: Fight for Your Right to Copy: How One Library Acquired the Copyright Permissions Service and Reduced Students’ Costs. Presented by Emily Riha, Copyright Permissions Coordinator, University of Minnesota.

    Directory of Open Access Journals (Sweden)

    Connie Strittmatter

    2018-02-01

    Full Text Available Emily Riha, Copyright Permissions Coordinator at the University of Minnesota, presented at the 2017 Kraemer Copyright Conference her experience when the process of securing copyright permissions moved from Printing Services to the University Libraries.

  11. Path Integral Formulation of Anomalous Diffusion Processes

    OpenAIRE

    Friedrich, Rudolf; Eule, Stephan

    2011-01-01

    We present the path integral formulation of a broad class of generalized diffusion processes. Employing the path integral we derive exact expressions for the path probability densities and joint probability distributions for the class of processes under consideration. We show that Continuous Time Random Walks (CTRWs) are included in our framework. A closed expression for the path probability distribution of CTRWs is found in terms of their waiting time distribution as the solution of a Dyson ...

  12. Scan path entropy and Arrow plots: Capturing scanning behavior of multiple observers

    Directory of Open Access Journals (Sweden)

    Ignace T C Hooge

    2013-12-01

    Full Text Available Designers of visual communication material want their material to attract and retain attention. In marketing research, heat maps, dwell time, and time to AOI first hit are often used as evaluation parameters. Here we present two additional measures 1 scan path entropy to quantify gaze guidance and 2 the arrow plot to visualize the average scan path. Both are based on string representations of scan paths. The latter also incorporates transition matrices and time required for 50% of the observers to first hit AOIs (T50. The new measures were tested in an eye tracking study (48 observers, 39 advertisements. Scan path entropy is a sensible measure for gaze guidance and the new visualization method reveals aspects of the average scan path and gives a better indication in what order global scanning takes place.

  13. Partial Path Column Generation for the ESPPRC

    DEFF Research Database (Denmark)

    Jepsen, Mads Kehlet; Petersen, Bjørn

    This talk introduces a decomposition of the Elementary Shortest Path Problem with Resource Constraints(ESPPRC), where the path is combined by smaller sub paths. We show computational result by comparing different approaches for the decomposition and compare the best of these with existing algorit...

  14. Strain path dependency in metal plasticity

    NARCIS (Netherlands)

    Viatkina, E.M.; Brekelmans, W.A.M.; Geers, M.G.D.

    2003-01-01

    A change in strain path has a significant effect on the mechanical response of metals. Strain path change effects physically originate from a complex microstructure evolution. This paper deals with the contribution of cell structure evolution to the strain path change effect. The material with cells

  15. Path Loss Prediction Over the Lunar Surface Utilizing a Modified Longley-Rice Irregular Terrain Model

    Science.gov (United States)

    Foore, Larry; Ida, Nathan

    2007-01-01

    This study introduces the use of a modified Longley-Rice irregular terrain model and digital elevation data representative of an analogue lunar site for the prediction of RF path loss over the lunar surface. The results are validated by theoretical models and past Apollo studies. The model is used to approximate the path loss deviation from theoretical attenuation over a reflecting sphere. Analysis of the simulation results provides statistics on the fade depths for frequencies of interest, and correspondingly a method for determining the maximum range of communications for various coverage confidence intervals. Communication system engineers and mission planners are provided a link margin and path loss policy for communication frequencies of interest.

  16. Optimal optical communication terminal structure for maximizing the link budget

    Science.gov (United States)

    Huang, Jian; Jiang, Dagang; Deng, Ke; Zhang, Peng

    2015-02-01

    Ordinary inter-satellite optical includes at least three optical paths for acquisition, tracking and communication, the three optical paths work simultaneously and share the received power. An optimal structure of inter-satellite optical communication terminal with single working optical path at each of working stages of acquisition and communication is introduced. A space optical switch based on frustrated total internal reflection effect is applied to switch the received laser power between the acquisition sensor and the communication sensor between the stages of acquisition and communication, this is named as power fusion which means power is transferred for shutting down unused optical path. For the stages of tracking and communication, a multiple cells sensor is used to accomplish the operation of tracking while communication, this is named as function fusion which means accomplishing multiple functions by one device to reduce the redundant optical paths. For optical communication terminal with single working path structure, the total received laser power would be detected by one sensor for each different stages of acquisition, tracking and communication, the link budget would be maximized, and this design would help to enlarge the system tolerance and reduce the acquisition time.

  17. Unified communications

    OpenAIRE

    Kravos, Urban

    2011-01-01

    In the modern business world, communication are becoming more and more complex. As a solution to this problem unified communications occurred. Using a single communication approach unified communications are the integration of various communication technologies (eg, telephony, unified messaging, audio, video and web conferencing and collaboration tools). Unified Messaging, which represents only part of the unified communications means the integration of different non real time communication t...

  18. Space charge models and PATH

    International Nuclear Information System (INIS)

    Wald, H.B.

    1990-01-01

    The 'PATH' codes are used to design magnetic optics subsystems for neutral particle beam systems. They include a 2-1/2D and three 3-D space charge models, two of which have recently been added. This paper describes the 3-D models and reports on preliminary benchmark studies in which these models are checked for stability as the cloud size is varied and for consistency with each other. Differences between the models are investigated and the computer time requirements for running these models are established

  19. Innovation paths in wind power

    DEFF Research Database (Denmark)

    Lema, Rasmus; Nordensvärd, Johan; Urban, Frauke

    Denmark and Germany both make substantial investments in low carbon innovation, not least in the wind power sector. These investments in wind energy are driven by the twin objectives of reducing carbon emissions and building up international competitive advantage. Support for wind power dates back....... The ‘Danish Design’ remains the global standard. The direct drive design, while uncommon in Denmark, dominates the German installation base. Direct drive technology has thus emerged as a distinctly German design and sub-trajectory within the overall technological innovation path. When it comes to organising...... global interconnectedness of wind technology markets and the role of emerging new players, such as China and India....

  20. Uncommon paths in quantum physics

    CERN Document Server

    Kazakov, Konstantin V

    2014-01-01

    Quantum mechanics is one of the most fascinating, and at the same time most controversial, branches of contemporary science. Disputes have accompanied this science since its birth and have not ceased to this day. Uncommon Paths in Quantum Physics allows the reader to contemplate deeply some ideas and methods that are seldom met in the contemporary literature. Instead of widespread recipes of mathematical physics, based on the solutions of integro-differential equations, the book follows logical and partly intuitional derivations of non-commutative algebra. Readers can directly penetrate the

  1. Underwater wireless communication system

    International Nuclear Information System (INIS)

    Goh, J H; Shaw, A; Al-Shamma'a, A I

    2009-01-01

    Underwater communication has a range of applications including remotely operated vehicle (ROV) and autonomous underwater vehicle (AUV) communication and docking in the offshore industry. Current underwater transmission techniques is primarily utilise sound waves for large distance at lower frequencies and the velocity of sound in water is approximately 1500m/s the resultant communications have problems with multi-path propagation and low bandwidth problems. The use of electromagnetic (EM) techniques underwater has largely been overlooked because of the attenuation due to the conductivity of seawater. However, for short range applications, the higher frequencies and much higher velocity can prove advantageous. This paper will outline a project which will utilise recent investigations that demonstrate EM wave propagation up to the MHz frequency range is possible in seawater.

  2. The link between maternal sleep and permissive parenting during late adolescence.

    Science.gov (United States)

    Tu, Kelly M; Elmore-Staton, Lori; Buckhalt, Joseph A; El-Sheikh, Mona

    2018-03-05

    Utilizing a multi-method design, the present study examined the association between maternal sleep, assessed via actigraphy and self-reports, and permissive parenting (e.g. lax, inconsistent discipline) during adolescence, as well as the extent to which this association differed by mothers' race/ethnicity and socioeconomic status. The sample was comprised of 234 mothers (M age = 41.76 years, SD = 6.25; 67% European-American, 31% African-American, 2% other race/ethnicities) and 237 adolescents (113 boys, 124 girls; M age = 15.80 years, SD = 0.80; 66% European-American, 34% African-American). Mothers' sleep duration (actual sleep minutes) and quality (sleep efficiency, latency, long wake episodes) were assessed using actigraphy. Mothers also reported on their sleep problems and adolescents reported on mothers' permissive parenting behaviours. Results revealed that actigraphy-based longer sleep duration and shorter sleep latency were associated with lower levels of permissive parenting. Further, mothers' race/ethnicity and socioeconomic status moderated the association between actigraphy-based sleep quality (i.e. sleep efficiency, long wake episodes) and permissive parenting. Specifically, a negative association between sleep efficiency and permissive parenting was evident only for African-American mothers. In addition, a positive association between more frequent night wakings and permissive parenting was evident only for mothers from lower socioeconomic status households. The findings highlight the benefits of longer and higher-quality sleep for reducing the risk of permissive parenting, especially among ethnic minority mothers and mothers from lower socioeconomic status households. © 2018 European Sleep Research Society.

  3. Information spread of emergency events: path searching on social networks.

    Science.gov (United States)

    Dai, Weihui; Hu, Hongzhi; Wu, Tunan; Dai, Yonghui

    2014-01-01

    Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. This paper collects Internet data based on data acquisition and topic detection technology, analyzes the process of information spread on social networks, describes the diffusions and impacts of that information from the perspective of random graph, and finally seeks the key paths through an improved IBF algorithm. Application cases have shown that this algorithm can search the shortest spread paths efficiently, which may help us to guide and control the information dissemination of emergency events on early warning.

  4. Information Spread of Emergency Events: Path Searching on Social Networks

    Directory of Open Access Journals (Sweden)

    Weihui Dai

    2014-01-01

    Full Text Available Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. This paper collects Internet data based on data acquisition and topic detection technology, analyzes the process of information spread on social networks, describes the diffusions and impacts of that information from the perspective of random graph, and finally seeks the key paths through an improved IBF algorithm. Application cases have shown that this algorithm can search the shortest spread paths efficiently, which may help us to guide and control the information dissemination of emergency events on early warning.

  5. Study on Evolutionary Path of University Students’ Entrepreneurship Training

    Directory of Open Access Journals (Sweden)

    Daojian Yang

    2014-01-01

    Full Text Available Aiming at studying the evolution pattern of cultivating the ability of university students’ entrepreneurship, this paper established the payoff matrix between the university and students agent with the evolutionary economics method. The analysis of the evolution of the communication process model reveals how the choice strategy of individuals influences that of groups. Numerical simulation also demonstrates the influences of different values of decision-making parameters and the change of initial conditions on the result of evolution. It is found that the evolution path system of university students’ entrepreneurial ability has two kinds of modes: one is the ideal state; and the other one is the bad “lock” state. By adjusting parameters, we can jump out of the bad “lock” state, thus optimizing cultivation path.

  6. Welding Robot Collision-Free Path Optimization

    Directory of Open Access Journals (Sweden)

    Xuewu Wang

    2017-02-01

    Full Text Available Reasonable welding path has a significant impact on welding efficiency, and a collision-free path should be considered first in the process of welding robot path planning. The shortest path length is considered as an optimization objective, and obstacle avoidance is considered as the constraint condition in this paper. First, a grid method is used as a modeling method after the optimization objective is analyzed. For local collision-free path planning, an ant colony algorithm is selected as the search strategy. Then, to overcome the shortcomings of the ant colony algorithm, a secondary optimization is presented to improve the optimization performance. Finally, the particle swarm optimization algorithm is used to realize global path planning. Simulation results show that the desired welding path can be obtained based on the optimization strategy.

  7. System Design and Implementation of Intelligent Fire Engine Path Planning based on SAT Algorithm

    Institute of Scientific and Technical Information of China (English)

    CAI Li-sha[1; ZENG Wei-peng[1; HAN Bao-ru[1

    2016-01-01

    In this paper, in order to make intelligent fi re car complete autonomy path planning in simulation map. Proposed system design of intelligent fi re car path planning based on SAT. The system includes a planning module, a communication module, a control module. Control module via the communication module upload the initial state and the goal state to planning module. Planning module solve this planning solution,and then download planning solution to control module, control the movement of the car fi re. Experiments show this the system is tracking short time, higher planning effi ciency.

  8. Integral transforms of the quantum mechanical path integral: Hit function and path-averaged potential

    Science.gov (United States)

    Edwards, James P.; Gerber, Urs; Schubert, Christian; Trejo, Maria Anabel; Weber, Axel

    2018-04-01

    We introduce two integral transforms of the quantum mechanical transition kernel that represent physical information about the path integral. These transforms can be interpreted as probability distributions on particle trajectories measuring respectively the relative contribution to the path integral from paths crossing a given spatial point (the hit function) and the likelihood of values of the line integral of the potential along a path in the ensemble (the path-averaged potential).

  9. Classical and quantum dynamics from classical paths to path integrals

    CERN Document Server

    Dittrich, Walter

    2017-01-01

    Graduate students who wish to become familiar with advanced computational strategies in classical and quantum dynamics will find in this book both the fundamentals of a standard course and a detailed treatment of the time-dependent oscillator, Chern-Simons mechanics, the Maslov anomaly and the Berry phase, to name just a few topics. Well-chosen and detailed examples illustrate perturbation theory, canonical transformations and the action principle, and demonstrate the usage of path integrals. The fifth edition has been revised and enlarged to include chapters on quantum electrodynamics, in particular, Schwinger’s proper time method and the treatment of classical and quantum mechanics with Lie brackets and pseudocanonical transformations. It is shown that operator quantum electrodynamics can be equivalently described with c-numbers, as demonstrated by calculating the propagation function for an electron in a prescribed classical electromagnetic field.

  10. A single-blinded randomised clinical trial of permissive underfeeding in patients requiring parenteral nutrition.

    Science.gov (United States)

    Owais, Anwar Elias; Kabir, Syed Irfan; Mcnaught, Clare; Gatt, Marcel; MacFie, John

    2014-12-01

    The importance of adequate nutritional support is well established, but characterising what 'adequate nutrition' represents remains contentious. In recent years there has been increasing interest in the concept of 'permissive underfeeding' where patients are intentionally prescribed less nutrition than their calculated requirements. The aim of this study was to evaluate the effect of permissive underfeeding on septic and nutrition related morbidity in patients requiring short term parenteral nutrition (PN). This was a single-blinded randomised clinical trial of 50 consecutive patients requiring parenteral nutritional support. Patients were randomized to receive either normocaloric or hypocaloric feeding (respectively 100% vs. 60% of estimated requirements). The primary end point was septic complications. Secondary end points included the metabolic, physiological and clinical outcomes to the two feeding protocols. Permissive underfeeding was associated with fewer septic complications (3 vs. 12 patients; p = 0.003), and a lower incidence of the systemic inflammatory response syndrome (9 vs. 16 patients; p = 0.017). Permissively underfed patients had fewer feed related complications (2 vs. 9 patients; p = 0.016). Permissive underfeeding in patients requiring short term PN appears to be safe and may results in reduced septic and feed-related complications. NCT01154179 TRIAL REGISTRY: http://clinicaltrials.gov/ct2/show/NCT01154179. Copyright © 2014 Elsevier Ltd and European Society for Clinical Nutrition and Metabolism. All rights reserved.

  11. Challenging Aspects of Terahertz Terabit Wireless Communications

    DEFF Research Database (Denmark)

    Yu, Xianbin; Galili, Michael; Jepsen, Peter Uhd

    The increasing demand on fast wireless communications, e.g. huge data file transferring and mobile broadband access, has driven wireless communication systems into a path towards Terabit era. Terahertz (THz) technology is promising due to its unique features, such as unlimited bandwidth available......, in terms of THz generation and link power budget. The THz atmospheric absorption is another critical issue to limit wireless communication range....

  12. Communications article

    KAUST Repository

    Fariborzi, Hossein

    2017-01-01

    Seamless, covert communications using a communications system integrated or incorporated within an article of clothing is described. In one embodiment, the communications system is integrated or incorporated into a shoe insole and includes a haptic

  13. Integrated assignment and path planning

    Science.gov (United States)

    Murphey, Robert A.

    2005-11-01

    A surge of interest in unmanned systems has exposed many new and challenging research problems across many fields of engineering and mathematics. These systems have the potential of transforming our society by replacing dangerous and dirty jobs with networks of moving machines. This vision is fundamentally separate from the modern view of robotics in that sophisticated behavior is realizable not by increasing individual vehicle complexity, but instead through collaborative teaming that relies on collective perception, abstraction, decision making, and manipulation. Obvious examples where collective robotics will make an impact include planetary exploration, space structure assembly, remote and undersea mining, hazardous material handling and clean-up, and search and rescue. Nonetheless, the phenomenon driving this technology trend is the increasing reliance of the US military on unmanned vehicles, specifically, aircraft. Only a few years ago, following years of resistance to the use of unmanned systems, the military and civilian leadership in the United States reversed itself and have recently demonstrated surprisingly broad acceptance of increasingly pervasive use of unmanned platforms in defense surveillance, and even attack. However, as rapidly as unmanned systems have gained acceptance, the defense research community has discovered the technical pitfalls that lie ahead, especially for operating collective groups of unmanned platforms. A great deal of talent and energy has been devoted to solving these technical problems, which tend to fall into two categories: resource allocation of vehicles to objectives, and path planning of vehicle trajectories. An extensive amount of research has been conducted in each direction, yet, surprisingly, very little work has considered the integrated problem of assignment and path planning. This dissertation presents a framework for studying integrated assignment and path planning and then moves on to suggest an exact

  14. Maternal risk factors in fetal alcohol syndrome: provocative and permissive influences.

    Science.gov (United States)

    Abel, E L; Hannigan, J H

    1995-01-01

    We present an hypothesis integrating epidemiological, clinical case, and basic biomedical research to explain why only relatively few women who drink alcohol during pregnancy give birth to children with alcohol-related birth defects (ARBDs), in particular, Fetal Alcohol Syndrome (FAS). We argue that specific sociobehavioral risk factors, e.g., low socioeconomic status, are permissive for FAS in that they provide the context for increased vulnerability. We illustrate how these permissive factors are related to biological factors, e.g., decreased antioxidant status, which in conjunction with alcohol, provoke FAS/ARBDs in vulnerable fetuses. We propose an integrative heuristic model hypothesizing that these permissive and provocative factors increase the likelihood of FAS/ARBDs because they potentiate two related mechanisms of alcohol-induced teratogenesis, specifically, maternal/fetal hypoxia and free radical formation.

  15. Path Creation, Path Dependence and Breaking Away from the Path: Re-Examining the Case of Nokia

    OpenAIRE

    Wang, Jens; Hedman, Jonas; Tuunainen, Virpi Kristiina

    2016-01-01

    The explanation of how and why firms succeed or fail is a recurrent research challenge. This is particularly important in the context of technological innovations. We focus on the role of historical events and decisions in explaining such success and failure. Using a case study of Nokia, we develop and extend a multi-layer path dependence framework. We identify four layers of path dependence: technical, strategic and leadership, organizational, and external collaboration. We show how path dep...

  16. Emergency Communication

    Science.gov (United States)

    : Environmental Documents, Reports LANL Home Calendar Search Contacts Resources » Emergency Communication Emergency Communication Stay informed of emergencies, weather delays, closures, other alerts. Find links to

  17. Tactile Communications

    Data.gov (United States)

    National Aeronautics and Space Administration — Communication with the crew is vital and must be maintained regardless of environmental conditions and crew activity. Current spacecraft communication systems depend...

  18. Rainbow paths with prescribed ends

    DEFF Research Database (Denmark)

    Alishahi, Meysam; Taherkhani, Ali; Thomassen, Carsten

    2011-01-01

    vertices. We also prove that every connected graph with atleast one edge has a proper k-coloring (for some k) such that every vertex of color i has a neighbor of color i + 1 (mod k). C-5 shows that k may have to be greater than the chromatic number. However, if the graph is connected, infinite and locally...... finite, and has finite chromatic number, then the k-coloring exists for every k >= chi(G). In fact, the k-coloring can be chosen such that every vertex is a starting vertex of an infinite path such that the color increases by 1 (mod k) along each edge. The method is based on the circular chromatic number...... chi(c)(G). In particular, we verify the above conjecture for all connected graphs whose circular chromatic number equals the chromatic number....

  19. Counting paths with Schur transitions

    Energy Technology Data Exchange (ETDEWEB)

    Díaz, Pablo [Department of Physics and Astronomy, University of Lethbridge, Lethbridge, Alberta, T1K 3M4 (Canada); Kemp, Garreth [Department of Physics, University of Johannesburg, P.O. Box 524, Auckland Park 2006 (South Africa); Véliz-Osorio, Alvaro, E-mail: aveliz@gmail.com [Mandelstam Institute for Theoretical Physics, University of the Witwatersrand, WITS 2050, Johannesburg (South Africa); School of Physics and Astronomy, Queen Mary, University of London, Mile End Road, London E1 4NS (United Kingdom)

    2016-10-15

    In this work we explore the structure of the branching graph of the unitary group using Schur transitions. We find that these transitions suggest a new combinatorial expression for counting paths in the branching graph. This formula, which is valid for any rank of the unitary group, reproduces known asymptotic results. We proceed to establish the general validity of this expression by a formal proof. The form of this equation strongly hints towards a quantum generalization. Thus, we introduce a notion of quantum relative dimension and subject it to the appropriate consistency tests. This new quantity finds its natural environment in the context of RCFTs and fractional statistics; where the already established notion of quantum dimension has proven to be of great physical importance.

  20. WifiLeaks: Underestimated Privacy Implications of the ACCESS_WIFI_STATE Android Permission

    OpenAIRE

    Achara , Jagdish Prasad; Cunche , Mathieu; Roca , Vincent; Francillon , Aurélien

    2014-01-01

    A short version has been accepted for publication in: 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC'14) Oxford, United Kingdom, July 23rd -- 25th 2014; On Android, users can choose to install an application, or not, based on the permissions it requests. These permissions are later enforced on the application by the system, e.g., when accessing sensitive user data. In this work, we focus on the access to Wi-Fi related information, which is protected by the A...

  1. PathScore: a web tool for identifying altered pathways in cancer data.

    Science.gov (United States)

    Gaffney, Stephen G; Townsend, Jeffrey P

    2016-12-01

    PathScore quantifies the level of enrichment of somatic mutations within curated pathways, applying a novel approach that identifies pathways enriched across patients. The application provides several user-friendly, interactive graphic interfaces for data exploration, including tools for comparing pathway effect sizes, significance, gene-set overlap and enrichment differences between projects. Web application available at pathscore.publichealth.yale.edu. Site implemented in Python and MySQL, with all major browsers supported. Source code available at: github.com/sggaffney/pathscore with a GPLv3 license. stephen.gaffney@yale.edu. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  2. Models for cooperative games with fuzzy relations among the agents fuzzy communication, proximity relation and fuzzy permission

    CERN Document Server

    Jiménez-Losada, Andrés

    2017-01-01

    This book offers a comprehensive introduction to cooperative game theory and a practice-oriented reference guide to new models and tools for studying bilateral fuzzy relations among several agents or players. It introduces the reader to several fuzzy models, each of which is first analyzed in the context of classical games (crisp games) and subsequently in the context of fuzzy games. Special emphasis is given to the value of Shapley, which is presented for the first time in the context of fuzzy games. Students and researchers will find here a self-contained reference guide to cooperative fuzzy games, characterized by a wealth of examples, descriptions of a wide range of possible situations, step-by-step explanations of the basic mathematical concepts involved, and easy-to-follow information on axioms and properties.

  3. Communications article

    KAUST Repository

    Fariborzi, Hossein

    2017-07-20

    Seamless, covert communications using a communications system integrated or incorporated within an article of clothing is described. In one embodiment, the communications system is integrated or incorporated into a shoe insole and includes a haptic feedback mechanism, a communications module, a flexible pressure sensor, and a battery. The communications module includes a wireless communications module for wireless communications, a wired interface for wired communications, a microcontroller, and a battery charge controller. The flexible pressure sensor can be actuated by an individual\\'s toe, for example, and communication between two communications nodes can be achieved using coded signals sent by individuals using a combination of long and short presses on the pressure sensor. In response to the presses, wireless communications modules can transmit and receive coded signals based on the presses.

  4. Strategic Team AI Path Plans: Probabilistic Pathfinding

    Directory of Open Access Journals (Sweden)

    Tng C. H. John

    2008-01-01

    Full Text Available This paper proposes a novel method to generate strategic team AI pathfinding plans for computer games and simulations using probabilistic pathfinding. This method is inspired by genetic algorithms (Russell and Norvig, 2002, in that, a fitness function is used to test the quality of the path plans. The method generates high-quality path plans by eliminating the low-quality ones. The path plans are generated by probabilistic pathfinding, and the elimination is done by a fitness test of the path plans. This path plan generation method has the ability to generate variation or different high-quality paths, which is desired for games to increase replay values. This work is an extension of our earlier work on team AI: probabilistic pathfinding (John et al., 2006. We explore ways to combine probabilistic pathfinding and genetic algorithm to create a new method to generate strategic team AI pathfinding plans.

  5. Tool path in torus tool CNC machining

    Directory of Open Access Journals (Sweden)

    XU Ying

    2016-10-01

    Full Text Available This paper is about tool path in torus tool CNC machining.The mathematical model of torus tool is established.The tool path planning algorithm is determined through calculation of the cutter location,boundary discretization,calculation of adjacent tool path and so on,according to the conversion formula,the cutter contact point will be converted to the cutter location point and then these points fit a toolpath.Lastly,the path planning algorithm is implemented by using Matlab programming.The cutter location points for torus tool are calculated by Matlab,and then fit these points to a toolpath.While using UG software,another tool path of free surface is simulated of the same data.It is drew compared the two tool paths that using torus tool is more efficient.

