WorldWideScience

Sample records for sensor exploits traditional

  1. Algorithms exploiting ultrasonic sensors for subject classification

    Science.gov (United States)

    Desai, Sachi; Quoraishee, Shafik

    2009-09-01

    Proposed here is a series of techniques exploiting micro-Doppler ultrasonic sensors capable of characterizing various detected mammalian targets based on their physiological movements captured a series of robust features. Employed is a combination of unique and conventional digital signal processing techniques arranged in such a manner they become capable of classifying a series of walkers. These processes for feature extraction develops a robust feature space capable of providing discrimination of various movements generated from bipeds and quadrupeds and further subdivided into large or small. These movements can be exploited to provide specific information of a given signature dividing it in a series of subset signatures exploiting wavelets to generate start/stop times. After viewing a series spectrograms of the signature we are able to see distinct differences and utilizing kurtosis, we generate an envelope detector capable of isolating each of the corresponding step cycles generated during a walk. The walk cycle is defined as one complete sequence of walking/running from the foot pushing off the ground and concluding when returning to the ground. This time information segments the events that are readily seen in the spectrogram but obstructed in the temporal domain into individual walk sequences. This walking sequence is then subsequently translated into a three dimensional waterfall plot defining the expected energy value associated with the motion at particular instance of time and frequency. The value is capable of being repeatable for each particular class and employable to discriminate the events. Highly reliable classification is realized exploiting a classifier trained on a candidate sample space derived from the associated gyrations created by motion from actors of interest. The classifier developed herein provides a capability to classify events as an adult humans, children humans, horses, and dogs at potentially high rates based on the tested sample

  2. Noise-exploitation and adaptation in neuromorphic sensors

    Science.gov (United States)

    Hindo, Thamira; Chakrabartty, Shantanu

    2012-04-01

    Even though current micro-nano fabrication technology has reached integration levels where ultra-sensitive sensors can be fabricated, the sensing performance (resolution per joule) of synthetic systems are still orders of magnitude inferior to those observed in neurobiology. For example, the filiform hairs in crickets operate at fundamental limits of noise; auditory sensors in a parasitoid fly can overcome fundamental limitations to precisely localize ultra-faint acoustic signatures. Even though many of these biological marvels have served as inspiration for different types of neuromorphic sensors, the main focus these designs have been to faithfully replicate the biological functionalities, without considering the constructive role of "noise". In man-made sensors device and sensor noise are typically considered as a nuisance, where as in neurobiology "noise" has been shown to be a computational aid that enables biology to sense and operate at fundamental limits of energy efficiency and performance. In this paper, we describe some of the important noise-exploitation and adaptation principles observed in neurobiology and how they can be systematically used for designing neuromorphic sensors. Our focus will be on two types of noise-exploitation principles, namely, (a) stochastic resonance; and (b) noise-shaping, which are unified within our previously reported framework called Σ▵ learning. As a case-study, we describe the application of Σ▵ learning for the design of a miniature acoustic source localizer whose performance matches that of its biological counterpart(Ormia Ochracea).

  3. Sensor Exposure, Exploitation, and Experimentation Environment (SE4)

    Science.gov (United States)

    Buell, D.; Duff, F.; Goding, J.; Bankston, M.; McLaughlin, T.; Six, S.; Taylor, S.; Wootton, S.