  6. Design of Active N-path Filters

    NARCIS (Netherlands)

    Darvishi, M.; van der Zee, Ronan A.R.; Nauta, Bram

    2013-01-01

    A design methodology for synthesis of active N-path bandpass filters is introduced. Based on this methodology, a 0.1-to-1.2 GHz tunable 6th-order N-path channel-select filter in 65 nm LP CMOS is introduced. It is based on coupling N-path filters with gyrators, achieving a “flat‿ passband shape and

  7. Path integrals and geometry of trajectories

    International Nuclear Information System (INIS)

    Blau, M.; Keski-Vakkuri, E.; Niemi, A.J.

    1990-01-01

    A geometrical interpretation of path integrals is developed in the space of trajectories. This yields a supersymmetric formulation of a generic path integral, with the supersymmetry resembling the BRST supersymmetry of a first class constrained system. If the classical equation of motion is a Killing vector field in the space of trajectories, the supersymmetry localizes the path integral to classical trajectories and the WKB approximation becomes exact. This can be viewed as a path integral generalization of the Duistermaat-Heckman theorem, which states the conditions for the exactness of the WKB approximation for integrals in a compact phase space. (orig.)

  8. Path integrals for arbitrary canonical transformations

    International Nuclear Information System (INIS)

    Oliveira, L.A.R. de.

    1980-01-01

    Some aspects of the path integral formulation of quantum mechanics are studied. This formalism is generalized to arbitrary canonical transformations, by means of an association between path integral probalility amplitudes and classical generators of transformations, analogous to the usual Hamiltonian time development phase space expression. Such association turns out to be equivalent to the Weyl quantization rule, and it is also shown that this formalism furnishes a path integral representation for a Lie algebra of a given set of classical generators. Some physical considerations about the path integral quantization procedure and about the relationship between classical and quantum dynamical structures are also discussed. (Author) [pt

  9. Techniques and applications of path integration

    CERN Document Server

    Schulman, L S

    2005-01-01

    A book of techniques and applications, this text defines the path integral and illustrates its uses by example. It is suitable for advanced undergraduates and graduate students in physics; its sole prerequisite is a first course in quantum mechanics. For applications requiring specialized knowledge, the author supplies background material.The first part of the book develops the techniques of path integration. Topics include probability amplitudes for paths and the correspondence limit for the path integral; vector potentials; the Ito integral and gauge transformations; free particle and quadra

  10. Symbolic PathFinder v7

    DEFF Research Database (Denmark)

    Luckow, Kasper Søe; Păsăreanu, Corina

    2014-01-01

    We describe Symbolic PathFinder v7 in terms of its updated design addressing the changes of Java PathFinder v7 and of its new optimization when computing path conditions. Furthermore, we describe the Symbolic Execution Tree Extension; a newly added feature that allows for outputting the symbolic...... execution tree that characterizes the execution paths covered during symbolic execution. The new extension can be tailored to the needs of subsequent analyses/processing facilities, and we demonstrate this by presenting SPF-Visualizer, which is a tool for customizable visualization of the symbolic execution...

  11. Permissiveness toward divorce : The influence of divorce experiences in three social contexts

    NARCIS (Netherlands)

    Sieben, I.J.P.; Verbakel, C.M.C.

    2013-01-01

    In this study, we assess whether divorce experiences in three social contexts shape individual’s permissiveness toward divorce. Using European Values Study data from 44 countries, we find that—net of personal divorce experience—parental divorce before the age of 18 (socialization context); parental

  12. Permissiveness toward divorce: The influence of divorce experiences in three social contexts

    NARCIS (Netherlands)

    Sieben, I.J.P.; Verbakel, C.M.C.

    2013-01-01

    In this study, we assess whether divorce experiences in three social contexts shape individual’s permissiveness toward divorce. Using European Values Study data from 44 countries, we find that—net of personal divorce experience—parental divorce before the age of 18 (socialization context); parental

  13. The study on the adaptation for regulation - the permission of a radioisotope

    Energy Technology Data Exchange (ETDEWEB)

    Park, Byoung Il; Choi, Won Seok; Jung, Yong Moon [Gallup Korea, Seoul (Korea, Republic of)

    2003-08-15

    The restriction -the permission of a radioisotope keeps satisfaction with almost parts for example, awareness, observance and so on. Moreover two concepts are considered fully -too strict about certain specific control rules and needed more discriminated application standards to each organization related to KINS, it's preserved and controlled properly even if the penalties are downsized.

  14. A colorimetric sensor array for identification of toxic gases below permissible exposure limits†

    OpenAIRE

    Feng, Liang; Musto, Christopher J.; Kemling, Jonathan W.; Lim, Sung H.; Suslick, Kenneth S.

    2010-01-01

    A colorimetric sensor array has been developed for the rapid and sensitive detection of 20 toxic industrial chemicals (TICs) at their PELs (permissible exposure limits). The color changes in an array of chemically responsive nanoporous pigments provide facile identification of the TICs with an error rate below 0.7%.

  15. Student Learning with Permissive and Restrictive Cell Phone Policies: A Classroom Experiment

    Science.gov (United States)

    Lancaster, Alexander L.

    2018-01-01

    Based on Finn and Ledbetter's (2013; 2014) work regarding classroom technology policies, this experimental study examined the implementation of a permissive and a restrictive cellular phone policy and the effect of these policies on students' cognitive and affective learning in two sections of a public speaking course. College students (N = 31)…

  16. 34 CFR 222.194 - Are “in-kind” contributions permissible?

    Science.gov (United States)

    2010-07-01

    .... (b) Third party in-kind contributions mean property or services that benefit this grant program and... indirect costs, the provisions of 34 CFR 80.24 govern the allowability and valuation of in-kind contributions, except that it is permissible for a third party to contribute real property to a grantee for a...

  17. Corruption and the Other(s): Scope of Superordinate Identity Matters for Corruption Permissibility.

    Science.gov (United States)

    Pisor, Anne C; Gurven, Michael

    2015-01-01

    The decision to engage in corruption-public and private corruption, nepotism, and embezzlement-is often attributed to rational actors maximizing benefits to themselves. However, the importance of reciprocal relationships in humans suggests that an actor may weigh the costs of harms of her corrupt behavior to individuals who may generate future benefits for her. We hypothesize that actors who have a larger circle of actual and potential social partners will have more individuals to consider when generating harms and will thus be less likely to find corrupt acts permissible than actors with smaller circles of valued others. Using data from the World Values Survey and European Values Study (WVS), we explore whether participants with a larger geographic identity or a greater number of group memberships (i.e. a larger scope of actual and potential social partners) are less likely to find accepting bribes permissible. We find mixed support for our hypotheses, but consistently find that WVS participants with local, country, continent, or world geographic identities are less likely to find accepting a bribe permissible than those with regional identities-that is, actors whose primary identities that encompass more than their region find corruption less permissible. We discuss the importance of considering an actor's valuation of others when modeling corruption persistence, noting that establishing scopes of positive valuation is a precursor to predicting where actors will target benefits and shunt costs.

  18. 17 CFR 240.12f-1 - Applications for permission to reinstate unlisted trading privileges.

    Science.gov (United States)

    2010-04-01

    ... reinstate unlisted trading privileges. 240.12f-1 Section 240.12f-1 Commodity and Securities Exchanges... Rules and Regulations Under the Securities Exchange Act of 1934 Unlisted Trading § 240.12f-1 Applications for permission to reinstate unlisted trading privileges. (a) An application to reinstate unlisted...

  19. 12 CFR 714.2 - What are the permissible leasing arrangements?

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false What are the permissible leasing arrangements? 714.2 Section 714.2 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING... leasing. In direct leasing, you purchase personal property from a vendor, becoming the owner of the...

  20. 30 CFR 75.504 - Permissibility of new, replacement, used, reconditioned, additional, and rebuilt electric face...

    Science.gov (United States)

    2010-07-01

    ... STANDARDS-UNDERGROUND COAL MINES Electrical Equipment-General § 75.504 Permissibility of new, replacement... new, replacement, used, reconditioned, and additional electric face equipment used in any mine..., unless in the opinion of the Secretary, such equipment or necessary replacement parts are not available...

  1. 49 CFR 350.319 - What are permissible uses of High Priority Activity Funds?

    Science.gov (United States)

    2010-10-01

    ... Activity Funds? 350.319 Section 350.319 Transportation Other Regulations Relating to Transportation... permissible uses of High Priority Activity Funds? (a) The FMCSA may generally use these funds to support, enrich, or evaluate State CMV safety programs and to accomplish the five objectives listed below: (1...

  2. Guidance document on the derivation of maximum permissible risk levels for human intake of soil contaminants

    NARCIS (Netherlands)

    Janssen PJCM; Speijers GJA; CSR

    1997-01-01

    This report contains a basic step-to-step description of the procedure followed in the derivation of the human-toxicological Maximum Permissible Risk (MPR ; in Dutch: Maximum Toelaatbaar Risico, MTR) for soil contaminants. In recent years this method has been applied for a large number of compounds

  3. Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection

    OpenAIRE

    Ma, Zhongmin

    2014-01-01

    The open source structure of Android applications introduces security vulnerabilities that can be readily exploited by third-party applications. We address certain vulnerabilities at both installation and runtime using machine learning. Effective classification techniques with neural networks can be used to verify the application categories on installation. We devise a novel application category verification methodology that involves machine learning the application permissions...

  4. AN OPTIMAL REPLENISHMENT POLICY FOR DETERIORATING ITEMS WITH RAMP TYPE DEMAND UNDER PERMISSIBLE DELAY IN PAYMENTS

    Directory of Open Access Journals (Sweden)

    Dr. Sanjay Jain

    2010-10-01

    Full Text Available The aim of this paper is to develop an optimal replenishment policy for inventory models of deteriorating items with ramp type demand under permissible delay in payments. Deterioration of items begins on their arrival in stock.  An example is also presented to illustrate the application of developed model.

  5. Early alcohol use with parental permission: Psychosocial characteristics and drinking in late adolescence.

    Science.gov (United States)

    Colder, Craig R; Shyhalla, Kathleen; Frndak, Seth E

    2018-01-01

    The earliest experiences with alcohol for many children occur in the family context with parental supervision. The current study examined individual and sociocultural characteristics associated with early (prior to age 13years) sipping and tasting alcohol with parental permission in two longitudinal community samples. Early sipping/tasting was also tested as a predictor of frequency and quantity of alcohol use, and alcohol-related problems seven years later in late adolescence. Early sipping/tasting with parental permission was associated with a sociocultural context supportive of alcohol use (e.g., parental alcohol use, permissive rules about alcohol use in the home, parental attitudes about underage drinking, perceived peer norms), adolescent sensation seeking and disinhibition (e.g., surgency, externalizing behavior) and appraisals of alcohol (negative outcome expectancies and negative implicit alcohol associations). Early sipping/tasting predicted increased frequency and quantity of alcohol consumption, and increased alcohol-related problems in late adolescence, even after controlling sociocultural and individual difference variables. Findings suggest that early sipping/tasting with parental permission is not benign and is a viable target for preventive interventions. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. 42 CFR 433.67 - Limitations on level of FFP for permissible provider-related donations.

    Science.gov (United States)

    2010-10-01

    ... provider-related donations. 433.67 Section 433.67 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... permissible provider-related donations. (a)(1) Limitations on bona fide donations. There are no limitations on the amount of bona fide provider-related donations that a State may receive without a reduction in FFP...

  7. A cash flow oriented EOQ model under permissible delay in payments

    African Journals Online (AJOL)

    A cash flow oriented EOQ model under permissible delay in payments. RP Tripathi, SS Misra, HS Shukla. Abstract. This study presents an inventory model to determine an optimal ordering policy for non-deteriorating items and timedependent demand rate with delay in payments permitted by the supplier under inflation and ...

  8. 77 FR 17367 - Permissible Sharing of Client Records by Customs Brokers

    Science.gov (United States)

    2012-03-26

    ...-0038] RIN 1651-AA80 Permissible Sharing of Client Records by Customs Brokers AGENCY: U.S. Customs and... would allow brokers, upon the client's consent in a written authorization, to share client information... services to the broker's clients. Although the proposed rule was prepared in response to a request from a...

  9. 75 FR 66050 - Permissible Sharing of Client Records by Customs Brokers

    Science.gov (United States)

    2010-10-27

    .... USCBP-2010-0038] RIN 1651-AA80 Permissible Sharing of Client Records by Customs Brokers AGENCIES... the Code of Federal Regulations (CFR) pertaining to the obligations of customs brokers to keep clients' information confidential. The proposed amendment would allow brokers, upon the client's consent in a written...

  10. 36 CFR 223.7 - Permission for free use of timber outside free-use areas.

    Science.gov (United States)

    2010-07-01

    ..., DEPARTMENT OF AGRICULTURE SALE AND DISPOSAL OF NATIONAL FOREST SYSTEM TIMBER General Provisions § 223.7 Permission for free use of timber outside free-use areas. Similar material may be cut outside of a free-use area without permit in cases of emergency, but the person taking such material shall promptly notify...

  11. 26 CFR 1.414(w)-1 - Permissible withdrawals from eligible automatic contribution arrangements.

    Science.gov (United States)

    2010-04-01

    ... contribution arrangements. 1.414(w)-1 Section 1.414(w)-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT... Plans, Etc. § 1.414(w)-1 Permissible withdrawals from eligible automatic contribution arrangements. (a) Overview. Section 414(w) provides rules under which certain employees are permitted to elect to make a...

  12. Maximum Permissible Risk Levels for Human Intake of Soil Contaminants: Fourth Series of Compounds

    NARCIS (Netherlands)

    Janssen PJCM; Apeldoorn ME van; Engelen JGM van; Schielen PCJI; Wouters MFA; CSR

    1998-01-01

    This report documents the human-toxicological risk assessment work done in 1996 and 1997 at RIVM's Centre for Substances and Risk Assessment within the scope of the RIVM project on soil intervention values for soil clean-up. The method used for derivation of the Maximum Permissible Risk, as

  13. Corruption and the Other(s: Scope of Superordinate Identity Matters for Corruption Permissibility.

    Directory of Open Access Journals (Sweden)

    Anne C Pisor

    Full Text Available The decision to engage in corruption-public and private corruption, nepotism, and embezzlement-is often attributed to rational actors maximizing benefits to themselves. However, the importance of reciprocal relationships in humans suggests that an actor may weigh the costs of harms of her corrupt behavior to individuals who may generate future benefits for her. We hypothesize that actors who have a larger circle of actual and potential social partners will have more individuals to consider when generating harms and will thus be less likely to find corrupt acts permissible than actors with smaller circles of valued others. Using data from the World Values Survey and European Values Study (WVS, we explore whether participants with a larger geographic identity or a greater number of group memberships (i.e. a larger scope of actual and potential social partners are less likely to find accepting bribes permissible. We find mixed support for our hypotheses, but consistently find that WVS participants with local, country, continent, or world geographic identities are less likely to find accepting a bribe permissible than those with regional identities-that is, actors whose primary identities that encompass more than their region find corruption less permissible. We discuss the importance of considering an actor's valuation of others when modeling corruption persistence, noting that establishing scopes of positive valuation is a precursor to predicting where actors will target benefits and shunt costs.

  14. Strategizing Communication

    DEFF Research Database (Denmark)

    Gulbrandsen, Ib Tunby; Just, Sine Nørholm

    beyond, but not past instrumental, rational plans in order to become better able to understand and manage the concrete, incremental practices and contexts in which communication becomes strategic. Thus, we argue that although strategic communicators do (and should) make plans, a plan in itself does...... of the specific communicative disciplines and practices employed by the organization and/or its individual members, be they marketing, public relations, corporate communication, branding, public affairs or social advocacy. In all cases, strategic communicators do well to focus more on the process of communicating...... for understanding and managing strategic communication processes....

  15. The path integral formulation of fractional Brownian motion for the general Hurst exponent

    International Nuclear Information System (INIS)

    Calvo, I; Sanchez, R

    2008-01-01

    In 1995, Sebastian (1995 J. Phys. A: Math. Gen. 28 4305) gave a path integral computation of the propagator of subdiffusive fractional Brownian motion (fBm), i.e. fBm with a Hurst or self-similarity exponent H element of (0, 1/2). The extension of Sebastian's calculation to superdiffusion, H element of (1/2, 1], becomes however quite involved due to the appearance of additional boundary conditions on fractional derivatives of the path. In this communication, we address the construction of the path integral representation in a different fashion, which allows us to treat both subdiffusion and superdiffusion on an equal footing. The derivation of the propagator of fBm for the general Hurst exponent is then performed in a neat and unified way. (fast track communication)

  16. Physical Layer Security Using Two-Path Successive Relaying

    Directory of Open Access Journals (Sweden)

    Qian Yu Liau

    2016-06-01

    Full Text Available Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.

  17. NEW UPPER AND LOWER BOUNDS LINE OF SIGHT PATH LOSS MODELS FOR MOBILE PROPAGATION IN BUILDINGS

    Directory of Open Access Journals (Sweden)

    Supachai Phaiboon

    2017-11-01

    Full Text Available This paper proposes a method to predict line-of-sight (LOS path loss in buildings. We performed measurements in two different type of buildings at a frequency of 1.8 GHz and propose new upper and lower bounds path loss models which depend on max and min values of sample path loss data. This makes our models limit path loss within the boundary lines. The models include time-variant effects such as people moving and cars in parking areas with their influence on wave propagation that is very high.  The results have shown that the proposed models will be useful for the system and cell design of indoor wireless communication systems.

  18. Propagation Path Loss Models for 5G Urban Micro- and Macro-Cellular Scenarios

    DEFF Research Database (Denmark)

    Sun, Shu; Rappaport, Theodore S.; Rangan, Sundeep

    2016-01-01

    This paper presents and compares two candidate large-scale propagation path loss models, the alpha-beta-gamma (ABG) model and the close-in (CI) free space reference distance model, for the design of fifth generation (5G) wireless communication systems in urban micro- and macro-cellular scenarios....

  19. Directional maximum likelihood self-estimation of the path-loss exponent

    NARCIS (Netherlands)

    Hu, Y.; Leus, G.J.T.; Dong, Min; Zheng, Thomas Fang

    2016-01-01

    The path-loss exponent (PLE) is a key parameter in wireless propagation channels. Therefore, obtaining the knowledge of the PLE is rather significant for assisting wireless communications and networking to achieve a better performance. Most existing methods for estimating the PLE not only require

  20. Joint modeling of constrained path enumeration and path choice behavior: a semi-compensatory approach

    DEFF Research Database (Denmark)

    Kaplan, Sigal; Prato, Carlo Giacomo

    2010-01-01

    A behavioural and a modelling framework are proposed for representing route choice from a path set that satisfies travellers’ spatiotemporal constraints. Within the proposed framework, travellers’ master sets are constructed by path generation, consideration sets are delimited according to spatio...

  1. Decision paths in complex tasks

    Science.gov (United States)

    Galanter, Eugene

    1991-01-01

    Complex real world action and its prediction and control has escaped analysis by the classical methods of psychological research. The reason is that psychologists have no procedures to parse complex tasks into their constituents. Where such a division can be made, based say on expert judgment, there is no natural scale to measure the positive or negative values of the components. Even if we could assign numbers to task parts, we lack rules i.e., a theory, to combine them into a total task representation. We compare here two plausible theories for the amalgamation of the value of task components. Both of these theories require a numerical representation of motivation, for motivation is the primary variable that guides choice and action in well-learned tasks. We address this problem of motivational quantification and performance prediction by developing psychophysical scales of the desireability or aversiveness of task components based on utility scaling methods (Galanter 1990). We modify methods used originally to scale sensory magnitudes (Stevens and Galanter 1957), and that have been applied recently to the measure of task 'workload' by Gopher and Braune (1984). Our modification uses utility comparison scaling techniques which avoid the unnecessary assumptions made by Gopher and Braune. Formula for the utility of complex tasks based on the theoretical models are used to predict decision and choice of alternate paths to the same goal.

  2. Practicality of diversion path analysis

    International Nuclear Information System (INIS)

    Murphey, W.M.; Schleter, J.C.

    1974-07-01

    One can define the safeguards system for nuclear material as the set of all protective actions taken to prevent or to deter attempts to divert nuclear material to unauthorized use. Maintenance of effective safeguards requires a program for routine assessment of plant safeguards systems in terms of their capabilities to satisfy safeguards aims. Plant internal control systems provide capabilities for detection of unprevented diversion and can provide assurance that diversion has not occurred. A procedure called Diversion Path Analysis (DPA) enables routine assessment of the capabilities of internal control systems in this regard and identification of safeguards problem areas in a plant. A framework for safeguards system design is also provided which will allow flexibility to accommodate individual plant circumstances while maintaining acceptable diversion detection capability. The steps of the procedure are described and the practicality of the analytical method is shown by referring to a demonstration test for a high throughput process where plant personnel were major participants. The boundary conditions for the demonstration case are given, along with some conclusions about the general procedure. (U.S.)

  3. Inked Careers: Tattooing Professional Paths

    Directory of Open Access Journals (Sweden)

    Gabriela DeLuca

    2016-12-01

    Full Text Available The concept of career has an interdisciplinary and historical constitution, which includes persons, groups, organizations and society. Given that, we aim to deepen the interactionist notion of career from the understanding of a deviant path, supported by a theory and a method appropriated to the cited call for interdisciplinary approaches. Dilemmas (Hughes, 1958 and conflicts (Hughes, 1937 emerged as important analytical categories. Although necessary, these two concepts were not sufficient to contemplate analyses in their entirety. For this reason we conceptualized a third possibility of controversy during a career: the inquiries. The study followed the Narrative method to analyze objective and subjective changes during a tattoo artist’s career through interviews and informal conversations carried out over 22 months. The discussion presents three main contributions. Theoretically, a new understanding of the concept of careers, linking past, present and future and the idea of non-linearity of experienced and envisioned careers. Methodologically, suggesting orientations for future career studies such as the use of turning points as a methodological tool and the investigation of deviant fields. Finally, our defense of the interactionist perspective as suitable for career studies, since it allows the investigation of deviant elements.

  4. Methodologies for tracking learning paths

    DEFF Research Database (Denmark)

    Frølunde, Lisbeth; Gilje, Øystein; Lindstrand, Fredrik

    2009-01-01

    filmmakers: what furthers their interest and/or hinders it, and what learning patterns emerge. The aim of this article is to present and discuss issues regarding the methodology and meth- ods of the study, such as developing a relationship with interviewees when conducting inter- views online (using MSN). We...... suggest two considerations about using online interviews: how the interviewees value the given subject of conversation and their familiarity with being online. The benefit of getting online communication with the young filmmakers offers ease, because it is both practical and appropriates a meeting...

  5. Quantum Secure Group Communication.

    Science.gov (United States)

    Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M

    2018-03-01

    We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.

  6. Optimal concurrent access strategies in mobile communication networks

    NARCIS (Netherlands)

    Bhulai, S.; Hoekstra, G.; van der Mei, R.D.

    2010-01-01

    Current wireless channel capacities are closely approaching the theoretical limit. Hence, further capacity improvements from complex signal processing schemes may only gain modest improvements. Multi-path communication approaches, however, combine the benefits of higher performance and reliability

  7. Two Generations of Path Dependence in Economics?

    DEFF Research Database (Denmark)

    Madsen, Mogens Ove

    2010-01-01

    Even if there is no fully articulated and generally accepted theory of Path Dependence it has eagerly been taken up across a wide range of social sciences – primarily coming from economics. Path Dependence is most of all a metaphor that offers reason to believe, that some political, social...

  8. Cooperative organic mine avoidance path planning

    Science.gov (United States)

    McCubbin, Christopher B.; Piatko, Christine D.; Peterson, Adam V.; Donnald, Creighton R.; Cohen, David

    2005-06-01

    The JHU/APL Path Planning team has developed path planning techniques to look for paths that balance the utility and risk associated with different routes through a minefield. Extending on previous years' efforts, we investigated real-world Naval mine avoidance requirements and developed a tactical decision aid (TDA) that satisfies those requirements. APL has developed new mine path planning techniques using graph based and genetic algorithms which quickly produce near-minimum risk paths for complicated fitness functions incorporating risk, path length, ship kinematics, and naval doctrine. The TDA user interface, a Java Swing application that obtains data via Corba interfaces to path planning databases, allows the operator to explore a fusion of historic and in situ mine field data, control the path planner, and display the planning results. To provide a context for the minefield data, the user interface also renders data from the Digital Nautical Chart database, a database created by the National Geospatial-Intelligence Agency containing charts of the world's ports and coastal regions. This TDA has been developed in conjunction with the COMID (Cooperative Organic Mine Defense) system. This paper presents a description of the algorithms, architecture, and application produced.

  9. Evaluation of Calcine Disposition Path Forward

    International Nuclear Information System (INIS)

    Birrer, S.A.; Heiser, M.B.

    2003-01-01

    This document describes an evaluation of the baseline and two alternative disposition paths for the final disposition of the calcine wastes stored at the Idaho Nuclear Technology and Engineering Center at the Idaho National Engineering and Environmental Laboratory. The pathways are evaluated against a prescribed set of criteria and a recommendation is made for the path forward

  10. Generalized measures and the Feynman path integral

    International Nuclear Information System (INIS)

    Maslov, V.P.; Chebotarev, A.M.

    1976-01-01

    Generalizations are obtained for the earlier results by the authors concerning the inclusion of the Feynmann path integral in the momentum representation into the general integration theory. Feynmann path integrals are considered which do not represent T-products. Generalized Feynmann measure in the configuration representation is introduced

  11. Approximate Shortest Homotopic Paths in Weighted Regions

    KAUST Repository

    Cheng, Siu-Wing; Jin, Jiongxin; Vigneron, Antoine; Wang, Yajun

    2010-01-01

    Let P be a path between two points s and t in a polygonal subdivision T with obstacles and weighted regions. Given a relative error tolerance ε ∈(0,1), we present the first algorithm to compute a path between s and t that can be deformed to P

  12. Paths and cycles in colored graphs

    NARCIS (Netherlands)

    Li, Xueliang; Zhang, Shenggui; Hurink, Johann L.; Pickl, Stefan; Broersma, Haitze J.; Faigle, U.

    2001-01-01

    Let G be an (edge-)colored graph. A path (cycle) is called monochromatic if all the edges of it have the same color, and is called heterochromatic if all the edges of it have different colors. In this note, some sufficient conditions for the existence of monochromatic and heterochromatic paths and

  13. Path Minima Queries in Dynamic Weighted Trees

    DEFF Research Database (Denmark)

    Davoodi, Pooya; Brodal, Gerth Stølting; Satti, Srinivasa Rao

    2011-01-01

    In the path minima problem on a tree, each edge is assigned a weight and a query asks for the edge with minimum weight on a path between two nodes. For the dynamic version of the problem, where the edge weights can be updated, we give data structures that achieve optimal query time\\todo{what about...

  14. Approximate shortest homotopic paths in weighted regions

    KAUST Repository

    Cheng, Siuwing; Jin, Jiongxin; Vigneron, Antoine E.; Wang, Yajun

    2012-01-01

    A path P between two points s and t in a polygonal subdivision T with obstacles and weighted regions defines a class of paths that can be deformed to P without passing over any obstacle. We present the first algorithm that, given P and a relative

  15. from synchronic variation to a grammaticalization path

    African Journals Online (AJOL)

    Kate H

    Abstract. The authors argue that the synchronic variation of cognate objects of weather verbs exhibited in six African languages of South Africa (Sepedi, Sesotho, Tshivenda, isiXhosa, Xitsonga, and. isiZulu) has a diachronic explanation, and may be represented as a grammaticalization path. This path gradually leads from ...

  16. CSR communication

    DEFF Research Database (Denmark)

    Golob, Ursa; Podnar, Klement; Elving, Wim

    2013-01-01

    Purpose – This paper aims to introduce the special issue on CSR communication attached to the First International CSR Communication Conference held in Amsterdam in October 2011. The aim of the introduction is also to review CSR communication papers published in scholarly journals in order to make...... a summary of the state of CSR communication knowledge. Design/methodology/approach – The existing literature on CSR communication was approached via systematic review. with a combination of conventional and summative qualitative content analysis. The final dataset contained 90 papers from two main business...... communications. The most important outlets for CSR communication-related topics are Journal of Business Ethics and Corporate Communications: An International Journal. Originality/value – This paper represents the first attempt to perform a systematic and comprehensive overview of CSR communication papers...

  17. Optimization of educational paths for higher education

    Science.gov (United States)

    Tarasyev, Alexandr A.; Agarkov, Gavriil; Medvedev, Aleksandr

    2017-11-01

    In our research, we combine the theory of economic behavior and the methodology of increasing efficiency of the human capital to estimate the optimal educational paths. We provide an optimization model for higher education process to analyze possible educational paths for each rational individual. The preferences of each rational individual are compared to the best economically possible educational path. The main factor of the individual choice, which is formed by the formation of optimal educational path, deals with higher salaries level in the chosen economic sector after graduation. Another factor that influences on the economic profit is the reduction of educational costs or the possibility of the budget support for the student. The main outcome of this research consists in correction of the governmental policy of investment in human capital based on the results of educational paths optimal control.

  18. Scientific communication

    Directory of Open Access Journals (Sweden)

    Aleksander Kobylarek

    2017-09-01

    Full Text Available The article tackles the problem of models of communication in science. The formal division of communication processes into oral and written does not resolve the problem of attitude. The author defines successful communication as a win-win game, based on the respect and equality of the partners, regardless of their position in the world of science. The core characteristics of the process of scientific communication are indicated , such as openness, fairness, support, and creation. The task of creating the right atmosphere for science communication belongs to moderators, who should not allow privilege and differentiation of position to affect scientific communication processes.

  19. Maximum permissible body burdens and maximum permissible concentrations of radionuclides in air and in water for occupational exposure. Recommendations of the National Committee on Radiation Protection. Handbook 69

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1959-06-05

    The present Handbook and its predecessors stem from the Second International Congress of Radiology, held in Stockholm in 1928. At that time, under the auspices of the Congress, the International Commission on Radiological Protection (ICRP) was organized to deal initially with problems of X-ray protection and later with radioactivity protection. At that time 'permissible' doses of X-rays were estimated primarily in terms of exposures which produced erythema, the amount of exposure which would produce a defined reddening of the skin. Obviously a critical problem in establishing criteria for radiation protection was one of developing useful standards and techniques of physical measurement. For this reason two of the organizations in this country with a major concern for X-ray protection, the American Roentgen Ray Society and the Radiology Society of North America, suggested that the National Bureau of Standards assume responsibility for organizing representative experts to deal with the problem. Accordingly, early in 1929, an Advisory Committee on X-ray and Radium Protection was organized to develop recommendations on the protection problem within the United States and to formulate United States points of view for presentation to the International Commission on Radiological Protection. The organization of the U.S. Advisory Committee included experts from both the medical and physical science fields. The recommendations of this Handbook take into consideration the NCRP statement entitled 'Maximum Permissible Radiation Exposures to Man', published as an addendum to Handbook 59 on April 15, 1958. As noted above this study was carried out jointly by the ICRP and the NCRP, and the complete report is more extensive than the material contained in this Handbook.

  20. Maximum permissible body burdens and maximum permissible concentrations of radionuclides in air and in water for occupational exposure. Recommendations of the National Committee on Radiation Protection. Handbook 69

    International Nuclear Information System (INIS)

    1959-01-01

    The present Handbook and its predecessors stem from the Second International Congress of Radiology, held in Stockholm in 1928. At that time, under the auspices of the Congress, the International Commission on Radiological Protection (ICRP) was organized to deal initially with problems of X-ray protection and later with radioactivity protection. At that time 'permissible' doses of X-rays were estimated primarily in terms of exposures which produced erythema, the amount of exposure which would produce a defined reddening of the skin. Obviously a critical problem in establishing criteria for radiation protection was one of developing useful standards and techniques of physical measurement. For this reason two of the organizations in this country with a major concern for X-ray protection, the American Roentgen Ray Society and the Radiology Society of North America, suggested that the National Bureau of Standards assume responsibility for organizing representative experts to deal with the problem. Accordingly, early in 1929, an Advisory Committee on X-ray and Radium Protection was organized to develop recommendations on the protection problem within the United States and to formulate United States points of view for presentation to the International Commission on Radiological Protection. The organization of the U.S. Advisory Committee included experts from both the medical and physical science fields. The recommendations of this Handbook take into consideration the NCRP statement entitled 'Maximum Permissible Radiation Exposures to Man', published as an addendum to Handbook 59 on April 15, 1958. As noted above this study was carried out jointly by the ICRP and the NCRP, and the complete report is more extensive than the material contained in this Handbook

  1. Determination of permissible exposure doses under the provisions of the regulations on installation and operation of marine reactors

    International Nuclear Information System (INIS)

    1979-01-01

    The Ministry of Transportation defines on radioactive doses in the controlled area that exterior radioactive dose shall be 30 mili-rem for a week; concentrations of radioactive materials in the air or under the water shall be permissible concentrations otherwise specified for the employees multiplied by 0.75 in average for a week and that densities of radioactive materials on the surface of the things contaminated by such materials shall be 1/10 of permissible surface densities provided in a table attached. Permissible exposure dose outside the inspected surrounding area is 0.5 rem for a year. Permissible surface densities are included in a list attached. Permissible accumulative dose for the employees is the figure (unit rem) calculated by the formula D = 5(N-18), when D means permissible accumulative dose and N number of the age. Permissible exposure dose is 3 rem for 3 months for the employees, 1.5 rem for a year for persons other than the employees and 12 rem for the urgent work. Permissible densities for the employees, calculation of doses by interior exposure and permissible densities outside the inspected surrounding area are stipulated in detail with attached lists. (Okada, K.)

  2. Rapid neural discrimination of communicative gestures.

    Science.gov (United States)

    Redcay, Elizabeth; Carlson, Thomas A

    2015-04-01

    Humans are biased toward social interaction. Behaviorally, this bias is evident in the rapid effects that self-relevant communicative signals have on attention and perceptual systems. The processing of communicative cues recruits a wide network of brain regions, including mentalizing systems. Relatively less work, however, has examined the timing of the processing of self-relevant communicative cues. In the present study, we used multivariate pattern analysis (decoding) approach to the analysis of magnetoencephalography (MEG) to study the processing dynamics of social-communicative actions. Twenty-four participants viewed images of a woman performing actions that varied on a continuum of communicative factors including self-relevance (to the participant) and emotional valence, while their brain activity was recorded using MEG. Controlling for low-level visual factors, we found early discrimination of emotional valence (70 ms) and self-relevant communicative signals (100 ms). These data offer neural support for the robust and rapid effects of self-relevant communicative cues on behavior. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  3. Reversible Communicating Processes

    Directory of Open Access Journals (Sweden)

    Geoffrey Brown

    2016-02-01

    Full Text Available Reversible distributed programs have the ability to abort unproductive computation paths and backtrack, while unwinding communication that occurred in the aborted paths. While it is natural to assume that reversibility implies full state recovery (as with traditional roll-back recovery protocols, an interesting alternative is to separate backtracking from local state recovery. For example, such a model could be used to create complex transactions out of nested compensable transactions where a programmer-supplied compensation defines the work required to "unwind" a transaction. Reversible distributed computing has received considerable theoretical attention, but little reduction to practice; the few published implementations of languages supporting reversibility depend upon a high degree of central control. The objective of this paper is to demonstrate that a practical reversible distributed language can be efficiently implemented in a fully distributed manner. We discuss such a language, supporting CSP-style synchronous communication, embedded in Scala. While this language provided the motivation for the work described in this paper, our focus is upon the distributed implementation. In particular, we demonstrate that a "high-level" semantic model can be implemented using a simple point-to-point protocol.

  4. Permissive and instructive anterior patterning rely on mRNA localization in the wasp embryo.

    Science.gov (United States)

    Brent, Ava E; Yucel, Gozde; Small, Stephen; Desplan, Claude

    2007-03-30

    The long-germ mode of embryogenesis, in which segments arise simultaneously along the anteriorposterior axis, has evolved several times in different lineages of the holometabolous, or fully metamorphosing, insects. Drosophila's long-germ fate map is established largely by the activity of the dipteran-specific Bicoid (Bcd) morphogen gradient, which operates both instructively and permissively to accomplish anterior patterning. By contrast, all nondipteran long-germ insects must achieve anterior patterning independently of bcd. We show that bcd's permissive function is mimicked in the wasp by a maternal repression system in which anterior localization of the wasp ortholog of giant represses anterior expression of the trunk gap genes so that head and thorax can properly form.

  5. Mycobacteria exploit nitric oxide-induced transformation of macrophages into permissive giant cells.

    Science.gov (United States)

    Gharun, Kourosh; Senges, Julia; Seidl, Maximilian; Lösslein, Anne; Kolter, Julia; Lohrmann, Florens; Fliegauf, Manfred; Elgizouli, Magdeldin; Vavra, Martina; Schachtrup, Kristina; Illert, Anna L; Gilleron, Martine; Kirschning, Carsten J; Triantafyllopoulou, Antigoni; Henneke, Philipp

    2017-12-01

    Immunity to mycobacteria involves the formation of granulomas, characterized by a unique macrophage (MΦ) species, so-called multinucleated giant cells (MGC). It remains unresolved whether MGC are beneficial to the host, that is, by prevention of bacterial spread, or whether they promote mycobacterial persistence. Here, we show that the prototypical antimycobacterial molecule nitric oxide (NO), which is produced by MGC in excessive amounts, is a double-edged sword. Next to its antibacterial capacity, NO propagates the transformation of MΦ into MGC, which are relatively permissive for mycobacterial persistence. The mechanism underlying MGC formation involves NO-induced DNA damage and impairment of p53 function. Moreover, MGC have an unsurpassed potential to engulf mycobacteria-infected apoptotic cells, which adds a further burden to their antimycobacterial capacity. Accordingly, mycobacteria take paradoxical advantage of antimicrobial cellular efforts by driving effector MΦ into a permissive MGC state. © 2017 The Authors.

  6. A Rational Threshold Signature Model and Protocol Based on Different Permissions

    Directory of Open Access Journals (Sweden)

    Bojun Wang

    2014-01-01

    Full Text Available This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security.

  7. Comparative Evaluation of Permissiveness to Dengue Virus Serotype 2 Infection in Primary Rodent Macrophages

    Directory of Open Access Journals (Sweden)

    Jeanette Prada-Arismendy

    2012-01-01

    Full Text Available Infection with dengue virus presents a broad clinical spectrum, which can range from asymptomatic cases to severe cases that are characterised by haemorrhagic syndrome and/or shock. The reason for such variability remains unknown. This work evaluated the in vitro permissiveness of mouse, rat, hamster and guinea pig macrophages to infection by dengue virus 2 (DENV2. The results established that macrophages derived from the BALB/c mouse strain showed higher permissiveness to DENV2 infection than macrophages from other rodent species, although all rodent species studied had the C820T mutation in the oligoadenylate synthetase 1b gene, indicating no relationship to the different in vitro susceptibilities of mouse cells at this locus. Other molecular mechanisms related to flavivirus susceptibility remain to be explored.

  8. Data communications

    International Nuclear Information System (INIS)

    Preckshot, G.G.

    1993-08-01

    The purpose of this paper is to recommend regulatory guidance for reviewers examining computer communication systems used in nuclear power plants. The recommendations cover three areas important to these communications systems: system design, communication protocols, and communication media. The first area, system design, considers three aspects of system design--questions about architecture, specific risky design elements or omissions to look for in designs being reviewed, and recommendations for multiplexed data communication systems used in safety systems. The second area reviews pertinent aspects of communication protocol design and makes recommendations for newly designed protocols or the selection of existing protocols for safety system, information display, and non-safety control system use. The third area covers communication media selection, which differs significantly from traditional wire and cable. The recommendations for communication media extend or enhance the concerns of published IEEE standards about three subjects: data rate, imported hazards and maintainability

  9. A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls

    OpenAIRE

    Xiaoqing Wang; Junfeng Wang; Xiaolan Zhu

    2016-01-01

    Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the An...

  10. Determination of Permissible Short-Time Emergency Overloading of Turbo-Generators and Synchronous Compensators

    Directory of Open Access Journals (Sweden)

    V. A. Anischenko

    2011-01-01

    Full Text Available The paper shows that failure to take into account variable ratio of short-time emergency overloading of turbo-generators (synchronous compensators that can lead to underestimation of overloading capacity or impermissible insulation over-heating.A method has been developed for determination of permissible duration of short-time emergency over-loading that takes into account changes of over-loading ratio in case of a failure.

  11. Multi-AGV path planning with double-path constraints by using an improved genetic algorithm.

    Directory of Open Access Journals (Sweden)

    Zengliang Han

    Full Text Available This paper investigates an improved genetic algorithm on multiple automated guided vehicle (multi-AGV path planning. The innovations embody in two aspects. First, three-exchange crossover heuristic operators are used to produce more optimal offsprings for getting more information than with the traditional two-exchange crossover heuristic operators in the improved genetic algorithm. Second, double-path constraints of both minimizing the total path distance of all AGVs and minimizing single path distances of each AGV are exerted, gaining the optimal shortest total path distance. The simulation results show that the total path distance of all AGVs and the longest single AGV path distance are shortened by using the improved genetic algorithm.

  12. The Effect of Competitive Rivalry on Internal Communication in Private Healthcare Organizations: Evidence from Istanbul, Turkey

    Directory of Open Access Journals (Sweden)

    Gültekin Altuntas

    2014-02-01

    Full Text Available Both competitive rivalry and internal communication play a crucial role for a business to position itself in a favourable manner in order to succeed particularly in a hostile environment. While numerous studies present the importance of competitive rivalry and of communication, even internal communication separately, little is known about the specific linkage of how competitive rivalry affects communication in the literature. Within the framework of internal communication, this study focuses on the notion that competitive rivalry is related to the path and style of communication as well as to the usage of internal communication tools but not to quality of communication. Thus, our research presents the linkage and the interaction between competitive rivalry and internal communication, of which the results indicate that, overall, competitive rivalry has a significant direct positive influence on internal communication dimensions in terms of path, style and quality of communication, as well as usage of communication tools in healthcare organizations.

  13. Communication, Communication, Communication! Growth through Laboratory Instructing

    Science.gov (United States)

    Peterson, Jamie J.; DeAngelo, Samantha; Mack, Nancy; Thompson, Claudia; Cooper, Jennifer; Sesma, Arturo, Jr.

    2014-01-01

    This study examined gains undergraduate students made in their communication and collaboration skills when they served as peer teachers, i.e., laboratory instructors (LIs), for a General Psychology laboratory. Self-ratings of communication and collaboration skills were completed before and after teaching the laboratory. When compared to before the…

  14. Participatory Communication

    DEFF Research Database (Denmark)

    Tufte, Thomas

    This user guide on participatory communication aims to answer the following questions: What do we mean when we say participatory communication? What are the practical implications of working with participatory communication strategies in development and social change processes? What practical exp......, tools, and experiences on how to implement participatory communications strategies. It is targeted toward government officials, World Bank staff, develompent workers in the field, and civil society....

  15. Permissive cytomegalovirus infection of primary villous term and first trimester trophoblasts.

    Science.gov (United States)

    Hemmings, D G; Kilani, R; Nykiforuk, C; Preiksaitis, J; Guilbert, L J

    1998-06-01

    Forty percent of women with primary cytomegalovirus (CMV) infections during pregnancy infect their fetuses with complications for the baby varying from mild to severe. How CMV crosses the syncytiotrophoblast, the barrier between maternal blood and fetal tissue in the villous placenta, is unknown. Virus may cross by infection of maternal cells that pass through physical breaches in the syncytiotrophoblast or by direct infection of the syncytiotrophoblast, with subsequent transmission to underlying fetal placental cells. In this study, we show that pure (>99.99%), long-term and healthy (>3 weeks) cultures of syncytiotrophoblasts are permissively infected with CMV. Greater than 99% of infectious progeny virus remained cell associated throughout culture periods up to 3 weeks. Infection of term trophoblasts required a higher virus inoculum, was less efficient, and progressed more slowly than parallel infections of placental and human embryonic lung fibroblasts. Three laboratory strains (AD169, Towne, and Davis) and a clinical isolate from a congenitally infected infant all permissively infected trophoblasts, although infection efficiencies varied. The infection of first trimester syncytiotrophoblasts with strain AD169 occurred at higher frequency and progressed more rapidly than infection of term cells but less efficiently and rapidly than infection of fibroblasts. These results show that villous syncytiotrophoblasts can be permissively infected by CMV but that the infection requires high virus titers and proceeds slowly and that progeny virus remains predominantly cell associated.

  16. PROBABILISTIC APPROACH FOR THE DETERMINATION OF CUTS PERMISSIBLE BRAKING MODES ON THE GRAVITY HUMPS

    Directory of Open Access Journals (Sweden)

    Volodymyr BOBROVSKYI

    2016-03-01

    Full Text Available The paper presents the research results of cuts braking modes on the gravity humps. The objective of this paper is developing the methods for assessment of braking modes of cuts under conditions of fuzziness of their rolling properties, as well as selecting the permissible starting speed range of cuts from retardant positions. As a criterion for assessing the modes of target control of cut rolling speed, it was proposed to use an average gap size on a classification track at the established norms of probable exceeding of permissible speed of cars collision and their stop in retarders. As a criterion for evaluating the modes of interval control of cuts rolling speed, using the risk of their non-separation on the switches was proposed. Using the simulation modeling and mathematical statistics, the configuration of the range of permissible speed of cuts coming out from retardant positions has been set. The conducted researches allow simplifying the choice of cut braking modes in systems of automatic control of cut rolling speed.

  17. Integrated path towards geological storage

    International Nuclear Information System (INIS)

    Bouchard, R.; Delaytermoz, A.

    2004-01-01

    Among solutions to contribute to CO 2 emissions mitigation, sequestration is a promising path that presents the main advantage of being able to cope with the large volume at stake when considering the growing energy demand. Of particular importance, geological storage has widely been seen as an effective solution for large CO 2 sources like power plants or refineries. Many R and D projects have been initiated, whereby research institutes, government agencies and end-users achieve an effective collaboration. So far, progress has been made towards reinjection of CO 2 , in understanding and then predicting the phenomenon and fluid dynamics inside the geological target, while monitoring the expansion of the CO 2 bubble in the case of demonstration projects. A question arises however when talking about sequestration, namely the time scale to be taken into account. Time is indeed of the essence, and points out the need to understand leakage as well as trapping mechanisms. It is therefore of prime importance to be able to predict the fate of the injected fluids, in an accurate manner and over a relevant period of time. On the grounds of geology, four items are involved in geological storage reliability: the matrix itself, which is the recipient of the injected fluids; the seal, that is the mechanistic trap preventing the injected fluids to flow upward and escape; the lower part of the concerned structure, usually an aquifer, that can be a migration way for dissolved fluids; and the man- made injecting hole, the well, whose characteristics should be as good as the geological formation itself. These issues call for specific competencies such as reservoir engineering, geology and hydrodynamics, mineral chemistry, geomechanics, and well engineering. These competencies, even if put to use to a large extent in the oil industry, have never been connected with the reliability of geological storage as ultimate goal. This paper aims at providing an introduction to these

  18. Cultural Communications.

    Science.gov (United States)

    Armas, Jose

    It is too often taken for granted that the communication process with culturally different children takes place as readily as it might with children from Anglo cultures. Most teachers receive training in verbal and formal communication skills; children come to school with nonverbal and informal communication skills. This initially can create…

  19. Stereotypes Communication

    Science.gov (United States)

    Zhang, Shuli; Deng, Dongyuan

    2009-01-01

    We live in a world, which is becoming a Global Village in which information and communication attract people's attention more than ever before. Our desire to communicate with strangers and our relationships with them depend on the degree to which we are effective in communicating with them. There are so many factors restricting or improving…

  20. Communication Speaks

    Science.gov (United States)

    Kinman, Robin Lynn

    2010-01-01

    When the author recently turned her attention to the National Council of Teachers of Mathematics (NCTM) "Principles and Standards," she was startled to see communication as key. She adjusted her teaching to meet the NCTM Communication Standard and promote communication in her classroom by providing a safe environment, developing discourse and…

  1. Ripple Communication.

    Science.gov (United States)

    Wilcox, R. Stimson

    1980-01-01

    Discusses how surface-dwelling animals use the water surface as a mode of communication by making ripple signals while they swim about. Provides information about surfaces and surface waves, ripple communication in water striders, ripple signal characteristics, sensing and orienting, other modes of communication, and evolution of ripple…

  2. Integrated robust controller for vehicle path following

    Energy Technology Data Exchange (ETDEWEB)

    Mashadi, Behrooz; Ahmadizadeh, Pouyan, E-mail: p-ahmadizadeh@iust.ac.ir; Majidi, Majid, E-mail: m-majidi@iust.ac.ir [Iran University of Science and Technology, School of Automotive Engineering (Iran, Islamic Republic of); Mahmoodi-Kaleybar, Mehdi, E-mail: m-mahmoodi-k@iust.ac.ir [Iran University of Science and Technology, School of Mechanical Engineering (Iran, Islamic Republic of)

    2015-02-15

    The design of an integrated 4WS+DYC control system to guide a vehicle on a desired path is presented. The lateral dynamics of the path follower vehicle is formulated by considering important parameters. To reduce the effect of uncertainties in vehicle parameters, a robust controller is designed based on a μ-synthesis approach. Numerical simulations are performed using a nonlinear vehicle model in MATLAB environment in order to investigate the effectiveness of the designed controller. Results of simulations show that the controller has a profound ability to making the vehicle track the desired path in the presence of uncertainties.

  3. Path integral for relativistic particle theory

    International Nuclear Information System (INIS)

    Fradkin, E.S.; Gitman, D.M.; Shvartsman, Sh.M.

    1990-06-01

    An action for a relativistic spinning particle interacting with external electromagnetic field is considered in reparametrization and local supergauge invariant form. It is shown that various path integral representations derived for the causal Green function correspond to the different forms of the relativistic particle action. The analogy of the path integral derived with the Lagrangian path integral of the field theory is discussed. It is shown that to obtain the causal propagator, the integration over the null mode of the Lagrangian multiplier corresponding to the reparametrization invariance, has to be performed in the (0,+infinity) limits. (author). 23 refs

  4. Integrated robust controller for vehicle path following

    International Nuclear Information System (INIS)

    Mashadi, Behrooz; Ahmadizadeh, Pouyan; Majidi, Majid; Mahmoodi-Kaleybar, Mehdi

    2015-01-01

    The design of an integrated 4WS+DYC control system to guide a vehicle on a desired path is presented. The lateral dynamics of the path follower vehicle is formulated by considering important parameters. To reduce the effect of uncertainties in vehicle parameters, a robust controller is designed based on a μ-synthesis approach. Numerical simulations are performed using a nonlinear vehicle model in MATLAB environment in order to investigate the effectiveness of the designed controller. Results of simulations show that the controller has a profound ability to making the vehicle track the desired path in the presence of uncertainties

  5. Path-Goal Theory of Leadership

    Science.gov (United States)

    1975-04-01

    Leadership and Turnover Among Managers ," Organization Behavior and Human Performance, 10(1973), pp. 184-200; R. J. House, "A Path-Goal Theory of...of Leadership ." 6R. J. House and G. Dessler, "Path-Goal Theory of Leadership " R. M. Stqg- dill. Managers , Employees, Organization (Ohio State...of Control." 23 R. J. House, "Notes on the Path-Goal Theory of Leadership " (University of Toronto, Faculty of Management Studies, May 1974). 24 R

  6. Path integral representations on the complex sphere

    Energy Technology Data Exchange (ETDEWEB)

    Grosche, C. [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2007-08-15

    In this paper we discuss the path integral representations for the coordinate systems on the complex sphere S{sub 3C}. The Schroedinger equation, respectively the path integral, separates in exactly 21 orthogonal coordinate systems. We enumerate these coordinate systems and we are able to present the path integral representations explicitly in the majority of the cases. In each solution the expansion into the wave-functions is stated. Also, the kernel and the corresponding Green function can be stated in closed form in terms of the invariant distance on the sphere, respectively on the hyperboloid. (orig.)