    2011-09-01

    As the resident space object population increases from new launches and events such as the COSMOS/IRIDIUM collision, the maintenance of high-level Space Situational Awareness (SSA) has become increasingly difficult. To maintain situational awareness of the changing environment, new systems and methods must be developed. The Sensor Exposure, Exploitation and Experimentation Environment (SE4) provides a platform to illustrate “The Art of the Possible” that shows the potential benefit of enriched sensor data collections and real-time data sharing. Through modeling and simulation, and a net-centric architecture, SE4 shows the added value of sharing data in real-time and exposing new types of sensor data. The objective of SE4 is to develop an experimentation and innovation environment for sensor data exposure, composable sensor capabilities, reuse, and exploitation that accelerates the delivery of needed Command and Control, Intelligence, Surveillance, and Reconnaissance capabilities to the warfighter. Through modeling, simulation and rapid prototyping, the art of the possible for a fully-connected, net-centric space Command and Control (C2) and sensor enterprise can be demonstrated. This paper provides results that demonstrate the potential for faster cataloging of breakup events and additional event monitoring that are possible with data available today in the Space Surveillance Network (SSN). Demonstrating the art of the possible for the enterprise will guide net-centric requirements definition and facilitate discussions with stakeholder organizations on the Concept of Operations (CONOPS), policy, and Tactics, Techniques, and Procedures (TTP) evolution necessary to take full advantage of net-centric operations. SE4 aligns with direction from Secretary Gates and the Chairman Joint Chief of Staff that emphasizes the need to get the most out of our existing systems. Continuing to utilize SE4 will enable the enterprise by demonstrating the benefits of applying

  4. Exploiting Social Media Sensor Networks through Novel Data Fusion Techniques

    Energy Technology Data Exchange (ETDEWEB)

    Kouri, Tina [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Unprecedented amounts of data are continuously being generated by sensors (“hard” data) and by humans (“soft” data), and this data needs to be exploited to its full potential. The first step in exploiting this data is determine how the hard and soft data are related to each other. In this project we fuse hard and soft data, using the attributes of each (e.g., time and space), to gain more information about interesting events. Next, we attempt to use social networking textual data to predict the present (i.e., predict that an interesting event is occurring and details about the event) using data mining, machine learning, natural language processing, and text analysis techniques.

  5. An automated data exploitation system for airborne sensors

    Science.gov (United States)

    Chen, Hai-Wen; McGurr, Mike

    2014-06-01

    Advanced wide area persistent surveillance (WAPS) sensor systems on manned or unmanned airborne vehicles are essential for wide-area urban security monitoring in order to protect our people and our warfighter from terrorist attacks. Currently, human (imagery) analysts process huge data collections from full motion video (FMV) for data exploitation and analysis (real-time and forensic), providing slow and inaccurate results. An Automated Data Exploitation System (ADES) is urgently needed. In this paper, we present a recently developed ADES for airborne vehicles under heavy urban background clutter conditions. This system includes four processes: (1) fast image registration, stabilization, and mosaicking; (2) advanced non-linear morphological moving target detection; (3) robust multiple target (vehicles, dismounts, and human) tracking (up to 100 target tracks); and (4) moving or static target/object recognition (super-resolution). Test results with real FMV data indicate that our ADES can reliably detect, track, and recognize multiple vehicles under heavy urban background clutters. Furthermore, our example shows that ADES as a baseline platform can provide capability for vehicle abnormal behavior detection to help imagery analysts quickly trace down potential threats and crimes.

  6. Exploiting Submodular Value Functions for Faster Dynamic Sensor Selection

    NARCIS (Netherlands)

    Satsangi, Y.; Whiteson, S.; Oliehoek, F.A.

    2015-01-01

    A key challenge in the design of multi-sensor systems is the efficient allocation of scarce resources such as bandwidth, CPU cycles, and energy, leading to the dynamic sensor selection problem in which a subset of the available sensors must be selected at each timestep. While partially observable

  7. Exploiting Sparsity in SDP Relaxation for Sensor Network Localization

    NARCIS (Netherlands)

    S. Kim (Sunyoung); M. Kojima; H. Waki (Hayato)

    2008-01-01

    htmlabstract A sensor network localization problem can be formulated as a quadratic optimization problem (QOP). For quadratic optimization problems, semidefinite programming (SDP) relaxation by Lasserre with relaxation order 1 for general polynomial optimization problems (POPs) is known to be

  8. Exploiting Sparsity in SDP Relaxation for Sensor Network Localization

    NARCIS (Netherlands)

    S. Kim (Sunyoung); M. Kojima; H. Waki (Hayato)

    2009-01-01

    htmlabstract A sensor network localization problem can be formulated as a quadratic optimization problem (QOP). For quadratic optimization problems, semidefinite programming (SDP) relaxation by Lasserre with relaxation order 1 for general polynomial optimization problems (POPs) is known to be

  9. Applying traditional signal processing techniques to social media exploitation for situational understanding

    Science.gov (United States)

    Abdelzaher, Tarek; Roy, Heather; Wang, Shiguang; Giridhar, Prasanna; Al Amin, Md. Tanvir; Bowman, Elizabeth K.; Kolodny, Michael A.