  7. Path probabilities of continuous time random walks

    International Nuclear Information System (INIS)

    Eule, Stephan; Friedrich, Rudolf

    2014-01-01

    Employing the path integral formulation of a broad class of anomalous diffusion processes, we derive the exact relations for the path probability densities of these processes. In particular, we obtain a closed analytical solution for the path probability distribution of a Continuous Time Random Walk (CTRW) process. This solution is given in terms of its waiting time distribution and short time propagator of the corresponding random walk as a solution of a Dyson equation. Applying our analytical solution we derive generalized Feynman–Kac formulae. (paper)

  8. Path integral representations on the complex sphere

    International Nuclear Information System (INIS)

    Grosche, C.

    2007-08-01

    In this paper we discuss the path integral representations for the coordinate systems on the complex sphere S 3C . The Schroedinger equation, respectively the path integral, separates in exactly 21 orthogonal coordinate systems. We enumerate these coordinate systems and we are able to present the path integral representations explicitly in the majority of the cases. In each solution the expansion into the wave-functions is stated. Also, the kernel and the corresponding Green function can be stated in closed form in terms of the invariant distance on the sphere, respectively on the hyperboloid. (orig.)

  9. Positroids Induced by Rational Dyck Paths

    OpenAIRE

    Gotti, Felix

    2017-01-01

    A rational Dyck path of type $(m,d)$ is an increasing unit-step lattice path from $(0,0)$ to $(m,d) \\in \\mathbb{Z}^2$ that never goes above the diagonal line $y = (d/m)x$. On the other hand, a positroid of rank $d$ on the ground set $[d+m]$ is a special type of matroid coming from the totally nonnegative Grassmannian. In this paper we describe how to naturally assign a rank $d$ positroid on the ground set $[d+m]$, which we name rational Dyck positroid, to each rational Dyck path of type $(m,d...

  10. Unusual bond paths in organolithium compounds

    International Nuclear Information System (INIS)

    Bachrach, S.M.; Ritchie, J.P.

    1986-01-01

    We have applied the topological method to a number of organolithium compounds. The wavefunctions were determined with GAUSSIAN-82 using 3-21G basis set and fully optimized geometries. Gradient paths were obtained using the RHODER package and critical points were located using EXTREME. These results indicate the unusual nature of organolithium compounds. The strange bond paths arise mainly from the ionic nature of the C-Li interaction. We suggest that the term ''bond path'' may best be suited for covalent bonds. 4 figs., 1 tab

  11. New framework for the Feynman path integral

    International Nuclear Information System (INIS)

    Shaharir, M.Z.

    1986-01-01

    The well-known Fourier integral solution of the free diffusion equation in an arbitrary Euclidean space is reduced to Feynmannian integrals using the method partly contained in the formulation of the Fresnelian integral. By replacing the standard Hilbert space underlying the present mathematical formulation of the Feynman path integral by a new Hilbert space, the space of classical paths on the tangent bundle to the Euclidean space (and more general to an arbitrary Riemannian manifold) equipped with a natural inner product, we show that our Feynmannian integral is in better agreement with the qualitative features of the original Feynman path integral than the previous formulations of the integral

  12. Realizing spaces as path-component spaces

    OpenAIRE

    Banakh, Taras; Brazas, Jeremy

    2018-01-01

    The path component space of a topological space $X$ is the quotient space $\\pi_0(X)$ whose points are the path components of $X$. We show that every Tychonoff space $X$ is the path-component space of a Tychonoff space $Y$ of weight $w(Y)=w(X)$ such that the natural quotient map $Y\\to \\pi_0(Y)=X$ is a perfect map. Hence, many topological properties of $X$ transfer to $Y$. We apply this result to construct a compact space $X\\subset \\mathbb{R}^3$ for which the fundamental group $\\pi_1(X,x_0)$ is...

  13. The Impact of Different Permissible Exposure Limits on Hearing Threshold Levels Beyond 25 dBA.

    Science.gov (United States)

    Sayapathi, Balachandar S; Su, Anselm Ting; Koh, David

    2014-10-01

    Development of noise-induced hearing loss is reliant on a few factors such as frequency, intensity, and duration of noise exposure. The occurrence of this occupational malady has doubled from 120 million to 250 million in a decade. Countries such as Malaysia, India, and the US have adopted 90 dBA as the permissible exposure limit. According to the US Occupational Safety and Health Administration (OSHA), the exposure limit for noise is 90 dBA, while that of the US National Institute of Occupational Safety and Health (NIOSH) is 85 dBA for 8 hours of noise exposure. This study aimed to assess the development of hearing threshold levels beyond 25 dBA on adoption of 85 dBA as the permissible exposure limit compared to 90 dBA. This is an intervention study done on two automobile factories. There were 203 employees exposed to noise levels beyond the action level. Hearing protection devices were distributed to reduce noise levels to a level between the permissible exposure limit and action level. The permissible exposure limits were 90 and 85 dBA in factories 1 and 2, respectively, while the action levels were 85 and 80 dBA, respectively. The hearing threshold levels of participants were measured at baseline and at first month of postshift exposure of noise. The outcome was measured by a manual audiometer. McNemar and chi-square tests were used in the statistical analysis. We found that hearing threshold levels of more than 25 dBA has changed significantly from pre-intervention to post-intervention among participants from both factories (3000 Hz for the right ear and 2000 Hz for the left ear). There was a statistically significant association between participants at 3000 Hz on the right ear at 'deteriorated' level ( χ² (1) = 4.08, φ = - 0.142, P = 0.043), whereas there was worsening of hearing threshold beyond 25 dBA among those embraced 90 dBA. The adoption of 85 dBA as the permissible exposure limit has preserved hearing threshold level among participants at 3000 Hz

  14. Workability: The Path to Entrepreneurship

    Directory of Open Access Journals (Sweden)

    Darline Maria Santos Bulhões

    2016-07-01

    Full Text Available Since the late twentieth century, it has been seen that the progress of information technology is changing everyday business. Advents such as telecommunications, for example, are increasing the speed of work, facilitating communication between people and changing to the way of doing business. From the moment at which transform organizational processes, information technologies also bring changes to the dynamics of the work. Thus, both the job security as employability, which is a job for life, are concepts that are becoming distant from everyday human. Emerge a new concept, the workability, which involves the individual's ability to generate income without necessarily having an employment relationship. In this sense, the worker becomes a production unit itself, from the administration of their own abilities and skills, acting as an entrepreneur. Given this, the purpose of this article is to show that the concepts of workability and entrepreneurship go together, and this concept dependent on that. The construction of this article was carried out bibliographic research with the issues involved. This study is structured as follows: in the first part, is carried out a review of existing changes in the current world and the implications for entrepreneurship. Then the concepts of entrepreneurship, workability and employability are explained. Then the methodology is presented, followed by the results and discussion. Finally, this study is closed through the final considerations.

  15. Communication Acoustics

    DEFF Research Database (Denmark)

    Blauert, Jens

    Communication Acoustics deals with the fundamentals of those areas of acoustics which are related to modern communication technologies. Due to the advent of digital signal processing and recording in acoustics, these areas have enjoyed an enormous upswing during the last 4 decades. The book...... the book a source of valuable information for those who want to improve or refresh their knowledge in the field of communication acoustics - and to work their way deeper into it. Due to its interdisciplinary character Communication Acoustics is bound to attract readers from many different areas, such as......: acoustics, cognitive science, speech science, and communication technology....

  16. Analysis on Human Blockage Path Loss and Shadow Fading in Millimeter-Wave Band

    Directory of Open Access Journals (Sweden)

    Hongmei Zhao

    2017-01-01

    Full Text Available Millimeter-wave (Mm-w is the trend of communication development in the future; users who carry mobile communication equipment could be blocked by others in a crowded population environment. Based on Shooting and Bouncing Ray (SBR method and setting up different orientation receivers (RX, population density, and people fabric property at 28 GHz and 38 GHz, simulating experimental scene similar to station square by Wireless Insite software, we use least square method to do linear-regression analysis for path loss and build path loss model. The result shows that the path loss index has a certain change in the different frequency, orientation receivers, population density, and people fabric. The path loss index of RouteC1 and RouteA2 has an obvious change in the central transmitter (TX. Each route shadow fading obeys Gaussian distribution whose mean is 0. This paper’s result has a theoretical guiding for designing the communication system in a crowded population environment.

  17. Permissive hypercapnia for the prevention of morbidity and mortality in mechanically ventilated newborn infants.

    Science.gov (United States)

    Woodgate, P G; Davies, M W

    2001-01-01

    Experimental animal data and uncontrolled, observational studies in human infants have suggested that hyperventilation and hypocapnia may be associated with increased pulmonary and neurodevelopmental morbidity. Protective ventilatory strategies allowing higher levels of arterial CO2 (permissive hypercapnia) are now widely used in adult critical care. The aggressive pursuit of normocapnia in ventilated newborn infants may contribute to the already present burden of lung disease. However, the safe or ideal range for PCO2 in this vulnerable population has not been established. To assess whether, in mechanically ventilated neonates, a strategy of permissive hypercapnia improves short and long term outcomes (esp. mortality, duration of respiratory support, incidence of chronic lung disease and neurodevelopmental outcome). Standard strategies of the Cochrane Neonatal Review Group were used. Searches were made of the Oxford Database of Perinatal Trials, MEDLINE, CINAHL, and Current Contents. Searches were also made of previous reviews including cross-referencing, abstracts, and conference and symposia proceedings published in Pediatric Research. All randomised controlled trials in which a strategy of permissive hypercapnia was compared with conventional strategies aimed at achieving normocapnia (or lower levels of hypercapnia) in newborn infants who are mechanically ventilated were eligible. Standard methods of the Cochrane Neonatal Review Group were used. Trials identified by the search strategy were independently reviewed by each author and assessed for eligibility and trial quality. Data were extracted separately. Differences were compared and resolved. Additional information was requested from trial authors. Only published data were available for review. Results are expressed as relative risk and risk difference for dichotomous outcomes, and weighted mean difference for continuous variables. Two trials involving 269 newborn infants were included. Meta-analysis of

  18. Determination of permissible doses under the provisions of the regulations on installation and operation of reactors for power generation

    International Nuclear Information System (INIS)

    1979-01-01

    The determination is defined under the regulations on installation and operation of reactors for power generation. In the controlled area exterior radiation dose shall be 30 mili-rem for a week by the Minister of International Trade and Industry. The concentrations of radioactive materials in the air or under the water shall be permissible concentrations specified for the employees multiplied by 0.75 in average for a week. The densities of radioactive materials on the surface of the things contaminated by such materials shall be 1/10 of permissible surface densities stipulated in the table attached. Permissible exposure dose outside the inspected surrounding area is 0.5 rem for a year. Permissible surface densities are included in the table attached. Permissible accumulative dose for the employees is the figure (unit rem) calculated by the formula D = 5(N-18), when D means permissible accumulative dose and N number of the age. Permissible exposure dose is 3 rem for 3 months for the employees, 1.5 rem for a year for persons other than the employees and 12 rem for the urgent work. Permissible concentrations are defined in detail for the employees and outside the inspected surrounding area. Calculation of exposure dose in the case of interior exposure is particularly provided for. (Okada, K.)

  19. 29 CFR 3.5 - Payroll deductions permissible without application to or approval of the Secretary of Labor.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Payroll deductions permissible without application to or approval of the Secretary of Labor. 3.5 Section 3.5 Labor Office of the Secretary of Labor CONTRACTORS AND... STATES § 3.5 Payroll deductions permissible without application to or approval of the Secretary of Labor...

  20. Data communications

    International Nuclear Information System (INIS)

    Ann, Byeong Ho; Baek, Jeong Hun

    1998-01-01

    The contents of this book are notion of data communications : summary on data communication, data transmission, data communications system, data transmission technology, data conversion, data link control and control over error of data transmission and exchange of data communications network in the first part, computer communications network architecture : data communications architecture, OSI model, lower layer of OSI model, upper layer of OSI model and distributed surroundings in the second part, data information networking : LAN, FDDI, 100 Base T, DQDB and Frame Relay in the third part, Public Network : PSDN, N-ISDN, B-ISDN in the fourth part, internet and PC communication : emulator program, Binary file, BBS, E-mail service and user on-line service in the last part.

  1. Euclidean shortest paths exact or approximate algorithms

    CERN Document Server

    Li, Fajie

    2014-01-01

    This book reviews algorithms for the exact or approximate solution of shortest-path problems, with a specific focus on a class of algorithms called rubberband algorithms. The coverage includes mathematical proofs for many of the given statements.

  2. Northern Pintail - Flight Path Telemetry [ds117

    Data.gov (United States)

    California Natural Resource Agency — North-south flight paths of radio-tagged female northern pintails were monitored in a section of Highway 152 near Los Banos, California during 4 and 11 November and...

  3. Ductility behavior of irradiated path B alloys

    International Nuclear Information System (INIS)

    Yang, W.J.S.; Hamilton, M.L.

    1983-01-01

    The objective of this study was to assess the practicality of using five Path B alloys in their current form as structural materials in the Fusion First-Wall/Blanket by evaluating both their postirradiation ductility and the corresponding microstructures

  4. AEDT sensor path methods using BADA4

    Science.gov (United States)

    2017-06-01

    This report documents the development and use of sensor path data processing in the Federal Aviation Administration's (FAAs) Aviation Environmental Design Tool (AEDT). The methods are primarily intended to assist analysts with using AEDT to determ...

  5. Modeling and Solving the Train Pathing Problem

    Directory of Open Access Journals (Sweden)

    Chuen-Yih Chen

    2009-04-01

    Full Text Available In a railroad system, train pathing is concerned with the assignment of trains to links and tracks, and train timetabling allocates time slots to trains. In this paper, we present an optimization heuristic to solve the train pathing and timetabling problem. This heuristic allows the dwell time of trains in a station or link to be dependent on the assigned tracks. It also allows the minimum clearance time between the trains to depend on their relative status. The heuristic generates a number of alternative paths for each train service in the initialization phase. Then it uses a neighborhood search approach to find good feasible combinations of these paths. A linear program is developed to evaluate the quality of each combination that is encountered. Numerical examples are provided.

  6. Search Path Evaluation Incorporating Object Placement Structure

    National Research Council Canada - National Science Library

    Baylog, John G; Wettergren, Thomas A

    2007-01-01

    This report describes a computationally robust approach to search path performance evaluation where the objects of search interest exhibit structure in the way in which they occur within the search space...

  7. A Local Search Modeling for Constrained Optimum Paths Problems (Extended Abstract

    Directory of Open Access Journals (Sweden)

    Quang Dung Pham

    2009-10-01

    Full Text Available Constrained Optimum Path (COP problems appear in many real-life applications, especially on communication networks. Some of these problems have been considered and solved by specific techniques which are usually difficult to extend. In this paper, we introduce a novel local search modeling for solving some COPs by local search. The modeling features the compositionality, modularity, reuse and strengthens the benefits of Constrained-Based Local Search. We also apply the modeling to the edge-disjoint paths problem (EDP. We show that side constraints can easily be added in the model. Computational results show the significance of the approach.

  8. Multiagent path-finding in strategic games

    OpenAIRE

    Mihevc, Simon

    2014-01-01

    In this thesis I worked on creating, comparing and improving algorithms for multi-agent path planning on a domain typical for real-time strategy games. I implemented and compared Multiagent pathfinding using clearance and Multiagent pathfinding using independence detection and operator decomposition. I discovered that they had problems maintaining group compactness and took too long to calculate the path. I considerably improved the efficiency of both algorithms.

  9. Diversion Path Analysis Handbook. Volume 1. Methodology

    International Nuclear Information System (INIS)

    Goodwin, K.E.; Schleter, J.C.; Maltese, M.D.K.

    1978-11-01

    Diversion Path Analysis (DPA) is a safeguards evaluation tool which is used to determine the vulnerability of the Material Control and Material Accounting (MC and MA) Subsystems to the threat of theft of Special Nuclear Material (SNM) by a knowledgeable Insider. The DPA team should consist of two individuals who have technical backgrounds. The implementation of DPA is divided into five basic steps: Information and Data Gathering, Process Characterization, Analysis of Diversion Paths, Results and Findings, and Documentation

  10. Feasible Path Planning for Autonomous Vehicles

    Directory of Open Access Journals (Sweden)

    Vu Trieu Minh

    2014-01-01

    Full Text Available The objective of this paper is to find feasible path planning algorithms for nonholonomic vehicles including flatness, polynomial, and symmetric polynomial trajectories subject to the real vehicle dynamical constraints. Performances of these path planning methods are simulated and compared to evaluate the more realistic and smoother generated trajectories. Results show that the symmetric polynomial algorithm provides the smoothest trajectory. Therefore, this algorithm is recommended for the development of an automatic control for autonomous vehicles.

  11. A career path in clinical pathways.

    Science.gov (United States)

    Bower, K A

    1998-03-01

    Much like the development of a clinical path, the creation of a career path requires knowledge of patterns of behavior, needs for standardized education and skill development, along with variance analysis and individualized care. This nationally known nursing entrepreneur tells the story of her involvement in the development of case management and clinical pathways and how she turned that into a successful business that has changed how patient care is managed nationally and internationally.

  12. Acquisition Path Analysis as a Collaborative Activity

    International Nuclear Information System (INIS)

    Nakao, A.; Grundule, R.; Gushchyn, K.; El Gebaly, A.; Higgy, R.; Tsvetkov, I.; Mandl, W.

    2015-01-01

    In the International Atomic Energy Agency, acquisition path analysis (APA) is indispensable to safeguards implementation. It is an integral part of both State evaluation process and the development of State level safeguards approaches, all performed through ongoing collaborative analysis of all available safeguards relevant information by State evaluation groups (SEG) with participation of other contributors, as required. To perform comprehensive State evaluation, to develop and revise State-level safeguards approaches, and to prepare annual implementation plans, the SEG in its collaborative analysis follows accepted safeguards methodology and guidance. In particular, the guide ''Performing Acquisition Path Analysis for the Development of a State-level Safeguards Approach for a State with a CSA'' is used. This guide identifies four major steps of the APA process: 1. Consolidating information about the State's past, present and planned nuclear fuel cycle-related capabilities and infrastructure; 2. Identifying and visually presenting technically plausible acquisition paths for the State; 3. Assessing acquisition path steps (State's technical capabilities and possible actions) along the identified acquisition paths; and 4. Assessing the time needed to accomplish each identified technically plausible acquisition path for the State. The paper reports on SEG members' and other contributors' experience with APA when following the above steps, including the identification of plausible acquisition pathways, estimation of time frames for all identified steps and determination of the time needed to accomplish each acquisition path. The difficulties that the SEG encountered during the process of performing the APA are also addressed. Feedback in the form of practical suggestions for improving the clarity of the acquisition path step assessment forms and a proposal for software support are also included. (author)

  13. Lattice Paths and the Constant Term

    International Nuclear Information System (INIS)

    Brak, R; Essam, J; Osborn, J; Owczarek, A L; Rechnitzer, A

    2006-01-01

    We firstly review the constant term method (CTM), illustrating its combinatorial connections and show how it can be used to solve a certain class of lattice path problems. We show the connection between the CTM, the transfer matrix method (eigenvectors and eigenvalues), partial difference equations, the Bethe Ansatz and orthogonal polynomials. Secondly, we solve a lattice path problem first posed in 1971. The model stated in 1971 was only solved for a special case - we solve the full model

  14. Radioactive contamination of foodstuffs: determination of permissible levels; Contamination radioactive des denrees alimentaires: determination des niveaux admissibles

    Energy Technology Data Exchange (ETDEWEB)

    Ledermann, S [Commissariat a l' Energie Atomique, Fontenay- aux-Roses (France). Centre d' Etudes Nucleaires

    1965-07-01

    In a latent air-soil contamination situation, the population would receive 80 per cent of its contamination through foodstuffs. The supervision of this food poses many problems: sampling, radionuclide dosages, etc. It is also necessary to estimate the maximum permissible concentration of radionuclides in foodstuffs, once the maximum exposure limit for the human body has been fixed. The passage of this level to the maximum concentrations is not simple since a) each radionuclide has its own particular effect on the body; b) their concentrations vary from one foodstuff to another, and c) the average amounts of foodstuffs vary from one population to another. Two methods are given here for estimating the maximum permissible concentrations in foodstuffs, together with the first diets likely to become critical when several of them are to be considered simultaneously. The results depend on the way in which the present situation can change to become critical. This evolutionary path can only be estimated approximately. Two methods are therefore given for studying the sensitivity of the results. As an example, a numerical application of these methods using data actually available is given. The data used is naturally incomplete and this will always be true. This application test indicates however two fields in which an improvement is absolutely necessary. 1 - The obtention of multiple observations (simultaneous dosage of at least 2 radionuclides in the same foodstuff, and simultaneous dosage of at least two foodstuffs for the same radionuclide); this assumes a combined effort by the various organisms; 2 - The reaching of an agreement on the dosage methods used by the various organisms since the results actually available are not comparable. (authors) [French] Dans une situation de contamination air-sol latente, la contamination des populations se ferait a 80 pour cent par l'alimentation. Surveiller cette alimentation pose des problemes complexes: echantillonnage, dosage des

  15. Computing Diffeomorphic Paths for Large Motion Interpolation.

    Science.gov (United States)

    Seo, Dohyung; Jeffrey, Ho; Vemuri, Baba C

    2013-06-01

    In this paper, we introduce a novel framework for computing a path of diffeomorphisms between a pair of input diffeomorphisms. Direct computation of a geodesic path on the space of diffeomorphisms Diff (Ω) is difficult, and it can be attributed mainly to the infinite dimensionality of Diff (Ω). Our proposed framework, to some degree, bypasses this difficulty using the quotient map of Diff (Ω) to the quotient space Diff ( M )/ Diff ( M ) μ obtained by quotienting out the subgroup of volume-preserving diffeomorphisms Diff ( M ) μ . This quotient space was recently identified as the unit sphere in a Hilbert space in mathematics literature, a space with well-known geometric properties. Our framework leverages this recent result by computing the diffeomorphic path in two stages. First, we project the given diffeomorphism pair onto this sphere and then compute the geodesic path between these projected points. Second, we lift the geodesic on the sphere back to the space of diffeomerphisms, by solving a quadratic programming problem with bilinear constraints using the augmented Lagrangian technique with penalty terms. In this way, we can estimate the path of diffeomorphisms, first, staying in the space of diffeomorphisms, and second, preserving shapes/volumes in the deformed images along the path as much as possible. We have applied our framework to interpolate intermediate frames of frame-sub-sampled video sequences. In the reported experiments, our approach compares favorably with the popular Large Deformation Diffeomorphic Metric Mapping framework (LDDMM).

  16. Quantum cosmology based on discrete Feynman paths

    International Nuclear Information System (INIS)

    Chew, Geoffrey F.

    2002-01-01

    Although the rules for interpreting local quantum theory imply discretization of process, Lorentz covariance is usually regarded as precluding time quantization. Nevertheless a time-discretized quantum representation of redshifting spatially-homogeneous universe may be based on discrete-step Feynman paths carrying causal Lorentz-invariant action--paths that not only propagate the wave function but provide a phenomenologically-promising elementary-particle Hilbert-space basis. In a model under development, local path steps are at Planck scale while, at a much larger ''wave-function scale'', global steps separate successive wave-functions. Wave-function spacetime is but a tiny fraction of path spacetime. Electromagnetic and gravitational actions are ''at a distance'' in Wheeler-Feynman sense while strong (color) and weak (isospin) actions, as well as action of particle motion, are ''local'' in a sense paralleling the action of local field theory. ''Nonmaterial'' path segments and ''trivial events'' collaborate to define energy and gravity. Photons coupled to conserved electric charge enjoy privileged model status among elementary fermions and vector bosons. Although real path parameters provide no immediate meaning for ''measurement'', the phase of the complex wave function allows significance for ''information'' accumulated through ''gentle'' electromagnetic events involving charged matter and ''soft'' photons. Through its soft-photon content the wave function is an ''information reservoir''

  17. Permissive hypotension in the extremely low birthweight infant with signs of good perfusion.

    LENUS (Irish Health Repository)

    Dempsey, E M

    2012-01-31

    INTRODUCTION: Many practitioners routinely treat infants whose mean arterial blood pressure in mm Hg is less than their gestational age in weeks (GA). OBJECTIVE: To assess the effectiveness of utilising a combined approach of clinical signs, metabolic acidosis and absolute blood pressure (BP) values when deciding to treat hypotension in the extremely low birthweight (ELBW) infant. METHODS: Retrospective cohort study of all live born ELBW infants admitted to our neonatal intensive care unit over a 4-year period. Patients were grouped as either normotensive (BP never less than GA), hypotensive and not treated (BPpermissive hypotension) and hypotensive treated (BPpermissive hypotension had similar outcomes. Mean blood pressure in the permissive group increased from 26 mm Hg at 6 h to 31 mm Hg at 24 h. In a logistic regression model, treated hypotension is independently associated with mortality, odds ratio 8.0 (95% CI 2.3 to 28, p<0.001). CONCLUSIONS: Blood pressure spontaneously improves in ELBW infants during the first 24 h. Infants hypotensive on GA criteria but with clinical evidence of good perfusion had as good an outcome as normotensive patients. Treated low blood pressure was associated with adverse outcome.

  18. Task Allocation and Path Planning for Collaborative Autonomous Underwater Vehicles Operating through an Underwater Acoustic Network

    Directory of Open Access Journals (Sweden)

    Yueyue Deng

    2013-01-01

    Full Text Available Dynamic and unstructured multiple cooperative autonomous underwater vehicle (AUV missions are highly complex operations, and task allocation and path planning are made significantly more challenging under realistic underwater acoustic communication constraints. This paper presents a solution for the task allocation and path planning for multiple AUVs under marginal acoustic communication conditions: a location-aided task allocation framework (LAAF algorithm for multitarget task assignment and the grid-based multiobjective optimal programming (GMOOP mathematical model for finding an optimal vehicle command decision given a set of objectives and constraints. Both the LAAF and GMOOP algorithms are well suited in poor acoustic network condition and dynamic environment. Our research is based on an existing mobile ad hoc network underwater acoustic simulator and blind flooding routing protocol. Simulation results demonstrate that the location-aided auction strategy performs significantly better than the well-accepted auction algorithm developed by Bertsekas in terms of task-allocation time and network bandwidth consumption. We also demonstrate that the GMOOP path-planning technique provides an efficient method for executing multiobjective tasks by cooperative agents with limited communication capabilities. This is in contrast to existing multiobjective action selection methods that are limited to networks where constant, reliable communication is assumed to be available.

  19. Imperfect Reworking Process Consideration in Integrated Inventory Model under Permissible Delay in Payments

    Directory of Open Access Journals (Sweden)

    Ming-Cheng Lo

    2008-01-01

    Full Text Available This study develops an improved inventory model to help the enterprises to advance their profit increasing and cost reduction in a single vendor single-buyer environment with general demand curve, adjustable production rate, and imperfect reworking process under permissible delay in payments. For advancing practical use in a real world, we are concerned with the following strategy determining, which includes the buyer's optimal selling price, order quantity, and the number of shipments per production run from the vendor to the buyer. An algorithm and numerical analysis are used to illustrate the solution procedure.

  20. Free Radical Oxidation in Rat Myocardium after Maximum Permissible Hepatic Resection.

    Science.gov (United States)

    Ermolaev, P A; Khramykh, T P; Barskaya, L O

    2016-03-01

    Free radical oxidation in rat myocardial homogenate was studied by chemiluminescent assay during the early terms after maximum permissible liver resection. During this period, activation of free radical oxidation was biphasic. The critical terms characterized by dramatic intensification of free radical oxidation in the myocardium are the first hour and the first day after surgery. The period from 3 to 12 h after surgery, in which the indices of chemiluminescence decrease, can be tentatively termed as the period of "putative wellbeing". Normalization of the free radical oxidation processes in the myocardium occurred by day 7 after surgery.

  1. Determination of the longest permissible distance between expansion compensators in gas transmission pipelines

    Energy Technology Data Exchange (ETDEWEB)

    Huening, R [Fachhochschule Muenster, Burgsteinfurt (Germany, F.R.). Fachbereich Versorgungstechnik

    1977-01-01

    In order to effectively protect long-distance gas pipelines against mountain damage in the areas in which underground mining is done, expansion compensators must be built in at certain distances. The tests to determine the slippage resistance and the highest permissible distance of expanders Lsub(max) in a transmission line NW 600 having a plastic insulation are described in this work. In addition, a way of calculating the Lsub(max) value from the existing data for pipes of varying diameter and different insulating material is shown.

  2. Studies on the establishment of maximum permissible exposure dose for reference Korean

    International Nuclear Information System (INIS)

    Kim, Y.J.; Lee, K.S.; Chun, K.C.; Kim, C.B.; Chung, K.H.; Kim, S.L.; Kim, M.J.

    1981-01-01

    In order to establish the Reference Korean and maximum permissible exposure dose of Reference Korean, for the first year a total of 9,758 males and 7,019 females were surveyed for the height, weight, a body surface area, and a total of 879 individuals of 180 households located in different 30 localities were analyzed for food consumption and a total of radioactive substances (β-ray) contained in food per capita per day. In this report the external and internal exposure dose were also estimated on the basis of data mostly published in other country as well as in Korea in part

  3. Influence of the composition of radionuclide mixtures on the maximum permissible concentration

    International Nuclear Information System (INIS)

    Schillinger, K.; Schuricht, V.

    1975-08-01

    By dividing radionuclides according to their formation mechanisms it is possible to assess the influence of separate partial mixtures on the maximum permissible concentration (MPC) of the total mixture without knowing exactly their contribution to the total activity. Calculations showed that the MPC of a total mixture of unsoluble radionuclides, which may occur in all fields of peaceful uses of nuclear energy, depends on the gastrointestinal tract as the critical organ and on the composition of the fission product mixture. The influence of fractionation on the MPC can be reglected in such a case, whereas in case of soluble radionuclides this is not possible

  4. Two warehouse inventory model for deteriorating item with exponential demand rate and permissible delay in payment

    Directory of Open Access Journals (Sweden)

    Kaliraman Naresh Kumar

    2017-01-01

    Full Text Available A two warehouse inventory model for deteriorating items is considered with exponential demand rate and permissible delay in payment. Shortage is not allowed and deterioration rate is constant. In the model, one warehouse is rented and the other is owned. The rented warehouse is provided with better facility for the stock than the owned warehouse, but is charged more. The objective of this model is to find the best replenishment policies for minimizing the total appropriate inventory cost. A numerical illustration and sensitivity analysis is provided.

  5. The Impact of Different Permissible Exposure Limits on Hearing Threshold Levels Beyond 25 dBA

    OpenAIRE

    Sayapathi, Balachandar S; Su, Anselm Ting; Koh, David

    2014-01-01

    Background: Development of noise-induced hearing loss is reliant on a few factors such as frequency, intensity, and duration of noise exposure. The occurrence of this occupational malady has doubled from 120 million to 250 million in a decade. Countries such as Malaysia, India, and the US have adopted 90 dBA as the permissible exposure limit. According to the US Occupational Safety and Health Administration (OSHA), the exposure limit for noise is 90 dBA, while that of the US National Institut...

  6. Prototype Centralized Managing Permissions System Based on the Election Multibiometric Authentication

    Directory of Open Access Journals (Sweden)

    Alexey Nikolaevich Ruchay

    2013-02-01

    Full Text Available This work aims to develop a prototype system of centralized managing permissions based on the election multibiometric authentication. The novelty of this work is to develop the principles of distinction and multi-factor authentication, because at the moment there is no such development. Depending on various conditions and factors, including the availability of electronic means and convenience, resistance to attacks and exploits, disease or injury of users the biometric authentication can be selected on the basis of any such biometrics as rhythm password, voice, dynamic signatures and graphics recognition.

  7. Communication theory

    DEFF Research Database (Denmark)

    Stein, Irene F.; Stelter, Reinhard

    2011-01-01

    Communication theory covers a wide variety of theories related to the communication process (Littlejohn, 1999). Communication is not simply an exchange of information, in which we have a sender and a receiver. This very technical concept of communication is clearly outdated; a human being...... is not a data processing device. In this chapter, communication is understood as a process of shared meaning-making (Bruner, 1990). Human beings interpret their environment, other people, and themselves on the basis of their dynamic interaction with the surrounding world. Meaning is essential because people...... ascribe specific meanings to their experiences, their actions in life or work, and their interactions. Meaning is reshaped, adapted, and transformed in every communication encounter. Furthermore, meaning is cocreated in dialogues or in communities of practice, such as in teams at a workplace or in school...

  8. Postcultural Communication?

    DEFF Research Database (Denmark)

    Jensen, Iben

    2015-01-01

    When we as scholars use the concept of intercultural communication in its classic definition, as communication between people with different cultural backgrounds, we perpetuate the notion that national differences influence communication more than other differences; in doing so, ethnic minorities...... is presented as a postcultural prism composed by practice theory (Schatzki 1996, Reckwitz 2002, Nicolini 2012, Kemmis 2012), Intersectionality (Brah, Phoenix, Collins Rahsack) and positioning theory (Harre & Langenhove 1998)....

  9. SHORT COMMUNICATION

    African Journals Online (AJOL)

    Preferred Customer

    Absorption of arsenic in inhaled air borne particles is highly dependent on the ... study. Arsenic is found in the earth crust and the activities of underground mining involving ... electrons within the coil to flow in the closed annular paths. .... Cameron, N.; Fitzgerald, M.; Li, H.; Robin, J.; Yskollari, M.; Dodova, E. Measurement of.

  10. Spline-based automatic path generation of welding robot

    Institute of Scientific and Technical Information of China (English)

    Niu Xuejuan; Li Liangyu

    2007-01-01

    This paper presents a flexible method for the representation of welded seam based on spline interpolation. In this method, the tool path of welding robot can be generated automatically from a 3D CAD model. This technique has been implemented and demonstrated in the FANUC Arc Welding Robot Workstation. According to the method, a software system is developed using VBA of SolidWorks 2006. It offers an interface between SolidWorks and ROBOGUIDE, the off-line programming software of FANUC robot. It combines the strong modeling function of the former and the simulating function of the latter. It also has the capability of communication with on-line robot. The result data have shown its high accuracy and strong reliability in experiments. This method will improve the intelligence and the flexibility of the welding robot workstation.

  11. ISO 9001 benefits and pitfalls: the path to successful certification.

    Science.gov (United States)

    Krause, M S

    1996-09-01

    The lifeblood of a business is developing and commercializing new products with minimum cost and time and maximum quality. Implementation of a quality management system is often used to achieve these goals, and the ISO 9001 standard for a business quality system is rapidly becoming the model of choice. The existence of an ISO-compliant system is a key to meeting the forthcoming regulatory requirements in the European Union and the US Food and Drug Administrations's proposed good management practices. DuPont has demonstrated leadership in the achievement of ISO registration. I describe the path to these successful registrations along with key lessons from the experience. Elements of success are management commitment, adequate resources, education, communication, total organizational involvement, and auditing of system performance. For the system to flourish and provide benefits to the users, sufficient time must be allocated for the organization to change.

  12. Running shoes and running injuries: mythbusting and a proposal for two new paradigms: 'preferred movement path' and 'comfort filter'.

    Science.gov (United States)

    Nigg, B M; Baltich, J; Hoerzer, S; Enders, H

    2015-10-01

    In the past 100 years, running shoes experienced dramatic changes. The question then arises whether or not running shoes (or sport shoes in general) influence the frequency of running injuries at all. This paper addresses five aspects related to running injuries and shoe selection, including (1) the changes in running injuries over the past 40 years, (2) the relationship between sport shoes, sport inserts and running injuries, (3) previously researched mechanisms of injury related to footwear and two new paradigms for injury prevention including (4) the 'preferred movement path' and (5) the 'comfort filter'. Specifically, the data regarding the relationship between impact characteristics and ankle pronation to the risk of developing a running-related injury is reviewed. Based on the lack of conclusive evidence for these two variables, which were once thought to be the prime predictors of running injuries, two new paradigms are suggested to elucidate the association between footwear and injury. These two paradigms, 'the preferred movement path' and 'the comfort filter', suggest that a runner intuitively selects a comfortable product using their own comfort filter that allows them to remain in the preferred movement path. This may automatically reduce the injury risk and may explain why there does not seem to be a secular trend in running injury rates. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  13. Forces in Motzkin paths in a wedge

    International Nuclear Information System (INIS)

    Janse van Rensburg, E J

    2006-01-01

    Entropic forces in models of Motzkin paths in a wedge geometry are considered as models of forces in polymers in confined geometries. A Motzkin path in the square lattice is a path from the origin to a point in the line Y = X while it never visits sites below this line, and it is constrained to give unit length steps only in the north and east directions and steps of length √2 in the north-east direction. Motzkin path models may be generalized to ensembles of NE-oriented paths above the line Y = rX, where r > 0 is an irrational number. These are paths giving east, north and north-east steps from the origin in the square lattice, and confined to the r-wedge formed by the Y-axis and the line Y = rX. The generating function g r of these paths is not known, but if r > 1, then I determine its radius of convergence to be t r = min (r-1)/r≤y≤r/(r+1) [y y (1-r(1-y)) 1-r(1-y) (r(1-y)-y) r(1-y)-y ] and if r is an element of (0, 1), then t r = 1/3. The entropic force the path exerts on the line Y rX may be computed from this. An asymptotic expression for the force for large values of r is given by F(r) = log(2r)/r 2 - (1+2log(2r))/2r 3 + O (log(2r)/r 4 ). In terms of the vertex angle α of the r-wedge, the moment of the force about the origin has leading terms F(α) log(2/α) - (α/2)(1+2log(2/α)) + O(α 2 log(2/α)) as α → 0 + and F(α) = 0 if α is element of [π/4, π/2]. Moreover, numerical integration of the force shows that the total work done by closing the wedge is 1.085 07... lattice units. An alternative ensemble of NE-oriented paths may be defined by slightly changing the generating function g r . In this model, it is possible to determine closed-form expressions for the limiting free energy and the force. The leading term in an asymptotic expansions for this force agrees with the leading term in the asymptotic expansion of the above model, and the subleading term only differs by a factor of 2

  14. Primary Human Placental Trophoblasts are Permissive for Zika Virus (ZIKV) Replication.

    Science.gov (United States)

    Aagaard, Kjersti M; Lahon, Anismrita; Suter, Melissa A; Arya, Ravi P; Seferovic, Maxim D; Vogt, Megan B; Hu, Min; Stossi, Fabio; Mancini, Michael A; Harris, R Alan; Kahr, Maike; Eppes, Catherine; Rac, Martha; Belfort, Michael A; Park, Chun Shik; Lacorazza, Daniel; Rico-Hesse, Rebecca

    2017-01-27

    Zika virus (ZIKV) is an emerging mosquito-borne (Aedes genus) arbovirus of the Flaviviridae family. Although ZIKV has been predominately associated with a mild or asymptomatic dengue-like disease, its appearance in the Americas has been accompanied by a multi-fold increase in reported incidence of fetal microcephaly and brain malformations. The source and mode of vertical transmission from mother to fetus is presumptively transplacental, although a causal link explaining the interval delay between maternal symptoms and observed fetal malformations following infection has been missing. In this study, we show that primary human placental trophoblasts from non-exposed donors (n = 20) can be infected by primary passage ZIKV-FLR isolate, and uniquely allowed for ZIKV viral RNA replication when compared to dengue virus (DENV). Consistent with their being permissive for ZIKV infection, primary trophoblasts expressed multiple putative ZIKV cell entry receptors, and cellular function and differentiation were preserved. These findings suggest that ZIKV-FLR strain can replicate in human placental trophoblasts without host cell destruction, thereby serving as a likely permissive reservoir and portal of fetal transmission with risk of latent microcephaly and malformations.

  15. Access to a Loaded Gun Without Adult Permission and School-Based Bullying.

    Science.gov (United States)

    Simckes, Maayan S; Simonetti, Joseph A; Moreno, Megan A; Rivara, Frederick P; Oudekerk, Barbara A; Rowhani-Rahbar, Ali

    2017-09-01

    Gun access and bullying are risk factors for sustaining or perpetrating violence among adolescents. Our knowledge of gun access among bullied students is limited. We used data on students, aged 12-18 years, from the 2011 and 2013 School Crime Supplement to the National Crime Victimization Survey to assess the association between self-reported bullying victimization (traditional and cyber) and access to a loaded gun without adult permission. Prevalence ratios (PRs) and confidence intervals (CIs) were obtained from multivariable Poisson regression using the Taylor series after controlling for student age, sex, family income, public/private school, and race. Of 10,704 participants, 4.2% (95% CI: 3.8%-4.6%) reported gun access. Compared with nonbullied students, those who reported traditional bullying (PR = 2.2; 95% CI: 1.7-2.4), cyberbullying (PR = 2.8; 95% CI: 1.6-4.9), and both (PR = 5.9; 95% CI: 4.6-7.7) were more likely to also report gun access. Adolescents who experience bullying, particularly those who report both traditional bullying and cyberbullying, are more likely to report access to a loaded gun without adult permission. These findings highlight the importance of developing interventions focused on these modifiable risk factors for preventing self-directed or interpersonal violence among youth. Copyright © 2017 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  16. Immortalized sheep microglial cells are permissive to a diverse range of ruminant viruses.

    Science.gov (United States)

    Stanton, James B; Swanson, Beryl; Orozco, Edith; Muñoz-Gutiérrez, Juan F; Evermann, James F; Ridpath, Julia F

    2017-12-01

    Ruminants, including sheep and goats (small ruminants), are key agricultural animals in many parts of the world. Infectious diseases, including many viral diseases, are significant problems to efficient production of ruminants. Unfortunately, reagents tailored to viruses of ruminants, and especially small ruminants, are lacking compared to other animals more typically used for biomedical research. The purpose of this study was to determine the permissibility of a stably immortalized, sheep microglial cell line to viruses that are reported to infect ruminants: bovine viral diarrhea virus (BVDV), bovine herpesvirus 1 (BoHV-1), small ruminant lentiviruses (SRLV), and bovine respiratory syncytial virus (BRSV). Sublines A and H of previously isolated, immortalized, and characterized (CD14-positive) ovine microglial cells were used. Bovine turbinate cells and goat synovial membrane cells were used for comparison. Cytopathic changes were used to confirm infection of individual wells, which were then counted and used to calculate the 50% tissue culture infectious dose. Uninoculated cells served as negative controls and confirmed that the cells were not previously infected with these viruses using polymerase chain reaction (PCR). Inoculation of the two microglial cell sublines with laboratory and field isolates of BVDV, BoHV-1, and BRSV resulted in viral infection in a manner similar to bovine turbinate cells. Immortalized microglia cells are also permissive to SRLV, similar to goat synovial membrane cells. These immortalized sheep microglial cells provide a new tool for the study of ruminant viruses in ruminant microglial cell line.

  17. Maximum permissible dietary contamination after the accidental release of radioactive materials from a nuclear reactor

    Energy Technology Data Exchange (ETDEWEB)

    Pochin, E E; Rock Carling, Ernest; Court Brown, W M [Medical Research Council, Committee on Protection against Ionizing Radiations, London (United Kingdom); and others

    1960-12-01

    After the accident to No. 1 pile at Windscale on October 10, 1957 (Atomic Energy Office, 1957), the Atomic Energy Authority asked the Medical Research Council for advice on the maximum intake of certain radioactive isotopes that should be regarded as permissible, under emergency conditions, for members of the general population living in, or deriving food from, an area contaminated owing to an accident to a reactor. The Council's Committee on Protection against Ionizing Radiations, together with its Subcommittees on Internal and External Radiations, has considered this problem, and concludes that the intake of radioactive materials by ingestion of contaminated food would generally be the limiting source of hazard after any such accident. Intake by inhalation, or radiation from the exterior, would become of importance only in rather special circumstances. In the following report, therefore, the Committee proposes maximum permissible levels of dietary contamination for the relevant isotopes in the emergency conditions envisaged. In proposing these levels, the Protection Committee has used the fullest information available on the radiation doses that would be delivered to different body tissues and at different ages by the isotopes concerned, and on the ways in which these materials would enter the body.

  18. Maximum permissible dietary contamination after the accidental release of radioactive materials from a nuclear reactor

    International Nuclear Information System (INIS)

    Pochin, E.E.; Rock Carling, Ernest; Court Brown, W.M.

    1960-01-01

    After the accident to No. 1 pile at Windscale on October 10, 1957 (Atomic Energy Office, 1957), the Atomic Energy Authority asked the Medical Research Council for advice on the maximum intake of certain radioactive isotopes that should be regarded as permissible, under emergency conditions, for members of the general population living in, or deriving food from, an area contaminated owing to an accident to a reactor. The Council's Committee on Protection against Ionizing Radiations, together with its Subcommittees on Internal and External Radiations, has considered this problem, and concludes that the intake of radioactive materials by ingestion of contaminated food would generally be the limiting source of hazard after any such accident. Intake by inhalation, or radiation from the exterior, would become of importance only in rather special circumstances. In the following report, therefore, the Committee proposes maximum permissible levels of dietary contamination for the relevant isotopes in the emergency conditions envisaged. In proposing these levels, the Protection Committee has used the fullest information available on the radiation doses that would be delivered to different body tissues and at different ages by the isotopes concerned, and on the ways in which these materials would enter the body

  19. NASA Space Radiation Protection Strategies: Risk Assessment and Permissible Exposure Limits

    Science.gov (United States)

    Huff, J. L.; Patel, Z. S.; Simonsen, L. C.

    2017-01-01

    Permissible exposure limits (PELs) for short-term and career astronaut exposures to space radiation have been set and approved by NASA with the goal of protecting astronauts against health risks associated with ionizing radiation exposure. Short term PELs are intended to prevent clinically significant deterministic health effects, including performance decrements, which could threaten astronaut health and jeopardize mission success. Career PELs are implemented to control late occurring health effects, including a 3% risk of exposure induced death (REID) from cancer, and dose limits are used to prevent cardiovascular and central nervous system diseases. For radiation protection, meeting the cancer PEL is currently the design driver for galactic cosmic ray and solar particle event shielding, mission duration, and crew certification (e.g., 1-year ISS missions). The risk of cancer development is the largest known long-term health consequence following radiation exposure, and current estimates for long-term health risks due to cardiovascular diseases are approximately 30% to 40% of the cancer risk for exposures above an estimated threshold (Deep Space one-year and Mars missions). Large uncertainties currently exist in estimating the health risks of space radiation exposure. Improved understanding through radiobiology and physics research allows increased accuracy in risk estimation and is essential for ensuring astronaut health as well as for controlling mission costs, optimization of mission operations, vehicle design, and countermeasure assessment. We will review the Space Radiation Program Element's research strategies to increase accuracy in risk models and to inform development and validation of the permissible exposure limits.

  20. A guide for the calculation of the maximum permissible costs for shelters

    International Nuclear Information System (INIS)

    Schwarzlose, H.

    1981-01-01

    Among other things, this paper has the aim to define the scope which is reasonable for shelter costs as well as to inform about their real amount. Various assumptions have been made and examples have been given which seldom coincide with the specific facts. Thus, the possibility of how to find solutions which are precisely appropriate for persons is shown in a formula. The less the income, life expectancy and the number of persons to be considered the less are the maximum permissible costs for shelters. Under certain conditions the permissible costs are lower than the real costs. Thus, taking those assumptions into account, the shelter is not profitable any more. This case, for example, really applies to a couple, 57 years old, without children, with an income of 40,000 DM/year who intend to build an interior shelter. For a family with children who are under age, however, it is always profitable to build an interior basic shelter. (orig.) [de

  1. Path optimization method for the sign problem

    Directory of Open Access Journals (Sweden)

    Ohnishi Akira

    2018-01-01

    Full Text Available We propose a path optimization method (POM to evade the sign problem in the Monte-Carlo calculations for complex actions. Among many approaches to the sign problem, the Lefschetz-thimble path-integral method and the complex Langevin method are promising and extensively discussed. In these methods, real field variables are complexified and the integration manifold is determined by the flow equations or stochastically sampled. When we have singular points of the action or multiple critical points near the original integral surface, however, we have a risk to encounter the residual and global sign problems or the singular drift term problem. One of the ways to avoid the singular points is to optimize the integration path which is designed not to hit the singular points of the Boltzmann weight. By specifying the one-dimensional integration-path as z = t +if(t(f ϵ R and by optimizing f(t to enhance the average phase factor, we demonstrate that we can avoid the sign problem in a one-variable toy model for which the complex Langevin method is found to fail. In this proceedings, we propose POM and discuss how we can avoid the sign problem in a toy model. We also discuss the possibility to utilize the neural network to optimize the path.

  2. The formal path integral and quantum mechanics

    International Nuclear Information System (INIS)

    Johnson-Freyd, Theo

    2010-01-01

    Given an arbitrary Lagrangian function on R d and a choice of classical path, one can try to define Feynman's path integral supported near the classical path as a formal power series parameterized by 'Feynman diagrams', although these diagrams may diverge. We compute this expansion and show that it is (formally, if there are ultraviolet divergences) invariant under volume-preserving changes of coordinates. We prove that if the ultraviolet divergences cancel at each order, then our formal path integral satisfies a 'Fubini theorem' expressing the standard composition law for the time evolution operator in quantum mechanics. Moreover, we show that when the Lagrangian is inhomogeneous quadratic in velocity such that its homogeneous-quadratic part is given by a matrix with constant determinant, then the divergences cancel at each order. Thus, by 'cutting and pasting' and choosing volume-compatible local coordinates, our construction defines a Feynman-diagrammatic 'formal path integral' for the nonrelativistic quantum mechanics of a charged particle moving in a Riemannian manifold with an external electromagnetic field.

  3. Perfect discretization of reparametrization invariant path integrals

    International Nuclear Information System (INIS)

    Bahr, Benjamin; Dittrich, Bianca; Steinhaus, Sebastian

    2011-01-01

    To obtain a well-defined path integral one often employs discretizations. In the case of gravity and reparametrization-invariant systems, the latter of which we consider here as a toy example, discretizations generically break diffeomorphism and reparametrization symmetry, respectively. This has severe implications, as these symmetries determine the dynamics of the corresponding system. Indeed we will show that a discretized path integral with reparametrization-invariance is necessarily also discretization independent and therefore uniquely determined by the corresponding continuum quantum mechanical propagator. We use this insight to develop an iterative method for constructing such a discretized path integral, akin to a Wilsonian RG flow. This allows us to address the problem of discretization ambiguities and of an anomaly-free path integral measure for such systems. The latter is needed to obtain a path integral, that can act as a projector onto the physical states, satisfying the quantum constraints. We will comment on implications for discrete quantum gravity models, such as spin foams.