    2016-05-01

    Signal processing techniques such as filtering, detection, estimation and frequency domain analysis have long been applied to extract information from noisy sensor data. This paper describes the exploitation of these signal processing techniques to extract information from social networks, such as Twitter and Instagram. Specifically, we view social networks as noisy sensors that report events in the physical world. We then present a data processing stack for detection, localization, tracking, and veracity analysis of reported events using social network data. We show using a controlled experiment that the behavior of social sources as information relays varies dramatically depending on context. In benign contexts, there is general agreement on events, whereas in conflict scenarios, a significant amount of collective filtering is introduced by conflicted groups, creating a large data distortion. We describe signal processing techniques that mitigate such distortion, resulting in meaningful approximations of actual ground truth, given noisy reported observations. Finally, we briefly present an implementation of the aforementioned social network data processing stack in a sensor network analysis toolkit, called Apollo. Experiences with Apollo show that our techniques are successful at identifying and tracking credible events in the physical world.

  10. Exploitation of Unique Properties of Zeolites in the Development of Gas Sensors

    Directory of Open Access Journals (Sweden)

    Prabir K. Dutta

    2012-04-01

    Full Text Available The unique properties of microporous zeolites, including ion-exchange properties, adsorption, molecular sieving, catalysis, conductivity have been exploited in improving the performance of gas sensors. Zeolites have been employed as physical and chemical filters to improve the sensitivity and selectivity of gas sensors. In addition, direct interaction of gas molecules with the extraframework cations in the nanoconfined space of zeolites has been explored as a basis for developing new impedance-type gas/vapor sensors. In this review, we summarize how these properties of zeolites have been used to develop new sensing paradigms. There is a considerable breadth of transduction processes that have been used for zeolite incorporated sensors, including frequency measurements, optical and the entire gamut of electrochemical measurements. It is clear from the published literature that zeolites provide a route to enhance sensor performance, and it is expected that commercial manifestation of some of the approaches discussed here will take place. The future of zeolite-based sensors will continue to exploit its unique properties and use of other microporous frameworks, including metal organic frameworks. Zeolite composites with electronic materials, including metals will lead to new paradigms in sensing. Use of nano-sized zeolite crystals and zeolite membranes will enhance sensor properties and make possible new routes of miniaturized sensors.

  11. The Impact of Tayub Exploitation on The Tradition and Life of Javanese Society

    Directory of Open Access Journals (Sweden)

    Noordiana Noordiana

    2017-01-01

    Full Text Available This study is aiming at finding out the impact of Tayub exploitation on the tradition and life of Javanese society. Research approach implemented in this study was qualitative. In addition, the research technique employed was interview, observation, documentation, and literary study. Results show that the new form of Tayub diminishes the structure of feminism, neglects simplicity, gentleness and spontaneity that are supposed to be part of Tayub dance. The movement of dance, music, and costume are also changed into a total different form, compared with the genuine version of Tayub dance. These major changes do not only bring negative impacts on the dance structure, but also change the society’s mindset and behavior. People living in the countryside part of Java have lost their control towards customs’ regulation and a philosophy that used to be held tightly by them.

  12. Friend or foe: exploiting sensor failures for transparent object localization and classification

    Science.gov (United States)

    Seib, Viktor; Barthen, Andreas; Marohn, Philipp; Paulus, Dietrich

    2017-02-01

    In this work we address the problem of detecting and recognizing transparent objects using depth images from an RGB-D camera. Using this type of sensor usually prohibits the localization of transparent objects since the structured light pattern of these cameras is not reflected by transparent surfaces. Instead, transparent surfaces often appear as undefined values in the resulting images. However, these erroneous sensor readings form characteristic patterns that we exploit in the presented approach. The sensor data is fed into a deep convolutional neural network that is trained to classify and localize drinking glasses. We evaluate our approach with four different types of transparent objects. To our best knowledge, no datasets offering depth images of transparent objects exist so far. With this work we aim at closing this gap by providing our data to the public.

  13. Optic fiber pulse-diagnosis sensor of traditional Chinese medicine

    Science.gov (United States)

    Ni, J. S.; Jin, W.; Zhao, B. N.; Zhang, X. L.; Wang, C.; Li, S. J.; Zhang, F. X.; Peng, G. D.

    2013-09-01

    The wrist-pulse is a kind of signals, from which a lot of physiological and pathological status of patients are deduced according to traditional Chinese medicine theories. This paper designs a new optic fiber wrist-pulse sensor that based on a group of FBGs. Sensitivity of the optic fiber wrist-pulse measurement system reaches 0.05% FS and the range reaches 50kPa. Frequency response is from 0 Hz to 5 kHz. A group of typical pulse signal is given out in the paper to compare different status of patient. It will improve quantification of pulse diagnosis greatly.

  14. Intensive time series data exploitation: the Multi-sensor Evolution Analysis (MEA) platform

    Science.gov (United States)

    Mantovani, Simone; Natali, Stefano; Folegani, Marco; Scremin, Alessandro

    2014-05-01

    The monitoring of the temporal evolution of natural phenomena must be performed in order to ensure their correct description and to allow improvements in modelling and forecast capabilities. This assumption, that is obvious for ground-based measurements, has not always been true for data collected through space-based platforms: except for geostationary satellites and sensors, that allow providing a very effective monitoring of phenomena with geometric scale from regional to global; smaller phenomena (with characteristic dimension lower than few kilometres) have been monitored with instruments that could collect data only with a time interval in the order of several days; bi-temporal techniques have been the most used ones for years, in order to characterise temporal changes and try identifying specific phenomena. The more the number of flying sensor has grown and their performance improved, the more their capability of monitoring natural phenomena at a smaller geographic scale has grown: we can now count on tenth of years of remotely sensed data, collected by hundreds of sensors that are now accessible from a wide users' community, and the techniques for data processing have to be adapted to move toward a data intensive exploitation. Starting from 2008, the European Space Agency has initiated the development of the Multi-sensor Evolution Analysis (MEA) platform (https://mea.eo.esa.int), whose first aim was to permit the access and exploitation of long term remotely sensed satellite data from different platforms: 15 years of global (A)ATSR data together with 5 years of regional AVNIR-2 data were loaded into the system and were used, through a web-based graphic user interface, for land cover change analysis. The MEA data availability has grown during years integrating multi-disciplinary data that feature spatial and temporal dimensions: so far tenths of Terabytes of data in the land and atmosphere domains are available and can be visualized and exploited, keeping the

  15. Robust fiber optic flexure sensor exploiting mode coupling in few-mode fiber

    Science.gov (United States)

    Nelsen, Bryan; Rudek, Florian; Taudt, Christopher; Baselt, Tobias; Hartmann, Peter

    2015-05-01

    Few-mode fiber (FMF) has become very popular for use in multiplexing telecommunications data over fiber optics. The simplicity of producing FMF and the relative robustness of the optical modes, coupled with the simplicity of reading out the information make this fiber a natural choice for communications. However, little work has been done to take advantage of this type of fiber for sensors. Here, we demonstrate the feasibility of using FMF properties as a mechanism for detecting flexure by exploiting mode coupling between modes when the cylindrical symmetry of the fiber is perturbed. The theoretical calculations shown here are used to understand the coupling between the lowest order linearly polarized mode (LP01) and the next higher mode (LP11x or LP11y) under the action of bending. Twisting is also evaluated as a means to detect flexure and was determined to be the most reliable and effective method when observing the LP21 mode. Experimental results of twisted fiber and observations of the LP21 mode are presented here. These types of fiber flexure sensors are practical in high voltage, high magnetic field, or high temperature medical or industrial environments where typical electronic flexure sensors would normally fail. Other types of flexure measurement systems that utilize fiber, such as Rayleigh back-scattering [1], are complicated and expensive and often provide a higher-than necessary sensitivity for the task at hand.