  4. Perfect discretization of reparametrization invariant path integrals

    Science.gov (United States)

    Bahr, Benjamin; Dittrich, Bianca; Steinhaus, Sebastian

    2011-05-01

    To obtain a well-defined path integral one often employs discretizations. In the case of gravity and reparametrization-invariant systems, the latter of which we consider here as a toy example, discretizations generically break diffeomorphism and reparametrization symmetry, respectively. This has severe implications, as these symmetries determine the dynamics of the corresponding system. Indeed we will show that a discretized path integral with reparametrization-invariance is necessarily also discretization independent and therefore uniquely determined by the corresponding continuum quantum mechanical propagator. We use this insight to develop an iterative method for constructing such a discretized path integral, akin to a Wilsonian RG flow. This allows us to address the problem of discretization ambiguities and of an anomaly-free path integral measure for such systems. The latter is needed to obtain a path integral, that can act as a projector onto the physical states, satisfying the quantum constraints. We will comment on implications for discrete quantum gravity models, such as spin foams.

  5. Impact of Beamforming on the Path Connectivity in Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Le The Dung

    2017-03-01

    Full Text Available This paper investigates the impact of using directional antennas and beamforming schemes on the connectivity of cognitive radio ad hoc networks (CRAHNs. Specifically, considering that secondary users use two kinds of directional antennas, i.e., uniform linear array (ULA and uniform circular array (UCA antennas, and two different beamforming schemes, i.e., randomized beamforming and center-directed to communicate with each other, we study the connectivity of all combination pairs of directional antennas and beamforming schemes and compare their performances to those of omnidirectional antennas. The results obtained in this paper show that, compared with omnidirectional transmission, beamforming transmission only benefits the connectivity when the density of secondary user is moderate. Moreover, the combination of UCA and randomized beamforming scheme gives the highest path connectivity in all evaluating scenarios. Finally, the number of antenna elements and degree of path loss greatly affect path connectivity in CRAHNs.

  6. Current-Sensitive Path Planning for an Underactuated Free-Floating Ocean Sensorweb

    Science.gov (United States)

    Dahl, Kristen P.; Thompson, David R.; McLaren, David; Chao, Yi; Chien, Steve

    2011-01-01

    This work investigates multi-agent path planning in strong, dynamic currents using thousands of highly under-actuated vehicles. We address the specific task of path planning for a global network of ocean-observing floats. These submersibles are typified by the Argo global network consisting of over 3000 sensor platforms. They can control their buoyancy to float at depth for data collection or rise to the surface for satellite communications. Currently, floats drift at a constant depth regardless of the local currents. However, accurate current forecasts have become available which present the possibility of intentionally controlling floats' motion by dynamically commanding them to linger at different depths. This project explores the use of these current predictions to direct float networks to some desired final formation or position. It presents multiple algorithms for such path optimization and demonstrates their advantage over the standard approach of constant-depth drifting.

  7. Championship Communication

    Science.gov (United States)

    VanDerveer, Beth; Butterick, Betsy

    2017-01-01

    This article discusses team development and focuses specifically on championship communication and team-building activities. Team development takes time and the process typically occurs in stages. Regardless of the sport or what the competitive field may look like, communication is an often overlooked, yet vital element in cultivating a…

  8. Effective communication

    International Nuclear Information System (INIS)

    Kuntz, B.S.

    1989-01-01

    At the Waste Isolation Pilot Plant (WIPP) the responsibilities assigned to public affairs (PA) include communications to two main groups: institutional representatives and the general public. Research data indicates that these two populations perceive risk in different fashions. This paper discusses these distinct perceptions and how the communication programs at WIPP have been designed to accommodate these two differences

  9. Satellite Communications

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Satellite Communications. Arthur C Clarke wrote a seminal paper in 1945 in wireless world. Use three satellites in geo-synchronous orbit to enable intercontinental communications. System could be realised in '50 to 100 years'

  10. Paths to Licensure: Things Physicists Should Know

    Science.gov (United States)

    Stewart, Gay; Stewart, John

    2016-03-01

    The path to licensure can be quite complicated, and can thwart a physics department's efforts to produce more and better prepared high school physics teachers. Each state has different pathways to licensure. Acronyms like CAEP and SPA are not within the normal physicist's vocabulary. Some understanding of this topic can allow physics faculty advisers to help our students so that fewer are derailed on their path to the classroom, or take a path that will leave them less well prepared if they do find themselves there. Examples of different approaches that work within state licensure systems from two different states will be presented. Physics teacher preparation efforts in both Arkansas and West Virginia have been supported in part by the Physics Teacher Education Coalition (PhysTEC).

  11. A taxonomy of integral reaction path analysis

    Energy Technology Data Exchange (ETDEWEB)

    Grcar, Joseph F.; Day, Marcus S.; Bell, John B.

    2004-12-23

    W. C. Gardiner observed that achieving understanding through combustion modeling is limited by the ability to recognize the implications of what has been computed and to draw conclusions about the elementary steps underlying the reaction mechanism. This difficulty can be overcome in part by making better use of reaction path analysis in the context of multidimensional flame simulations. Following a survey of current practice, an integral reaction flux is formulated in terms of conserved scalars that can be calculated in a fully automated way. Conditional analyses are then introduced, and a taxonomy for bidirectional path analysis is explored. Many examples illustrate the resulting path analysis and uncover some new results about nonpremixed methane-air laminar jets.

  12. Path integral solution of the Dirichlet problem

    International Nuclear Information System (INIS)

    LaChapelle, J.

    1997-01-01

    A scheme for functional integration developed by Cartier/DeWitt-Morette is first reviewed and then employed to construct the path integral representation for the solution of the Dirichlet problem in terms of first exit time. The path integral solution is then applied to calculate the fixed-energy point-to-point transition amplitude both in configuration and phase space. The path integral solution can also be derived using physical principles based on Feynman close-quote s original reasoning. We check that the Fourier transform in energy of the fixed-energy point-to-point transition amplitude gives the well known time-dependent transition amplitude, and calculate the WKB approximation. copyright 1997 Academic Press, Inc

  13. Reaction path simulations in multicomponent materials

    International Nuclear Information System (INIS)

    Seifert, H.J.

    1999-01-01

    The CALPHAD (calculation of phase diagrams) method is used in combination with selected experimental investigations to derive reaction paths in multicomponent systems. The method is illustrated by applying computerized thermodynamic databases and suitable software to explain quantitatively the thermal degradation of precursor-derived Si-C-N ceramics and the nitridation of titanium carbide. Reaction sequences in the Si 3 N 4 -SiC-TiC x N l-x -C-N system are illustrated by graphical representation of compatibility regions and indicated reaction paths. From these results the experimentally known microstructure development of TiC reinforced Si 3 N 4 ceramics is explained and quantitative information is provided to optimize the microstructure of such materials. The concept of reaction paths for the understanding of rapid solidification processes is shown by the example of AZ type Mg casting alloys. (orig.)

  14. Approximate Shortest Homotopic Paths in Weighted Regions

    KAUST Repository

    Cheng, Siu-Wing

    2010-01-01

    Let P be a path between two points s and t in a polygonal subdivision T with obstacles and weighted regions. Given a relative error tolerance ε ∈(0,1), we present the first algorithm to compute a path between s and t that can be deformed to P without passing over any obstacle and the path cost is within a factor 1 + ε of the optimum. The running time is O(h 3/ε2 kn polylog(k, n, 1/ε)), where k is the number of segments in P and h and n are the numbers of obstacles and vertices in T, respectively. The constant in the running time of our algorithm depends on some geometric parameters and the ratio of the maximum region weight to the minimum region weight. © 2010 Springer-Verlag.

  15. Approximate shortest homotopic paths in weighted regions

    KAUST Repository

    Cheng, Siuwing

    2012-02-01

    A path P between two points s and t in a polygonal subdivision T with obstacles and weighted regions defines a class of paths that can be deformed to P without passing over any obstacle. We present the first algorithm that, given P and a relative error tolerance ε (0, 1), computes a path from this class with cost at most 1 + ε times the optimum. The running time is O(h 3/ε 2kn polylog (k,n,1/ε)), where k is the number of segments in P and h and n are the numbers of obstacles and vertices in T, respectively. The constant in the running time of our algorithm depends on some geometric parameters and the ratio of the maximum region weight to the minimum region weight. © 2012 World Scientific Publishing Company.

  16. Games with a permission structure - A survey on generalizations and applications

    NARCIS (Netherlands)

    van den Brink, René

    2017-01-01

    In the field of cooperative games with restricted cooperation, various restrictions on coalition formation are studied. The most studied restrictions are those that arise from restricted communication and hierarchies. This survey discusses several models of hierarchy restrictions and their relation

  17. The effect of solar and lunar currents on simultaneous phase path, group path and amplitude measurements

    International Nuclear Information System (INIS)

    Baulch, R.N.E.; Butcher, E.C.

    1984-01-01

    The solar and lunar variations in the phase path, group path and amplitude of a fixed frequency transmission were obtained at the September equinox over a slightly oblique path. The phase of the lunar semi-diurnal tide in the phase path and amplitude were similar, the maxima occurring near 0200 lunar time, whereas the group path had a maximum near 0800 lunar time. These results were compared with other results obtained near the same location. The results suggest a complex situation in the E-region, where the height of the lunar current depends on season, and also suggest that the location and distribution of the solar and lunar currents may be different. (author)

  18. [Cell phone communication: hygienic characteristics, biological action, standardization (a review)].

    Science.gov (United States)

    Gudina, M V; Volkotrub, L P

    2010-01-01

    The paper considers the topical issues concerning the functioning of the cellular communication system. It provides the hygienic characteristics of its individual elements. The factors influencing the size of an electromagnetic field generated by mobile phones are stated. Research data on the impact of electromagnetic radiation from a mobile phone on users' health are reviewed. The pivots of present-day Russian hygienic rating regarding the permissible exposures to nonionizing electromagnetic energy generated by the elements of the cellular communication system are identified.

  19. Tornado intensity estimated from damage path dimensions.

    Directory of Open Access Journals (Sweden)

    James B Elsner

    Full Text Available The Newcastle/Moore and El Reno tornadoes of May 2013 are recent reminders of the destructive power of tornadoes. A direct estimate of a tornado's power is difficult and dangerous to get. An indirect estimate on a categorical scale is available from a post-storm survery of the damage. Wind speed bounds are attached to the scale, but the scale is not adequate for analyzing trends in tornado intensity separate from trends in tornado frequency. Here tornado intensity on a continuum is estimated from damage path length and width, which are measured on continuous scales and correlated to the EF rating. The wind speeds on the EF scale are treated as interval censored data and regressed onto the path dimensions and fatalities. The regression model indicates a 25% increase in expected intensity over a threshold intensity of 29 m s(-1 for a 100 km increase in path length and a 17% increase in expected intensity for a one km increase in path width. The model shows a 43% increase in the expected intensity when fatalities are observed controlling for path dimensions. The estimated wind speeds correlate at a level of .77 (.34, .93 [95% confidence interval] with a small sample of wind speeds estimated independently from a doppler radar calibration. The estimated wind speeds allow analyses to be done on the tornado database that are not possible with the categorical scale. The modeled intensities can be used in climatology and in environmental and engineering applications. Research is needed to understand the upward trends in path length and width.

  20. Tornado intensity estimated from damage path dimensions.

    Science.gov (United States)

    Elsner, James B; Jagger, Thomas H; Elsner, Ian J

    2014-01-01

    The Newcastle/Moore and El Reno tornadoes of May 2013 are recent reminders of the destructive power of tornadoes. A direct estimate of a tornado's power is difficult and dangerous to get. An indirect estimate on a categorical scale is available from a post-storm survery of the damage. Wind speed bounds are attached to the scale, but the scale is not adequate for analyzing trends in tornado intensity separate from trends in tornado frequency. Here tornado intensity on a continuum is estimated from damage path length and width, which are measured on continuous scales and correlated to the EF rating. The wind speeds on the EF scale are treated as interval censored data and regressed onto the path dimensions and fatalities. The regression model indicates a 25% increase in expected intensity over a threshold intensity of 29 m s(-1) for a 100 km increase in path length and a 17% increase in expected intensity for a one km increase in path width. The model shows a 43% increase in the expected intensity when fatalities are observed controlling for path dimensions. The estimated wind speeds correlate at a level of .77 (.34, .93) [95% confidence interval] with a small sample of wind speeds estimated independently from a doppler radar calibration. The estimated wind speeds allow analyses to be done on the tornado database that are not possible with the categorical scale. The modeled intensities can be used in climatology and in environmental and engineering applications. Research is needed to understand the upward trends in path length and width.

  1. Which coordinate system for modelling path integration?

    Science.gov (United States)

    Vickerstaff, Robert J; Cheung, Allen

    2010-03-21

    Path integration is a navigation strategy widely observed in nature where an animal maintains a running estimate, called the home vector, of its location during an excursion. Evidence suggests it is both ancient and ubiquitous in nature, and has been studied for over a century. In that time, canonical and neural network models have flourished, based on a wide range of assumptions, justifications and supporting data. Despite the importance of the phenomenon, consensus and unifying principles appear lacking. A fundamental issue is the neural representation of space needed for biological path integration. This paper presents a scheme to classify path integration systems on the basis of the way the home vector records and updates the spatial relationship between the animal and its home location. Four extended classes of coordinate systems are used to unify and review both canonical and neural network models of path integration, from the arthropod and mammalian literature. This scheme demonstrates analytical equivalence between models which may otherwise appear unrelated, and distinguishes between models which may superficially appear similar. A thorough analysis is carried out of the equational forms of important facets of path integration including updating, steering, searching and systematic errors, using each of the four coordinate systems. The type of available directional cue, namely allothetic or idiothetic, is also considered. It is shown that on balance, the class of home vectors which includes the geocentric Cartesian coordinate system, appears to be the most robust for biological systems. A key conclusion is that deducing computational structure from behavioural data alone will be difficult or impossible, at least in the absence of an analysis of random errors. Consequently it is likely that further theoretical insights into path integration will require an in-depth study of the effect of noise on the four classes of home vectors. Copyright 2009 Elsevier Ltd

  2. The transformation techniques in path integration

    International Nuclear Information System (INIS)

    Inomata, A.

    1989-01-01

    In this paper general remarks are made concerning the time transformation techniques in path integration and their implementations. Time transformations may be divided into two classes: global (integrable) time transformations and local (nonintegrable) time transformations. Although a brief account of global time transformations is given, attention is focused on local transformations. First, time transformations in the classical Kepler problem are reviewed. Then, problems encountered in implementing a local time transformation in quantum mechanics are analyzed. A several propositions pertinent to the implementation of local time transformations, particularly basic to the local time rescaling trick in a discretized path integral, are presented

  3. Flight Path Recovery System (FPRS) design study

    Energy Technology Data Exchange (ETDEWEB)

    1978-09-01

    The study contained herein presents a design for a Flight Path Recovery System (FPPS) for use in the NURE Program which will be more accurate than systems presently used, provide position location data in digital form suitable for automatic data processing, and provide for flight path recovery in a more economic and operationally suitable manner. The design is based upon the use of presently available hardware and technoloy, and presents little, it any, development risk. In addition, a Flight Test Plan designed to test the FPRS design concept is presented.

  4. Canonical transformations and hamiltonian path integrals

    International Nuclear Information System (INIS)

    Prokhorov, L.V.

    1982-01-01

    Behaviour of the Hamiltonian path integrals under canonical transformations produced by a generator, is investigated. An exact form is determined for the kernel of the unitary operator realizing the corresponding quantum transformation. Equivalence rules are found (the Hamiltonian formalism, one-dimensional case) enabling one to exclude non-standard terms from the action. It is shown that the Hamiltonian path integral changes its form under cononical transformations: in the transformed expression besides the classical Hamiltonian function there appear some non-classical terms

  5. Flight Path Recovery System (FPRS) design study

    International Nuclear Information System (INIS)

    1978-09-01

    The study contained herein presents a design for a Flight Path Recovery System (FPPS) for use in the NURE Program which will be more accurate than systems presently used, provide position location data in digital form suitable for automatic data processing, and provide for flight path recovery in a more economic and operationally suitable manner. The design is based upon the use of presently available hardware and technoloy, and presents little, it any, development risk. In addition, a Flight Test Plan designed to test the FPRS design concept is presented

  6. Field theory a path integral approach

    CERN Document Server

    Das, Ashok

    2006-01-01

    This unique book describes quantum field theory completely within the context of path integrals. With its utility in a variety of fields in physics, the subject matter is primarily developed within the context of quantum mechanics before going into specialized areas.Adding new material keenly requested by readers, this second edition is an important expansion of the popular first edition. Two extra chapters cover path integral quantization of gauge theories and anomalies, and a new section extends the supersymmetry chapter, where singular potentials in supersymmetric systems are described.

  7. 78 FR 52915 - Notice of Proposals to Engage In or To Acquire Companies Engaged in Permissible Nonbanking...

    Science.gov (United States)

    2013-08-27

    ... to be closely related to banking and permissible for bank holding companies. Unless otherwise noted..., Vice President) 2200 North Pearl Street, Dallas, Texas 75201-2272: 1. Rio Financial Services, Inc...

  8. Graphs with not all possible path-kernels

    DEFF Research Database (Denmark)

    Aldred, Robert; Thomassen, Carsten

    2004-01-01

    The Path Partition Conjecture states that the vertices of a graph G with longest path of length c may be partitioned into two parts X and Y such that the longest path in the subgraph of G induced by X has length at most a and the longest path in the subgraph of G induced by Y has length at most b...

  9. Walking path-planning method for multiple radiation areas

    International Nuclear Information System (INIS)

    Liu, Yong-kuo; Li, Meng-kun; Peng, Min-jun; Xie, Chun-li; Yuan, Cheng-qian; Wang, Shuang-yu; Chao, Nan

    2016-01-01

    Highlights: • Radiation environment modeling method is designed. • Path-evaluating method and segmented path-planning method are proposed. • Path-planning simulation platform for radiation environment is built. • The method avoids to be misled by minimum dose path in single area. - Abstract: Based on minimum dose path-searching method, walking path-planning method for multiple radiation areas was designed to solve minimum dose path problem in single area and find minimum dose path in the whole space in this paper. Path-planning simulation platform was built using C# programming language and DirectX engine. The simulation platform was used in simulations dealing with virtual nuclear facilities. Simulation results indicated that the walking-path planning method is effective in providing safety for people walking in nuclear facilities.

  10. Science communication as political communication

    Science.gov (United States)

    Scheufele, Dietram A.

    2014-01-01

    Scientific debates in modern societies often blur the lines between the science that is being debated and the political, moral, and legal implications that come with its societal applications. This manuscript traces the origins of this phenomenon to professional norms within the scientific discipline and to the nature and complexities of modern science and offers an expanded model of science communication that takes into account the political contexts in which science communication takes place. In a second step, it explores what we know from empirical work in political communication, public opinion research, and communication research about the dynamics that determine how issues are debated and attitudes are formed in political environments. Finally, it discusses how and why it will be increasingly important for science communicators to draw from these different literatures to ensure that the voice of the scientific community is heard in the broader societal debates surrounding science. PMID:25225389

  11. Science communication as political communication.

    Science.gov (United States)

    Scheufele, Dietram A

    2014-09-16

    Scientific debates in modern societies often blur the lines between the science that is being debated and the political, moral, and legal implications that come with its societal applications. This manuscript traces the origins of this phenomenon to professional norms within the scientific discipline and to the nature and complexities of modern science and offers an expanded model of science communication that takes into account the political contexts in which science communication takes place. In a second step, it explores what we know from empirical work in political communication, public opinion research, and communication research about the dynamics that determine how issues are debated and attitudes are formed in political environments. Finally, it discusses how and why it will be increasingly important for science communicators to draw from these different literatures to ensure that the voice of the scientific community is heard in the broader societal debates surrounding science.

  12. Pulmonary infection by Yersinia pestis rapidly establishes a permissive environment for microbial proliferation.

    Science.gov (United States)

    Price, Paul A; Jin, Jianping; Goldman, William E

    2012-02-21

    Disease progression of primary pneumonic plague is biphasic, consisting of a preinflammatory and a proinflammatory phase. During the long preinflammatory phase, bacteria replicate to high levels, seemingly uninhibited by normal pulmonary defenses. In a coinfection model of pneumonic plague, it appears that Yersinia pestis quickly creates a localized, dominant anti-inflammatory state that allows for the survival and rapid growth of both itself and normally avirulent organisms. Yersinia pseudotuberculosis, the relatively recent progenitor of Y. pestis, shows no similar trans-complementation effect, which is unprecedented among other respiratory pathogens. We demonstrate that the effectors secreted by the Ysc type III secretion system are necessary but not sufficient to mediate this apparent immunosuppression. Even an unbiased negative selection screen using a vast pool of Y. pestis mutants revealed no selection against any known virulence genes, demonstrating the transformation of the lung from a highly restrictive to a generally permissive environment during the preinflammatory phase of pneumonic plague.

  13. An EPQ model under cash discount and permissible delay in payments derived without derivatives

    Directory of Open Access Journals (Sweden)

    Huang Yung-Fu

    2007-01-01

    Full Text Available The main purpose of this paper is to investigate the case where the retailer’s unit selling price and the purchasing price per unit are not necessarily equal within the economic production quantity (EPQ framework under cash discount and permissible delay in payments. We establish the retailer’s inventory system as a cost minimization problem to determine the retailer’s optimal inventory cycle time, optimal order quantity and optimal payment time. This paper provides an algebraic approach to determine the optimal cycle time, optimal order quantity and optimal payment time. This approach provides one theorem to efficiently determine the optimal solution. Some previously published results of other researchers are deduced as special cases. Finally, numerical examples are given to illustrate the result and the managerial insights are also obtained.

  14. Analysis of Customary Institutions’ Position and Roles in Business Permission Bureaucracy: Case of Bali

    Directory of Open Access Journals (Sweden)

    Buddi Wibowo

    2016-12-01

    Full Text Available Uneven investment activities distribution in Bali result in economic disparity which causes not only social tension but also endanger cultural heritage. Preservation of Balinese culture could be threatened if economic and business activities are not managed properly and in line with efforts to preserve the culture of Bali in the long term. This study aims to assess the empirical and normative sociological legal jurisdiction over existing regulations related to economic and business activities in the Province of Bali which can be considered a potential threat to the preservation of Balinese culture and tradition. Based on the problem mapping that is the result of the empirical and normative juridical study, we are able to do the analysis of regulatory and institutional rearrangement of business and investment permission bureaucracy in the Bali province by considering the preservation of cultural and traditional law enforcement in Bali.

  15. Satellite Communications

    CERN Document Server

    Pelton, Joseph N

    2012-01-01

    The field of satellite communications represents the world's largest space industry. Those who are interested in space need to understand the fundamentals of satellite communications, its technology, operation, business, economic, and regulatory aspects. This book explains all this along with key insights into the field's future growth trends and current strategic challenges. Fundamentals of Satellite Communications is a concise book that gives all of the key facts and figures as well as a strategic view of where this dynamic industry is going. Author Joseph N. Pelton, PhD, former Dean of the International Space University and former Director of Strategic Policy at Intelstat, presents a r

  16. A Scheduling Algorithm for Cloud Computing System Based on the Driver of Dynamic Essential Path.

    Science.gov (United States)

    Xie, Zhiqiang; Shao, Xia; Xin, Yu

    2016-01-01

    To solve the problem of task scheduling in the cloud computing system, this paper proposes a scheduling algorithm for cloud computing based on the driver of dynamic essential path (DDEP). This algorithm applies a predecessor-task layer priority strategy to solve the problem of constraint relations among task nodes. The strategy assigns different priority values to every task node based on the scheduling order of task node as affected by the constraint relations among task nodes, and the task node list is generated by the different priority value. To address the scheduling order problem in which task nodes have the same priority value, the dynamic essential long path strategy is proposed. This strategy computes the dynamic essential path of the pre-scheduling task nodes based on the actual computation cost and communication cost of task node in the scheduling process. The task node that has the longest dynamic essential path is scheduled first as the completion time of task graph is indirectly influenced by the finishing time of task nodes in the longest dynamic essential path. Finally, we demonstrate the proposed algorithm via simulation experiments using Matlab tools. The experimental results indicate that the proposed algorithm can effectively reduce the task Makespan in most cases and meet a high quality performance objective.

  17. On the structure of path-like trees

    OpenAIRE

    Muntaner Batle, Francesc Antoni; Rius Font, Miquel

    2007-01-01

    We study the structure of path-like trees. In order to do this, we introduce a set of trees that we call expandable trees. In this paper we also generalize the concept of path-like trees and we call such generalization generalized path-like trees. As in the case of path-like trees, generalized path-like trees, have very nice labeling properties.

  18. Oral keratinocytes support non-replicative infection and transfer of harbored HIV-1 to permissive cells.

    Science.gov (United States)

    Vacharaksa, Anjalee; Asrani, Anil C; Gebhard, Kristin H; Fasching, Claudine E; Giacaman, Rodrigo A; Janoff, Edward N; Ross, Karen F; Herzberg, Mark C

    2008-07-17

    Oral keratinocytes on the mucosal surface are frequently exposed to HIV-1 through contact with infected sexual partners or nursing mothers. To determine the plausibility that oral keratinocytes are primary targets of HIV-1, we tested the hypothesis that HIV-1 infects oral keratinocytes in a restricted manner. To study the fate of HIV-1, immortalized oral keratinocytes (OKF6/TERT-2; TERT-2 cells) were characterized for the fate of HIV-specific RNA and DNA. At 6 h post inoculation with X4 or R5-tropic HIV-1, HIV-1gag RNA was detected maximally within TERT-2 cells. Reverse transcriptase activity in TERT-2 cells was confirmed by VSV-G-mediated infection with HIV-NL4-3Deltaenv-EGFP. AZT inhibited EGFP expression in a dose-dependent manner, suggesting that viral replication can be supported if receptors are bypassed. Within 3 h post inoculation, integrated HIV-1 DNA was detected in TERT-2 cell nuclei and persisted after subculture. Multiply spliced and unspliced HIV-1 mRNAs were not detectable up to 72 h post inoculation, suggesting that HIV replication may abort and that infection is non-productive. Within 48 h post inoculation, however, virus harbored by CD4 negative TERT-2 cells trans infected co-cultured peripheral blood mononuclear cells (PBMCs) or MOLT4 cells (CD4+ CCR5+) by direct cell-to-cell transfer or by releasing low levels of infectious virions. Primary tonsil epithelial cells also trans infected HIV-1 to permissive cells in a donor-specific manner. Oral keratinocytes appear, therefore, to support stable non-replicative integration, while harboring and transmitting infectious X4- or R5-tropic HIV-1 to permissive cells for up to 48 h.