  16. The Exploitation of the Traditional Component in Restructuring Modern Food Offer in Romania

    Directory of Open Access Journals (Sweden)

    Magdalena Bobe

    2016-11-01

    Full Text Available Food and eating habits, together with adjacent agricultural activities have had and an important role in the development of modern society and the individual itself. Besides its nutritional role, food has become a main socio-cultural determinant, food consumption patterns being influenced, on one hand, by psycho-sensory and quality characteristics of the food product and, on the other hand, by the physiological state of the consumer and its main determinants: traditions, religion and culture. These elements, together with economic considerations have a significant share in shaping the modern eating habits. In this context, the present paper aims to identify and analyze the main capitalization methods of the food’s traditional potential in reshaping the modern food offer, starting with a literature review and continuing with an exploratory analyze of the traditional food sector in Romania. Considering the main directions outlined by literature, this article tries to identify a set of specific features of the traditional food sector in Romania both in terms of producer and consumer perspectives. In this regard, an interview and an exploratory based questionnaire study were conducted. Having as a starting point the wide variety of Romanian food resources, this study aims to highlight how culinary customs have been modeled throughout history in order to establish eating patterns as an assessment method based on the impact of technological progress on the future alimentation.

  17. Non-traditional Sensor Tasking for SSA: A Case Study

    Science.gov (United States)

    Herz, A.; Herz, E.; Center, K.; Martinez, I.; Favero, N.; Clark, C.; Therien, W.; Jeffries, M.

    Industry has recognized that maintaining SSA of the orbital environment going forward is too challenging for the government alone. Consequently there are a significant number of commercial activities in various stages of development standing-up novel sensors and sensor networks to assist in SSA gathering and dissemination. Use of these systems will allow government and military operators to focus on the most sensitive space control issues while allocating routine or lower priority data gathering responsibility to the commercial side. The fact that there will be multiple (perhaps many) commercial sensor capabilities available in this new operational model begets a common access solution. Absent a central access point to assert data needs, optimized use of all commercial sensor resources is not possible and the opportunity for coordinated collections satisfying overarching SSA-elevating objectives is lost. Orbit Logic is maturing its Heimdall Web system - an architecture facilitating “data requestor” perspectives (allowing government operations centers to assert SSA data gathering objectives) and “sensor operator” perspectives (through which multiple sensors of varying phenomenology and capability are integrated via machine -machine interfaces). When requestors submit their needs, Heimdall’s planning engine determines tasking schedules across all sensors, optimizing their use via an SSA-specific figure-of-merit. ExoAnalytic was a key partner in refining the sensor operator interfaces, working with Orbit Logic through specific details of sensor tasking schedule delivery and the return of observation data. Scant preparation on both sides preceded several integration exercises (walk-then-run style), which culminated in successful demonstration of the ability to supply optimized schedules for routine public catalog data collection – then adapt sensor tasking schedules in real-time upon receipt of urgent data collection requests. This paper will provide a

  18. [Discussion on exploitation of foreign traditional chinese medicine resources based on "the Belt and Road"].

    Science.gov (United States)

    Zhang, Xiao-Bo; Lyu, Dong-Mei; Huang, Lu-Qi; Li, Meng; Guo, Lan-Ping; Peng, Hua-Sheng

    2018-04-01

    At the beginning of the ancient "Silk Road", traditional Chinese medicine resources (TCM resources) have long been integrated into it, and it was once the "important part" of the ancient "Silk Road" in Chinese history, benefited from this, the political connections was strengthened, the economic and trade was developed, and Chinese medicine culture was spread. Before Qing Dynasty, people took out the "silk" and brought back "herbs" on the "Silk Road", which enriched China's medicinal resources. While in the later Qing Dynasty and the period of the Republic of China, more scientific and technological methods were brought back from abroad, and this in turn enriched the medical research methods. With more than 2 000 years' development, China's boundaries have changed countless times, therefore the word "Foreign" has different meanings in different historical periods. The import, development and utilization of foreign TCM resources is different in different historical periods, at present, with the continuous enhancement of China's comprehensiv national strength,especially the "Belt And Road" strategy, the communication and import of TCM resources with countries that participating in the "Belt and Road" initiativ became much easier. In order to actively respond to the "Belt and Road" initiative promote the development and utilization of foreign medicinal resources; serve people from the countries participating in the "Belt and Road" initiative we sorted out the foreign TCM resources from different periods in ancient and modern China, and based on this, we proposed the strategy of import of foreign TCM resources under the new situation, those are: "three levels, four steps, one support and one key". And "three levels" refers to intelligence collection level, field investigation level, scientific research level, "Four steps" refers to the original identification research, safety evaluation research, functional positioning research and medicinal properties research; "One

  19. Exploiting Cross-sensitivity by Bayesian Decoding of Mixed Potential Sensor Arrays

    Energy Technology Data Exchange (ETDEWEB)

    Kreller, Cortney [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-10-02

    LANL mixed-potential electrochemical sensor (MPES) device arrays were coupled with advanced Bayesian inference treatment of the physical model of relevant sensor-analyte interactions. We demonstrated that our approach could be used to uniquely discriminate the composition of ternary gas sensors with three discreet MPES sensors with an average error of less than 2%. We also observed that the MPES exhibited excellent stability over a year of operation at elevated temperatures in the presence of test gases.

  20. TwitterSensing: An Event-Based Approach for Wireless Sensor Networks Optimization Exploiting Social Media in Smart City Applications.

    Science.gov (United States)

    Costa, Daniel G; Duran-Faundez, Cristian; Andrade, Daniel C; Rocha-Junior, João B; Peixoto, João Paulo Just

    2018-04-03

    Modern cities are subject to periodic or unexpected critical events, which may bring economic losses or even put people in danger. When some monitoring systems based on wireless sensor networks are deployed, sensing and transmission configurations of sensor nodes may be adjusted exploiting the relevance of the considered events, but efficient detection and classification of events of interest may be hard to achieve. In Smart City environments, several people spontaneously post information in social media about some event that is being observed and such information may be mined and processed for detection and classification of critical events. This article proposes an integrated approach to detect and classify events of interest posted in social media, notably in Twitter , and the assignment of sensing priorities to source nodes. By doing so, wireless sensor networks deployed in Smart City scenarios can be optimized for higher efficiency when monitoring areas under the influence of the detected events.

  1. TwitterSensing: An Event-Based Approach for Wireless Sensor Networks Optimization Exploiting Social Media in Smart City Applications

    Directory of Open Access Journals (Sweden)

    Daniel G. Costa

    2018-04-01

    Full Text Available Modern cities are subject to periodic or unexpected critical events, which may bring economic losses or even put people in danger. When some monitoring systems based on wireless sensor networks are deployed, sensing and transmission configurations of sensor nodes may be adjusted exploiting the relevance of the considered events, but efficient detection and classification of events of interest may be hard to achieve. In Smart City environments, several people spontaneously post information in social media about some event that is being observed and such information may be mined and processed for detection and classification of critical events. This article proposes an integrated approach to detect and classify events of interest posted in social media, notably in Twitter, and the assignment of sensing priorities to source nodes. By doing so, wireless sensor networks deployed in Smart City scenarios can be optimized for higher efficiency when monitoring areas under the influence of the detected events.