  19. Oral keratinocytes support non-replicative infection and transfer of harbored HIV-1 to permissive cells

    Directory of Open Access Journals (Sweden)

    Giacaman Rodrigo A

    2008-07-01

    Full Text Available Abstract Background Oral keratinocytes on the mucosal surface are frequently exposed to HIV-1 through contact with infected sexual partners or nursing mothers. To determine the plausibility that oral keratinocytes are primary targets of HIV-1, we tested the hypothesis that HIV-1 infects oral keratinocytes in a restricted manner. Results To study the fate of HIV-1, immortalized oral keratinocytes (OKF6/TERT-2; TERT-2 cells were characterized for the fate of HIV-specific RNA and DNA. At 6 h post inoculation with X4 or R5-tropic HIV-1, HIV-1gag RNA was detected maximally within TERT-2 cells. Reverse transcriptase activity in TERT-2 cells was confirmed by VSV-G-mediated infection with HIV-NL4-3Δenv-EGFP. AZT inhibited EGFP expression in a dose-dependent manner, suggesting that viral replication can be supported if receptors are bypassed. Within 3 h post inoculation, integrated HIV-1 DNA was detected in TERT-2 cell nuclei and persisted after subculture. Multiply spliced and unspliced HIV-1 mRNAs were not detectable up to 72 h post inoculation, suggesting that HIV replication may abort and that infection is non-productive. Within 48 h post inoculation, however, virus harbored by CD4 negative TERT-2 cells trans infected co-cultured peripheral blood mononuclear cells (PBMCs or MOLT4 cells (CD4+ CCR5+ by direct cell-to-cell transfer or by releasing low levels of infectious virions. Primary tonsil epithelial cells also trans infected HIV-1 to permissive cells in a donor-specific manner. Conclusion Oral keratinocytes appear, therefore, to support stable non-replicative integration, while harboring and transmitting infectious X4- or R5-tropic HIV-1 to permissive cells for up to 48 h.

  20. Does an 'activity-permissive' workplace change office workers' sitting and activity time?

    Directory of Open Access Journals (Sweden)

    Erin Gorman

    Full Text Available To describe changes in workplace physical activity, and health-, and work-related outcomes, in workers who transitioned from a conventional to an 'activity-permissive' workplace.A natural pre-post experiment conducted in Vancouver, Canada in 2011. A convenience sample of office-based workers (n=24, 75% women, mean [SD] age = 34.5 [8.1] years were examined four months following relocation from a conventional workplace (pre to a newly-constructed, purpose-built, movement-oriented physical environment (post. Workplace activity- (activPAL3-derived stepping, standing, and sitting time, health- (body composition and fasting cardio-metabolic blood profile, and work- (performance; job satisfaction related outcomes were measured pre- and post-move and compared using paired t-tests.Pre-move, on average (mean [SD] the majority of the day was spent sitting (364 [43.0] mins/8-hr workday, followed by standing (78.2 [32.1] mins/8-hr workday and stepping (37.7 [15.6] mins/8-hr workday. The transition to the 'activity-permissive' workplace resulted in a significant increase in standing time (+18.5, 95% CI: 1.8, 35.2 mins/8-hr workday, likely driven by reduced sitting time (-19.7, 95% CI: -42.1, 2.8 mins/8-hr workday rather than increased stepping time (+1.2, 95% CI: -6.2, 8.5 mins/8-hr workday. There were no statistically significant differences observed in health- or work-related outcomes.This novel, opportunistic study demonstrated that the broader workplace physical environment can beneficially impact on standing time in office workers. The long-term health and work-related benefits, and the influence of individual, organizational, and social factors on this change, requires further evaluation.

  1. Retailer’s replenishment policies under conditions of permissible delay in payments

    Directory of Open Access Journals (Sweden)

    Huang Yung-Fu

    2004-01-01

    Full Text Available Goyal (1985 is frequently cited when the inventory systems under conditions of permissible delay in payments are discussed. Goyal implicitly assumed that: 1. The unit selling price and the unit purchasing price are equal; 2. At the end of the credit period, the account is settled. The retailer starts paying for higher interest charges on the items in stock and returns money of the remaining balance immediately when the items are sold. But these assumptions are debatable in real-life situations. The main purpose of this paper is to modify Goyal’s model to allow the unit selling price and the unit purchasing price not necessarily be equal to reflect the real-life situations. Furthermore, this paper will adopt different payment rule. We assume that the retailer uses sales revenue during the permissible credit period to make payment to the supplier at the end of the credit period. If it is not enough to pay off the purchasing cost of all items, the retailer will pay off the remaining balance by taking loan from the bank. So, the retailer starts paying for the interest charges on the amount of loan from the bank after the account is settled. Then the retailer will return money to the bank at the end of the inventory cycle. Under these conditions, we model the retailer’s inventory system as a cost minimization problem to determine the retailer’s optimal cycle time and optimal order quantity. Four cases are developed to efficiently determine the optimal cycle time and the optimal order quantity. Numerical examples are given to illustrate these cases. Comparing with Goyal’s model, we also find that the optimal cycle times in this paper are not longer than those of Goyal’s model.

  2. Between reason and coercion: ethically permissible influence in health care and health policy contexts.

    Science.gov (United States)

    Blumenthal-Barby, J S

    2012-12-01

    In bioethics, the predominant categorization of various types of influence has been a tripartite classification of rational persuasion (meaning influence by reason and argument), coercion (meaning influence by irresistible threats-or on a few accounts, offers), and manipulation (meaning everything in between). The standard ethical analysis in bioethics has been that rational persuasion is always permissible, and coercion is almost always impermissible save a few cases such as imminent threat to self or others. However, many forms of influence fall into the broad middle terrain-and this terrain is in desperate need of conceptual refining and ethical analysis in light of recent interest in using principles from behavioral science to influence health decisions and behaviors. This paper aims to address the neglected space between rational persuasion and coercion in bioethics. First, I argue for conceptual revisions that include removing the "manipulation" label and relabeling this space "nonargumentative influence," with two subtypes: "reason-bypassing" and "reason-countering." Second, I argue that bioethicists have made the mistake of relying heavily on the conceptual categories themselves for normative work and instead should assess the ethical permissibility of a particular instance of influence by asking several key ethical questions, which I elucidate, that relate to (1) the impact of the form of influence on autonomy and (2) the relationship between the influencer and the influenced. Finally, I apply my analysis to two examples of nonargumentative influence in health care and health policy: (1) governmental agencies such as the Food and Drug Administration (FDA) trying to influence the public to be healthier using nonargumentative measures such as vivid images on cigarette packages to make more salient the negative effects of smoking, and (2) a physician framing a surgery in terms of survival rates instead of mortality rates to influence her patient to consent to

  3. Does an 'activity-permissive' workplace change office workers' sitting and activity time?

    Science.gov (United States)

    Gorman, Erin; Ashe, Maureen C; Dunstan, David W; Hanson, Heather M; Madden, Ken; Winkler, Elisabeth A H; McKay, Heather A; Healy, Genevieve N

    2013-01-01

    To describe changes in workplace physical activity, and health-, and work-related outcomes, in workers who transitioned from a conventional to an 'activity-permissive' workplace. A natural pre-post experiment conducted in Vancouver, Canada in 2011. A convenience sample of office-based workers (n=24, 75% women, mean [SD] age = 34.5 [8.1] years) were examined four months following relocation from a conventional workplace (pre) to a newly-constructed, purpose-built, movement-oriented physical environment (post). Workplace activity- (activPAL3-derived stepping, standing, and sitting time), health- (body composition and fasting cardio-metabolic blood profile), and work- (performance; job satisfaction) related outcomes were measured pre- and post-move and compared using paired t-tests. Pre-move, on average (mean [SD]) the majority of the day was spent sitting (364 [43.0] mins/8-hr workday), followed by standing (78.2 [32.1] mins/8-hr workday) and stepping (37.7 [15.6] mins/8-hr workday). The transition to the 'activity-permissive' workplace resulted in a significant increase in standing time (+18.5, 95% CI: 1.8, 35.2 mins/8-hr workday), likely driven by reduced sitting time (-19.7, 95% CI: -42.1, 2.8 mins/8-hr workday) rather than increased stepping time (+1.2, 95% CI: -6.2, 8.5 mins/8-hr workday). There were no statistically significant differences observed in health- or work-related outcomes. This novel, opportunistic study demonstrated that the broader workplace physical environment can beneficially impact on standing time in office workers. The long-term health and work-related benefits, and the influence of individual, organizational, and social factors on this change, requires further evaluation.

  4. Detection and response to unauthorized access to a communication device

    Science.gov (United States)

    Smith, Rhett; Gordon, Colin

    2015-09-08

    A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.

  5. Propagation Effects in Space/Earth Paths.

    Science.gov (United States)

    1980-08-01

    0 h In both integrals ds is a differential of curved ray path and includes refractive bending. In either integral, the factor aTar is, by the Rayleigh...interference. Ionospheric modification may also result from the emission of exhaust effluents from HLLV’s. The associated changes in ionospherio chemistry can

  6. Learning to improve path planning performance

    International Nuclear Information System (INIS)

    Chen, Pang C.

    1995-04-01

    In robotics, path planning refers to finding a short. collision-free path from an initial robot configuration to a desired configuratioin. It has to be fast to support real-time task-level robot programming. Unfortunately, current planning techniques are still too slow to be effective, as they often require several minutes, if not hours of computation. To remedy this situation, we present and analyze a learning algorithm that uses past experience to increase future performance. The algorithm relies on an existing path planner to provide solutions to difficult tasks. From these solutions, an evolving sparse network of useful robot configurations is learned to support faster planning. More generally, the algorithm provides a speedup-learning framework in which a slow but capable planner may be improved both cost-wise and capability-wise by a faster but less capable planner coupled with experience. The basic algorithm is suitable for stationary environments, and can be extended to accommodate changing environments with on-demand experience repair and object-attached experience abstraction. To analyze the algorithm, we characterize the situations in which the adaptive planner is useful, provide quantitative bounds to predict its behavior, and confirm our theoretical results with experiments in path planning of manipulators. Our algorithm and analysis are sufficiently, general that they may also be applied to other planning domains in which experience is useful

  7. Gender Differences in Career Paths in Banking.

    Science.gov (United States)

    Morgan, Sandra; And Others

    1993-01-01

    Analyzed career paths of middle managers in bank. Study of matched pairs found that men (n=25) advanced faster and reached middle management through fewer promotions and positions than did women (n=25). Men had significantly more work experience outside of banking. In banking careers, men held more jobs in lending, whereas women occupied more…

  8. Quad-rotor flight path energy optimization

    Science.gov (United States)

    Kemper, Edward

    Quad-Rotor unmanned areal vehicles (UAVs) have been a popular area of research and development in the last decade, especially with the advent of affordable microcontrollers like the MSP 430 and the Raspberry Pi. Path-Energy Optimization is an area that is well developed for linear systems. In this thesis, this idea of path-energy optimization is extended to the nonlinear model of the Quad-rotor UAV. The classical optimization technique is adapted to the nonlinear model that is derived for the problem at hand, coming up with a set of partial differential equations and boundary value conditions to solve these equations. Then, different techniques to implement energy optimization algorithms are tested using simulations in Python. First, a purely nonlinear approach is used. This method is shown to be computationally intensive, with no practical solution available in a reasonable amount of time. Second, heuristic techniques to minimize the energy of the flight path are tested, using Ziegler-Nichols' proportional integral derivative (PID) controller tuning technique. Finally, a brute force look-up table based PID controller is used. Simulation results of the heuristic method show that both reliable control of the system and path-energy optimization are achieved in a reasonable amount of time.

  9. Taking a Technological Path to Poetry Prewriting.

    Science.gov (United States)

    Roberts, Sherron Killingsworth

    2002-01-01

    Offers a strong rationale for the idea that the journey of writing good poetry begins on a path that infuses technology into the first stage of the writing process. Presents several ideas of ways to incorporate technology into the prewriting poetry experience. Concludes that by making technology an ingredient, the true potential for synergy…

  10. Unidirectional Motion of Vehicle on Sinusoidal Path

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 17; Issue 4. Unidirectional Motion of Vehicle on Sinusoidal Path: Can it Cause Illusory Forward and Backward Motion? Anuj Bhatnagar. Classroom Volume 17 Issue 4 April 2012 pp 387-392 ...

  11. Feynman path integral formulation of quantum mechanics

    International Nuclear Information System (INIS)

    Mizrahi, M.M.

    1975-01-01

    The subject of this investigation is Feynman's path integral quantization scheme, which is a powerful global formalism with great intuitive appeal. It stems from the simple idea that a probability amplitude for a system to make a transition between two states is the ''sum'' of the amplitudes for all the possible ways the transition can take place

  12. Path integral quantization of parametrized field theory

    International Nuclear Information System (INIS)

    Varadarajan, Madhavan

    2004-01-01

    Free scalar field theory on a flat spacetime can be cast into a generally covariant form known as parametrized field theory in which the action is a functional of the scalar field as well as the embedding variables which describe arbitrary, in general curved, foliations of the flat spacetime. We construct the path integral quantization of parametrized field theory in order to analyze issues at the interface of quantum field theory and general covariance in a path integral context. We show that the measure in the Lorentzian path integral is nontrivial and is the analog of the Fradkin-Vilkovisky measure for quantum gravity. We construct Euclidean functional integrals in the generally covariant setting of parametrized field theory using key ideas of Schleich and show that our constructions imply the existence of nonstandard 'Wick rotations' of the standard free scalar field two-point function. We develop a framework to study the problem of time through computations of scalar field two-point functions. We illustrate our ideas through explicit computation for a time independent (1+1)-dimensional foliation. Although the problem of time seems to be absent in this simple example, the general case is still open. We discuss our results in the contexts of the path integral formulation of quantum gravity and the canonical quantization of parametrized field theory

  13. Feature based omnidirectional sparse visual path following

    OpenAIRE

    Goedemé, Toon; Tuytelaars, Tinne; Van Gool, Luc; Vanacker, Gerolf; Nuttin, Marnix

    2005-01-01

    Goedemé T., Tuytelaars T., Van Gool L., Vanacker G., Nuttin M., ''Feature based omnidirectional sparse visual path following'', Proceedings IEEE/RSJ international conference on intelligent robots and systems - IROS2005, pp. 1003-1008, August 2-6, 2005, Edmonton, Alberta, Canada.

  14. Certified higher-order recursive path ordering

    NARCIS (Netherlands)

    Koprowski, A.; Pfenning, F.

    2006-01-01

    The paper reports on a formalization of a proof of wellfoundedness of the higher-order recursive path ordering (HORPO) in the proof checker Coq. The development is axiom-free and fully constructive. Three substantive parts that could be used also in other developments are the formalizations of the

  15. Path-breaking books in regional science

    NARCIS (Netherlands)

    Waldorf, BS

    This article presents a collection of regional science books that long-standing members of the Regional Science Association International (RSAI) identified as path-breaking books. The most frequently nominated books include the "classics" by Isard, the seminal books in urban economics by Alonso,

  16. Covariant path integrals on hyperbolic surfaces

    Science.gov (United States)

    Schaefer, Joe

    1997-11-01

    DeWitt's covariant formulation of path integration [B. De Witt, "Dynamical theory in curved spaces. I. A review of the classical and quantum action principles," Rev. Mod. Phys. 29, 377-397 (1957)] has two practical advantages over the traditional methods of "lattice approximations;" there is no ordering problem, and classical symmetries are manifestly preserved at the quantum level. Applying the spectral theorem for unbounded self-adjoint operators, we provide a rigorous proof of the convergence of certain path integrals on Riemann surfaces of constant curvature -1. The Pauli-DeWitt curvature correction term arises, as in DeWitt's work. Introducing a Fuchsian group Γ of the first kind, and a continuous, bounded, Γ-automorphic potential V, we obtain a Feynman-Kac formula for the automorphic Schrödinger equation on the Riemann surface ΓH. We analyze the Wick rotation and prove the strong convergence of the so-called Feynman maps [K. D. Elworthy, Path Integration on Manifolds, Mathematical Aspects of Superspace, edited by Seifert, Clarke, and Rosenblum (Reidel, Boston, 1983), pp. 47-90] on a dense set of states. Finally, we give a new proof of some results in C. Grosche and F. Steiner, "The path integral on the Poincare upper half plane and for Liouville quantum mechanics," Phys. Lett. A 123, 319-328 (1987).

  17. Directed paths in a layered environment

    International Nuclear Information System (INIS)

    Alvarez, J; Janse van Rensburg, E J

    2008-01-01

    A polymer in a layered environment is modeled as a directed path in a layered square lattice composed of alternating A-layers of width w a and B-layers of width w b . In this paper we consider general cases of this model, where edges in the path interact with the layers, and vertices in the path interact with interfaces between adjacent layers. The phase diagram exhibits different regimes. In particular, we found that the path may be localized to one layer, be adsorbed on an interface between two layers or be delocalized across layers. We examine special aspects of the model in detail: the asymptotic regimes of the models are examined, and entropic forces on the interfaces are determined. We focus on several different cases, including models with layers of equal or similar width. More general models of layers with different but finite widths, or with one layer of infinite width, are also examined in detail. Several of these models exhibit phase behavior which relate to well-studied polymer phase behavior such as adsorption at an impenetrable wall, pinning at an interface between two immiscible solvents, steric stabilization of colloidal particles and sensitized flocculation of colloidal particles by polymers

  18. Random paths with curvature dependent action

    International Nuclear Information System (INIS)

    Ambjoern, J.; Durhuus, B.

    1986-11-01

    We study discretized random paths with a curvature dependent action. The scaling limits of the corresponding statistical mechanical models can be constructed explicitly and are either usual Brownian motion or a theory where the correlations of tangents are nonzero and described by diffusion on the unit sphere. In the latter case the two point function has an anomalous dimension η = 1. (orig.)

  19. Comparison of classical reaction paths and tunneling paths studied with the semiclassical instanton theory.

    Science.gov (United States)

    Meisner, Jan; Markmeyer, Max N; Bohner, Matthias U; Kästner, Johannes

    2017-08-30

    Atom tunneling in the hydrogen atom transfer reaction of the 2,4,6-tri-tert-butylphenyl radical to 3,5-di-tert-butylneophyl, which has a short but strongly curved reaction path, was investigated using instanton theory. We found the tunneling path to deviate qualitatively from the classical intrinsic reaction coordinate, the steepest-descent path in mass-weighted Cartesian coordinates. To perform that comparison, we implemented a new variant of the predictor-corrector algorithm for the calculation of the intrinsic reaction coordinate. We used the reaction force analysis method as a means to decompose the reaction barrier into structural and electronic components. Due to the narrow energy barrier, atom tunneling is important in the abovementioned reaction, even above room temperature. Our calculated rate constants between 350 K and 100 K agree well with experimental values. We found a H/D kinetic isotope effect of almost 10 6 at 100 K. Tunneling dominates the protium transfer below 400 K and the deuterium transfer below 300 K. We compared the lengths of the tunneling path and the classical path for the hydrogen atom transfer in the reaction HCl + Cl and quantified the corner cutting in this reaction. At low temperature, the tunneling path is about 40% shorter than the classical path.

  20. Short communication

    African Journals Online (AJOL)

    abp

    2017-09-04

    Sep 4, 2017 ... Face-to-face interviews were conducted using a standardized ... Short communication. Open Access ... clinic during the time of the study and were invited to participate in the study. .... consume them. This is another ...

  1. Brief communication

    Indian Academy of Sciences (India)

    2013-11-05

    Nov 5, 2013 ... Brief communication. Published ... showed longer FIDs in response to a human looking at them than to a human not looking at them (Burger et al. 1992). ..... Rivas JA and Burghardt GM 2001 Understanding sexual size dimor-.

  2. Brief communication

    Indian Academy of Sciences (India)

    2011-03-14

    Mar 14, 2011 ... 1Department of Crop, Soil and Environmental Sciences, 2Department of Horticulture, University of Arkansas, ... controlled by the soybean heat-shock promoter is an effective tool for conditional removal ... Brief communication ...

  3. COMMUNICATIONS GROUP

    CERN Multimedia

    L. Taylor

    2011-01-01

    The CMS Communications Group, established at the start of 2010, has been busy in all three areas of its responsibility: (1) Communications Infrastructure, (2) Information Systems, and (3) Outreach and Education. Communications Infrastructure There are now 55 CMS Centres worldwide that are well used by physicists working on remote CMS shifts, Computing operations, data quality monitoring, data analysis and outreach. The CMS Centre@CERN in Meyrin, is the centre of the CMS offline and computing operations, hosting dedicated analysis efforts such as during the CMS Heavy Ion lead-lead running. With a majority of CMS sub-detectors now operating in a “shifterless” mode, many monitoring operations are now routinely performed from there, rather than in the main Control Room at P5. The CMS Communications Group, CERN IT and the EVO team are providing excellent videoconferencing support for the rapidly-increasing number of CMS meetings. In parallel, CERN IT and ...

  4. PC communication

    International Nuclear Information System (INIS)

    Oh, Jae Cheol

    1992-03-01

    This text book is comprised of five charters, which is about PC communication for beginners who need to learn manners and how to use Ketel and PC serve. So it introduces first, conception of PC and precautions on using PC communication, second, preparation for PC communication with Modem, its program, install, kinds of protocol and how to use protocol, third directions of emulator of PC communication and super session, fourth, instruction of Ketel with join and access, basic command of Ketel, list of Ketel's menu, Ketel editor, service guide, directions of News service, Stock and bond service business and economic figures, exchange rate and interest rate, tax culture and leisure, Ketel BBS service and posting. The last part has a instruction of PC-serve about join, basic command of PC-serve, service guide and practical guideline.

  5. PC communication

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Jae Cheol

    1992-03-15

    This text book is comprised of five charters, which is about PC communication for beginners who need to learn manners and how to use Ketel and PC serve. So it introduces first, conception of PC and precautions on using PC communication, second, preparation for PC communication with Modem, its program, install, kinds of protocol and how to use protocol, third directions of emulator of PC communication and super session, fourth, instruction of Ketel with join and access, basic command of Ketel, list of Ketel's menu, Ketel editor, service guide, directions of News service, Stock and bond service business and economic figures, exchange rate and interest rate, tax culture and leisure, Ketel BBS service and posting. The last part has a instruction of PC-serve about join, basic command of PC-serve, service guide and practical guideline.

  6. SHORT COMMUNICATION

    African Journals Online (AJOL)

    PROF P.T. KAYE

    . SHORT COMMUNICATION. Formation and Structural Analysis of Novel Dibornyl Ethers. Perry T. Kaye*, Andrew R. Duggan, Joseph M. Matjila, Warner E. Molema, and. Swarnam S. Ravindran. Department of Chemistry, Rhodes University, Grahamstown, ...

  7. Police Communications

    Science.gov (United States)

    1981-01-01

    Oklahoma City Police Department developed a computerized communications system, based on Johnson Space Center's (JSC's) 1960-mission control knowledge. JSC furnished information on lighting and other fatigue reducing measures, and provided specifications for equipment and design layouts. JSC also advised OCPD how to avoid communications bottlenecks associated with simultaneous handling of telephone, radio and inner-office transmissions. Oklahoma City saved money in reduced design and engineering costs by utilizing the already developed NASA technology.

  8. Antifragile Communications

    OpenAIRE

    Lichtman, Marc Louis

    2016-01-01

    Jamming is an ongoing threat that plagues wireless communications in contested areas. Unfortunately, jamming complexity and sophistication will continue to increase over time. The traditional approach to addressing the jamming threat is to harden radios, such that they sacrifice communications performance for more advanced jamming protection. To provide an escape from this trend, we investigate the previously unexplored area of jammer exploitation. This dissertation develops the concep...

  9. Aesthetic Communication

    DEFF Research Database (Denmark)

    Thyssen, Ole

    2012-01-01

    Based on Niklas Luhmann's systems theory, aesthetics is defined as a manner of reinforcing the connectivity, or Anschlusswert, of communication. Without changing the content, a message can be made more attractive, strengthening the receiver's willingness to be attentive and accepting. As communic......Based on Niklas Luhmann's systems theory, aesthetics is defined as a manner of reinforcing the connectivity, or Anschlusswert, of communication. Without changing the content, a message can be made more attractive, strengthening the receiver's willingness to be attentive and accepting....... As communication inevitably makes use of a sensuous medium, such as light or sound, all communication has an aesthetic dimension. In the 19th Century, an important distinction was made between pure and applied art, following Immanuel Kant's separation of theory of knowledge, moral theory and aesthetic theory....... Whereas pure art is produced in order to be observed, applied art has to fulfill practical purposes as well. Modern organizations, defined as systems of communication, may use art works to embellish and define themselves. But they inevitably use applied art as a practical tool in their normal...

  10. Information communication on complex networks

    International Nuclear Information System (INIS)

    Igarashi, Akito; Kawamoto, Hiroki; Maruyama, Takahiro; Morioka, Atsushi; Naganuma, Yuki

    2013-01-01

    Since communication networks such as the Internet, which is regarded as a complex network, have recently become a huge scale and a lot of data pass through them, the improvement of packet routing strategies for transport is one of the most significant themes in the study of computer networks. It is especially important to find routing strategies which can bear as many traffic as possible without congestion in complex networks. First, using neural networks, we introduce a strategy for packet routing on complex networks, where path lengths and queue lengths in nodes are taken into account within a framework of statistical physics. Secondly, instead of using shortest paths, we propose efficient paths which avoid hubs, nodes with a great many degrees, on scale-free networks with a weight of each node. We improve the heuristic algorithm proposed by Danila et. al. which optimizes step by step routing properties on congestion by using the information of betweenness, the probability of paths passing through a node in all optimal paths which are defined according to a rule, and mitigates the congestion. We confirm the new heuristic algorithm which balances traffic on networks by achieving minimization of the maximum betweenness in much smaller number of iteration steps. Finally, We model virus spreading and data transfer on peer-to-peer (P2P) networks. Using mean-field approximation, we obtain an analytical formulation and emulate virus spreading on the network and compare the results with those of simulation. Moreover, we investigate the mitigation of information traffic congestion in the P2P networks.

  11. Distributed systems design using separable communications

    International Nuclear Information System (INIS)

    Capel, A.C.; Yan, G.

    1980-01-01

    One of the promises of distributed systems is the ability to design each process function largely independently of the others, and in many cases locate the resulting hardware in close proximity to the application. The communications architecture for such systems should be approached in the same way, using separable communications facilities to meet individual sets of requirements while at the same time reducing the interactions between functions. Where complete physical separation is not feasible and hardware resource sharing is required, the protocols should be designed emphasizing the logical separation of communication paths. This paper discusses the different types of communications for process control applictions and the parameters which need to be characterized in designing separable communications for distributed systems. (auth)

  12. Permissive Attitude Towards Drug Use, Life Satisfaction, and Continuous Drug Use Among Psychoactive Drug Users in Hong Kong.

    Science.gov (United States)

    Cheung, N Wt; Cheung, Y W; Chen, X

    2016-06-01

    To examine the effects of a permissive attitude towards regular and occasional drug use, life satisfaction, self-esteem, depression, and other psychosocial variables in the drug use of psychoactive drug users. Psychosocial factors that might affect a permissive attitude towards regular / occasional drug use and life satisfaction were further explored. We analysed data of a sample of psychoactive drug users from a longitudinal survey of psychoactive drug abusers in Hong Kong who were interviewed at 6 time points at 6-month intervals between January 2009 and December 2011. Data of the second to the sixth time points were stacked into an individual time point structure. Random-effects probit regression analysis was performed to estimate the relative contribution of the independent variables to the binary dependent variable of drug use in the last 30 days. A permissive attitude towards drug use, life satisfaction, and depression at the concurrent time point, and self-esteem at the previous time point had direct effects on drug use in the last 30 days. Interestingly, permissiveness to occasional drug use was a stronger predictor of drug use than permissiveness to regular drug use. These 2 permissive attitude variables were affected by the belief that doing extreme things shows the vitality of young people (at concurrent time point), life satisfaction (at concurrent time point), and self-esteem (at concurrent and previous time points). Life satisfaction was affected by sense of uncertainty about the future (at concurrent time point), self-esteem (at concurrent time point), depression (at both concurrent and previous time points), and being stricken by stressful events (at previous time point). A number of psychosocial factors could affect the continuation or discontinuation of drug use, as well as the permissive attitude towards regular and occasional drug use, and life satisfaction. Implications of the findings for prevention and intervention work targeted at

  13. Sexual and Gender Minority Adolescents' Views On HIV Research Participation and Parental Permission: A Mixed-Methods Study.

    Science.gov (United States)

    Mustanski, Brian; Coventry, Ryan; Macapagal, Kathryn; Arbeit, Miriam R; Fisher, Celia B

    2017-06-01

    Sexual and gender minority adolescents are underrepresented in HIV research, partly because institutional review boards (IRBs) are reluctant to waive parental permission requirements for these studies. Understanding teenagers' perspectives on parental permission and the risks and benefits of participating in HIV research is critical to informing evidence-based IRB decisions. Data from 74 sexual and gender minority adolescents aged 14-17 who participated in an online focus group in 2015 were used to examine perspectives on the risks and benefits of participation in a hypothetical HIV surveillance study and the need for parental permission and adequate protections. Data were analyzed thematically; mixed methods analyses examined whether concerns about parental permission differed by whether teenagers were out to their parents. Most adolescents, especially those who were not out to their parents, would be unwilling to participate in an HIV study if parental permission were required. Perceived benefits of participation included overcoming barriers to HIV testing and contributing to the health of sexual and gender minority youth. Few risks of participation were identified. Adolescents suggested steps that researchers could take to facilitate informed decision making about research participation and ensure minors' safety in the absence of parental permission; these included incorporating multimedia presentations into the consent process and explaining researchers' motivations for conducting the study. Respondents believed that the benefits of HIV surveillance research outweighed the risks. Requiring parental permission may exclude many sexual and gender minority teenagers from taking part in HIV research, especially if they are not out. Copyright © 2017 by the Guttmacher Institute.

  14. The Visual Communication or Graphic Communication Dilemma

    Science.gov (United States)

    Fecik, John T.

    1975-01-01

    The author reviews the history of communication and communications technology, considers differences between "visual communication" and "graphic communication," and comments on "seeds of revolution" in the industry. He offers four components of an educational structure or organization titled "graphic…

  15. Changes in Search Path Complexity and Length During Learning of a Virtual Water Maze: Age Differences and Differential Associations with Hippocampal Subfield Volumes.

    Science.gov (United States)

    Daugherty, Ana M; Bender, Andrew R; Yuan, Peng; Raz, Naftali

    2016-06-01

    Impairment of hippocampus-dependent cognitive processes has been proposed to underlie age-related deficits in navigation. Animal studies suggest a differential role of hippocampal subfields in various aspects of navigation, but that hypothesis has not been tested in humans. In this study, we examined the association between volume of hippocampal subfields and age differences in virtual spatial navigation. In a sample of 65 healthy adults (age 19-75 years), advanced age was associated with a slower rate of improvement operationalized as shortening of the search path over 25 learning trials on a virtual Morris water maze task. The deficits were partially explained by greater complexity of older adults' search paths. Larger subiculum and entorhinal cortex volumes were associated with a faster decrease in search path complexity, which in turn explained faster shortening of search distance. Larger Cornu Ammonis (CA)1-2 volume was associated with faster distance shortening, but not in path complexity reduction. Age differences in regional volumes collectively accounted for 23% of the age-related variance in navigation learning. Independent of subfield volumes, advanced age was associated with poorer performance across all trials, even after reaching the asymptote. Thus, subiculum and CA1-2 volumes were associated with speed of acquisition, but not magnitude of gains in virtual maze navigation. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  16. Path Integrals and Anomalies in Curved Space

    International Nuclear Information System (INIS)

    Louko, Jorma

    2007-01-01

    Bastianelli and van Nieuwenhuizen's monograph 'Path Integrals and Anomalies in Curved Space' collects in one volume the results of the authors' 15-year research programme on anomalies that arise in Feynman diagrams of quantum field theories on curved manifolds. The programme was spurred by the path-integral techniques introduced in Alvarez-Gaume and Witten's renowned 1983 paper on gravitational anomalies which, together with the anomaly cancellation paper by Green and Schwarz, led to the string theory explosion of the 1980s. The authors have produced a tour de force, giving a comprehensive and pedagogical exposition of material that is central to current research. The first part of the book develops from scratch a formalism for defining and evaluating quantum mechanical path integrals in nonlinear sigma models, using time slicing regularization, mode regularization and dimensional regularization. The second part applies this formalism to quantum fields of spin 0, 1/2, 1 and 3/2 and to self-dual antisymmetric tensor fields. The book concludes with a discussion of gravitational anomalies in 10-dimensional supergravities, for both classical and exceptional gauge groups. The target audience is researchers and graduate students in curved spacetime quantum field theory and string theory, and the aims, style and pedagogical level have been chosen with this audience in mind. Path integrals are treated as calculational tools, and the notation and terminology are throughout tailored to calculational convenience, rather than to mathematical rigour. The style is closer to that of an exceedingly thorough and self-contained review article than to that of a textbook. As the authors mention, the first part of the book can be used as an introduction to path integrals in quantum mechanics, although in a classroom setting perhaps more likely as supplementary reading than a primary class text. Readers outside the core audience, including this reviewer, will gain from the book a

  17. Gender Differences in Adolescent Premarital Sexual Permissiveness in Three Asian Cities: Effects of Gender-Role Attitudes

    Science.gov (United States)

    Xiayun, Zuo; Chaohua, Lou; Ersheng, Gao; Yan, Cheng; Hongfeng, Niu; Zabin, Laurie S.

    2014-01-01

    Purpose Gender is an important factor in understanding premarital sexual attitudes and behaviors. Many studies indicate that males are more likely to initiate sexual intercourse and have more permissive perceptions about sex than females. Yet few studies have explored possible reasons for these gender differences. With samples of unmarried adolescents in three Asian cities influenced by Confucian cultures, this paper investigates the relationship between underlying gender norms and these differences in adolescents’ premarital sexual permissiveness. Methods 16,554 unmarried participants aged 15–24 were recruited in the Three-City Asian Study of Adolescents and Youth, a collaborative survey conducted in 2006–2007 in urban and rural areas of Hanoi, Shanghai and Taipei, with 6204, 6023 and 4327 from each city respectively. All of the adolescents were administered face-to-face interviews, coupled with Computer Assisted Self Interview (CASI) for sensitive questions. Scales on gender-role attitudes and on premarital sexual permissiveness for both male and female respondents were developed and applied to our analysis of the data. Multi-linear regression was used to analyze the relationship between gender-role attitudes and sexual permissiveness. Results Male respondents in each city held more permissive attitudes towards premarital sex than did females with both boys and girls expressing greater permissiveness to male premarital sexual behaviors. Boys also expressed more traditional attitudes to gender roles (condoning greater inequality) than did girls in each city. Adolescents’ gender-role attitudes and permissiveness to premarital sex varied considerably across the three cities, with the Vietnamese the most traditional, the Taiwanese the least traditional, and the adolescents in Shanghai in the middle. A negative association between traditional gender roles and premarital sexual permissiveness was only found among girls in Shanghai and Taipei. In Shanghai

  18. Communicating Science

    Science.gov (United States)

    Holland, G. J.; McCaffrey, M. S.; Kiehl, J. T.; Schmidt, C.

    2010-12-01

    We are in an era of rapidly changing communication media, which is driving a major evolution in the modes of communicating science. In the past, a mainstay of scientific communication in popular media was through science “translators”; science journalists and presenters. These have now nearly disappeared and are being replaced by widespread dissemination through, e.g., the internet, blogs, YouTube and journalists who often have little scientific background and sharp deadlines. Thus, scientists are required to assume increasing responsibility for translating their scientific findings and calibrating their communications to non-technical audiences, a task for which they are often ill prepared, especially when it comes to controversial societal issues such as tobacco, evolution, and most recently climate change (Oreskes and Conway 2010). Such issues have been politicized and hi-jacked by ideological belief systems to such an extent that constructive dialogue is often impossible. Many scientists are excellent communicators, to their peers. But this requires careful attention to detail and logical explanation, open acknowledgement of uncertainties, and dispassionate delivery. These qualities become liabilities when communicating to a non-scientific audience where entertainment, attention grabbing, 15 second sound bites, and self assuredness reign (e.g. Olson 2009). Here we report on a program initiated by NCAR and UCAR to develop new approaches to science communication and to equip present and future scientists with the requisite skills. If we start from a sound scientific finding with general scientific consensus, such as the warming of the planet by greenhouse gases, then the primary emphasis moves from the “science” to the “art” of communication. The art cannot have free reign, however, as there remains a strong requirement for objectivity, honesty, consistency, and above all a resistance to advocating particular policy positions. Targeting audience

  19. Moments of inertia and the shapes of Brownian paths

    International Nuclear Information System (INIS)

    Fougere, F.; Desbois, J.

    1993-01-01

    The joint probability law of the principal moments of inertia of Brownian paths (open or closed) is computed, using constrained path integrals and Random Matrix Theory. The case of two-dimensional paths is discussed in detail. In particular, it is shown that the ratio of the average values of the largest and smallest moments is equal to 4.99 (open paths) and 3.07 (closed paths). Results of numerical simulations are also presented, which include investigation of the relationships between the moments of inertia and the arithmetic area enclosed by a path. (authors) 28 refs., 2 figs

  20. How to solve path integrals in quantum mechanics

    International Nuclear Information System (INIS)

    Grosche, C.

    1994-10-01

    A systematic classification of Feynman path integrals in quantum mechanics is presented and a table of solvable path integrals is given which reflects the progress made during the last 15 years, including, of course, the main contributions since the invention of the path integral by Feynman in 1942. An outline of the general theory is given which will serve as a quick reference for solving path integrals. Explicit formulae for the so-called basic path integrals are presented on which our general scheme to classify and calculate path integrals in quantum mechanics is based. (orig.)

  1. Method and apparatus for optical communication by frequency modulation

    Science.gov (United States)

    Priatko, Gordon J.

    1988-01-01

    Laser optical communication according to this invention is carried out by producing multi-frequency laser beams having different frequencies, splitting one or more of these constituent beams into reference and signal beams, encoding information on the signal beams by frequency modulation and detecting the encoded information by heterodyne techniques. Much more information can be transmitted over optical paths according to the present invention than with the use of only one path as done previously.

  2. Epidemic extinction paths in complex networks

    Science.gov (United States)

    Hindes, Jason; Schwartz, Ira B.

    2017-05-01

    We study the extinction of long-lived epidemics on finite complex networks induced by intrinsic noise. Applying analytical techniques to the stochastic susceptible-infected-susceptible model, we predict the distribution of large fluctuations, the most probable or optimal path through a network that leads to a disease-free state from an endemic state, and the average extinction time in general configurations. Our predictions agree with Monte Carlo simulations on several networks, including synthetic weighted and degree-distributed networks with degree correlations, and an empirical high school contact network. In addition, our approach quantifies characteristic scaling patterns for the optimal path and distribution of large fluctuations, both near and away from the epidemic threshold, in networks with heterogeneous eigenvector centrality and degree distributions.

  3. Technological opportunities and paths of development

    DEFF Research Database (Denmark)

    Plichta, Kirsten

    1993-01-01

    the outcome of different firms development effort may also help shape a path at the industry level. This may be because the criteria by which the market selects between the different product may to some extent be anticipated by the developing firms or because the criteria by which the market select betwee...... technological knowledge, their production, development and other routines as well prior investments in products and production equipment play an important role with regard to the technological opportunities that firms' identify and select for development. 3) Because history matters and because firms are bounded...... in the industry. 6) It is argued that such paths of incremental improvement at the industry level may be an outcome of a) the dynamics that produce the technological opportunities; b) the institutions that govern decisions and expectations and c) the criteria by which the chooses between different firms...

  4. Path integral quantization in the temporal gauge

    International Nuclear Information System (INIS)

    Scholz, B.; Steiner, F.

    1983-06-01

    The quantization of non-Abelian gauge theories in the temporal gauge is studied within Feynman's path integral approach. The standard asymptotic boundary conditions are only imposed on the transverse gauge fields. The fictituous longitudinal gauge quanta are eliminated asymptotically by modified boundary conditions. This abolishes the residual time-independent gauge transformations and leads to a unique fixing of the temporal gauge. The resulting path integral for the generating functional respects automatically Gauss's law. The correct gauge field propagator is derived. It does not suffer from gauge singularities at n x k = 0 present in the usual treatment of axial gauges. The standard principal value prescription does not work. As a check, the Wilson loop in temporal gauge is calculated with the new propagator. To second order (and to all orders in the Abelian case) the result agrees with the one obtained in the Feynman and Coulomb gauge. (orig.)

  5. Dynamic Path Exploration on Mobile Devices

    KAUST Repository

    Birsak, Michael

    2017-03-31

    We present a novel framework for visualizing routes on mobile devices. Our framework is suitable for helping users explore their environment. First, given a starting point and a maximum route length, the system retrieves nearby points of interest (POIs). Second, we automatically compute an attractive walking path through the environment trying to pass by as many highly ranked POIs as possible. Third, we automatically compute a route visualization that shows the current user position, POI locations via pins, and detail lenses for more information about the POIs. The visualization is an animation of an orthographic map view that follows the current user position. We propose an optimization based on a binary integer program (BIP) that models multiple requirements for an effective placement of detail lenses. We show that our path computation method outperforms recently proposed methods and we evaluate the overall impact of our framework in two user studies.

  6. Path creation in the software industry

    DEFF Research Database (Denmark)

    Leimbach, Timo

    2017-01-01

    The article analyzes the development of the German software company Software AG, which was among the few European companies that succeeded in the US market already in the 1970s. Utilizing the concept of "path creation" it examines how early success impacted the development of the company. It shows...... that at least two paths in the development, the focus on the ADABAS product ecosystem and the underlying technology as well as the strong internationalization, relate to the early success and influenced the further evolution of it. The analyses reveal that they played an important role in how the company...... reacted on the rise of relational databases and the vertical disintegration of the computer industry. As a consequence of the late adoption of them they company got into troubles and needed adjust their profile and orientation during the 1990s and early 2000s, which is analyzed in the final part...

  7. Solidification paths of multicomponent monotectic aluminum alloys

    Energy Technology Data Exchange (ETDEWEB)

    Mirkovic, Djordje; Groebner, Joachim [Clausthal University of Technology, Institute of Metallurgy, Robert-Koch-Street 42, D-38678 Clausthal-Zellerfeld (Germany); Schmid-Fetzer, Rainer [Clausthal University of Technology, Institute of Metallurgy, Robert-Koch-Street 42, D-38678 Clausthal-Zellerfeld (Germany)], E-mail: schmid-fetzer@tu-clausthal.de

    2008-10-15

    Solidification paths of three ternary monotectic alloy systems, Al-Bi-Zn, Al-Sn-Cu and Al-Bi-Cu, are studied using thermodynamic calculations, both for the pertinent phase diagrams and also for specific details concerning the solidification of selected alloy compositions. The coupled composition variation in two different liquids is quantitatively given. Various ternary monotectic four-phase reactions are encountered during solidification, as opposed to the simple binary monotectic, L' {yields} L'' + solid. These intricacies are reflected in the solidification microstructures, as demonstrated for these three aluminum alloy systems, selected in view of their distinctive features. This examination of solidification paths and microstructure formation may be relevant for advanced solidification processing of multicomponent monotectic alloys.

  8. An alternative path integral for quantum gravity

    Energy Technology Data Exchange (ETDEWEB)

    Krishnan, Chethan; Kumar, K.V. Pavan; Raju, Avinash [Center for High Energy Physics, Indian Institute of Science,Bangalore 560012 (India)

    2016-10-10

    We define a (semi-classical) path integral for gravity with Neumann boundary conditions in D dimensions, and show how to relate this new partition function to the usual picture of Euclidean quantum gravity. We also write down the action in ADM Hamiltonian formulation and use it to reproduce the entropy of black holes and cosmological horizons. A comparison between the (background-subtracted) covariant and Hamiltonian ways of semi-classically evaluating this path integral in flat space reproduces the generalized Smarr formula and the first law. This “Neumann ensemble” perspective on gravitational thermodynamics is parallel to the canonical (Dirichlet) ensemble of Gibbons-Hawking and the microcanonical approach of Brown-York.

  9. Rapidly converging path integral formalism. Pt. 1

    International Nuclear Information System (INIS)

    Bender, I.; Gromes, D.; Marquard, U.

    1990-01-01

    The action to be used in the path integral formalism is expanded in a systematic way in powers of the time spacing ε in order to optimize the convergence to the continuum limit. This modifies and extends the usual formalism in a transparent way. The path integral approximation to the Green function obtained by this method approaches the continuum Green function with a higher power of ε than the usual one. The general theoretical derivations are exemplified analytically for the harmonic oscillator and by Monte Carlo methods for the anharmonic oscillator. We also show how curvilinear coordinates and curved spaces can naturally be treated within this formalism. Work on field theory is in progress. (orig.)

  10. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  11. Communication & Management

    CERN Multimedia

    2006-01-01

    Calendar of courses for September to December 2006 Please check our Web site to find out the number of places available, which may vary. Management Curriculum 2nd semester 2006 Titles Dates Language Quality Management 18, 19 September Bilingual Managing Teams 19, 20, 21 September English Communicating Effectively - Residential 20, 21, 22 septembre Bilingual (Full) Personal Awareness & Impact 26, 27, 28 September Bilingual Introduction to Leadership 4, 5, 6 October Bilingue IProject Scheduling & Costing 12, 13 October English CDP-SL part 1 Several sessions Dates to be fixed English or French Personal Awareness & Impact 23, 24 October Bilingual Communicating to Convince 23, 24, 25 October Bilingual CDP-GL part 2 25, 26, 27 October English CDP-GL part 1 Dates to be fixed Bilingual Risk Management 20, 21 December Bilingual Communication curriculum 2nd semester 2006 Titles Dates Language Techniques d'exposé et de présentation 18, 19 s...

  12. Management & Communication

    CERN Multimedia

    2006-01-01

    Calendar of courses for September to December 2006 Please check our Web site to find out the number of places available, which may vary. Management Curriculum 2nd semester 2006 Titles Dates Language Quality Management 18, 19 September Bilingual Managing Teams 19, 20, 21 September English Communicating Effectively - Residential 20, 21, 22 septembre Bilingual (Full) Personal Awareness & Impact 26, 27, 28 September Bilingual Introduction to Leadership 4, 5, 6 October Bilingue IProject Scheduling & Costing 12, 13 October English CDP-SL part 1 Several sessions Dates to be fixed English or French Personal Awareness & Impact 23, 24 October Bilingual Communicating to Convince 23, 24, 25 October Bilingual CDP-GL part 2 25, 26, 27 October English CDP-GL part 1 Dates to be fixed Bilingual Risk Management 20, 21 December Bilingual Communication curriculum 2nd semester 2006 Titles Dates Language Techniques d'exposé et de présentation 18, 19 sept...

  13. Interlimb communication

    DEFF Research Database (Denmark)

    Stevenson, Andrew James Thomas

    A continual coordination between the two legs is necessary for maintaining a symmetric walking pattern and adapting to changes in the external environment. Recent evidence in animals and humans suggests that spinal interneuronal circuits under supraspinal control may mediate communication between...... the lower limbs. The overall objective of the present thesis was to further investigate and elucidate neural pathways underlying interlimb communication in humans, focusing primarily on the possible interlimb connections to the biceps femoris muscle. The major aims were 1) to investigate whether interlimb...... walking (Study IV). The results of the this thesis provide new insights into the neural mechanisms underlying human interlimb communication, as well as their functional relevance to human locomotion. Although it is difficult to propose the exact neural pathways mediating interlimb reflexes...

  14. Spreading paths in partially observed social networks

    OpenAIRE

    Onnela, Jukka-Pekka; Christakis, Nicholas A.

    2012-01-01

    Understanding how and how far information, behaviors, or pathogens spread in social networks is an important problem, having implications for both predicting the size of epidemics, as well as for planning effective interventions. There are, however, two main challenges for inferring spreading paths in real-world networks. One is the practical difficulty of observing a dynamic process on a network, and the other is the typical constraint of only partially observing a network. Using a static, s...

  15. Anomaly extraction from the path integral

    International Nuclear Information System (INIS)

    Christos, G.A.

    1983-01-01

    Fujikawa's recently proposed derivation of the anomaly from the path integral is examined. It is attempted to give a better understanding of his work. In particular, evasions of his result are discussed; for example it is shown how chiral U(1) axial invariance can be maintained by employing a gauge variant regularization prescription. A brief connection with the point-splitting method is also made. (orig.)

  16. On path hypercompositions in graphs and automata

    Directory of Open Access Journals (Sweden)

    Massouros Christos G.

    2016-01-01

    Full Text Available The paths in graphs define hypercompositions in the set of their vertices and therefore it is feasible to associate hypercompositional structures to each graph. Similarly, the strings of letters from their alphabet, define hypercompositions in the automata, which in turn define the associated hypergroups to the automata. The study of the associated hypercompositional structures gives results in both, graphs and automata theory.

  17. Depolarization on Earth-space paths

    Science.gov (United States)

    1981-01-01

    Sources of depolarization effects on the propagation paths of orthogonally-polarized information channels are considered. The main sources of depolarization at millimeter wave frequencies are hydrometeor absorption and scattering in the troposphere. Terms are defined. Mathematical formulations for the effects of the propagation medium characteristics and antenna performance on signals in dual polarization Earth-space links are presented. Techniques for modeling rain and ice depolarization are discussed.

  18. Path integral measure for gravitational interactions

    Directory of Open Access Journals (Sweden)

    Kazuo Fujikawa

    1983-10-01

    Full Text Available It is pointed out that the path-integral variables as well as the local measure for gravitational interactions are uniquely specified if one imposes the anomaly-free condition on the Becchi-Rouet-Stora supersymmetry associated with general coordinate transformations. This prescription is briefly illustrated for the Einstein gravity and supergravity in four space-time dimensions and the relativistic string theory in two dimensions.

  19. Path dependence and independent utility regulation

    DEFF Research Database (Denmark)

    Ibsen, Christian Lyhne; Skovgaard Poulsen, Lauge

    2007-01-01

    The establishment of the Danish independent regulatory authorities for the energy and telecommunications sectors was based upon EU directives as part of their liberalisation process. Following the concepts of transaction costs and path dependency this article analyses differences in independence...... between the two authorities - the Danish Energy Regulatory Authority (Energitilsynet) and the National IT and Telecommunications Agency (IT- og Telestyrelsen) respectively. We find that the state's negligible interest in the energy sector until the 1970s formed the basis for strong energy companies...

  20. Mindfulness as a Path of Women's Empowerment

    OpenAIRE

    Nadja FURLAN ŠTANTE

    2016-01-01

    The paper brings together social mindfulness as a path of empowerment for women within its concept of the interrelatedness of all beings in the web of life. The paradigm of social mindfulness is thus established as the foundation of feminist spirituality. The focus of this work is on the possibility of applying the ethics of mindfulness as a paradigm to interpersonal interrelatedness. The relations among humans, nature, reason and emotion in self-development are confronted with the paradigm o...