  2. A fully integrated GaAs-based three-axis Hall magnetic sensor exploiting self-positioned strain released structures

    International Nuclear Information System (INIS)

    Todaro, Maria T; Sileo, Leonardo; Epifani, Gianmichele; Tasco, Vittorianna; Cingolani, Roberto; De Vittorio, Massimo; Passaseo, Adriana

    2010-01-01

    In this work, we demonstrate a fully integrated three-axis Hall magnetic sensor by exploiting microfabrication technologies applied to a GaAs-based heterostructure. This allows us to obtain, by the same process, three mutually orthogonal sensors: an in-plane Hall sensor and two out-of-plane Hall sensors. The micromachined devices consist of a two-dimensional electron gas AlGaAs/InGaAs/GaAs multilayer which represents the sensing structure, grown on the top of an InGaAs/GaAs strained bilayer. After the release from the substrate, the strained bilayer acts as a hinge for the multilayered structure allowing the out-of-plane self-positioning of devices. Both the in-plane and out-of-plane Hall sensors show a linear response versus the magnetic field with a sensitivity for current-biased devices higher than 1000 V A −1 T −1 , corresponding to an absolute sensitivity more than 0.05 V T −1 at 50 µA. Moreover, Hall voltage measurements, as a function of the mechanical angle for both in-plane and out-of-plane sensors, demonstrate the potential of such a device for measurements of the three vector components of a magnetic field

  3. Exploitation of the Reverberant Propagation of Elastic Waves in Structures: Towards a Concept of Low-resource SHM Sensor Network

    Science.gov (United States)

    Moulin, Emmanuel; Benmeddour, Farouk; Achdjian, Hossep; Chehami, Lynda; Assaad, Jamal; de Rosny, Julien; Prada, Claire

    Actual implementation of an efficient SHM system is necessarily hampered by the constraints of power-consumption and intrusive- ness (weight, size, in-service integration) of sensors. In the field of ultrasound-based SHM, conventional methods rely on relatively powerful acoustic sources synchronized with the sensors, and exploit only the first propagated (ballistic) wavepackets. The aim of this paper is to present possible techniques to exploit the whole complexity of reverberation signals, in order to extract the maxi- mum information from limited hardware, software, or power resources. A first aspect is the extraction of statistical properties of the codas of multiply-reflected signals, which can be used to estimate structural properties from a small number of sensors. In this technique, the required signal processing is relatively light and synchronization between the acquisition channels is not necessary. A second aspect is concerned with the possibility of using ambient acoustic sources, naturally present for example in transportation applications, instead of artificial power-consuming ultrasound sources.

  4. The genus Sida L. - A traditional medicine: Its ethnopharmacological, phytochemical and pharmacological data for commercial exploitation in herbal drugs industry.

    Science.gov (United States)

    Dinda, Biswanath; Das, Niranjan; Dinda, Subhajit; Dinda, Manikarna; SilSarma, Indrajit

    2015-12-24

    Sida L. (Malvaceae) has been used for centuries in traditional medicines in different countries for the prevention and treatment of different diseases such as diarrhea, dysentery, gastrointestinal and urinary infections, malarial and other fevers, childbirth and miscarriage problems, skin ailments, cardiac and neural problems, asthma, bronchitis and other respiratory problems, weight loss aid, rheumatic and other inflammations, tuberculosis, etc. To assess the scientific evidence for therapeutic potential of Sida L. and to identify the gaps of future research needs. The available information on the ethnomedicinal uses, phytochemistry, pharmacology and toxicology of Sida species was collected via a library and electronic searches in SciFinder, PubMed, ScienceDirect, Google Scholar for the period, 1933-2015. A variety of ethnomedicinal uses of Sida species have been found in India, China, Afrian and American countries. Phytochemical investigation of this genus has resulted in identification of about 142 chemical constituents, among which alkaloids, flavonoids and ecdysteroids are the predominant groups. The crude extracts and isolates have exhibited a wide spectrum of in vitro and in vivo pharmacological effects involving antimicrobial, analgesic, anti-inflammatory, abortifacient, neuroprotective, cardiovascular and cardioprotective, antimalarial, antitubercular, antidiabetic and antiobesity, antioxidant and nephroprotective activities among others. Ethnopharmacological preparations containing Sida species as an ingredient in India, African and American countries possess good efficacy in health disorders. From the toxicity perspective, only three Sida species have been assessed and found safe for oral use in rats. Pharmacological results supported some of the uses of Sida species in the traditional medicine. Alkaloids, flavonoids, other phenolics and ecdysteroids were perhaps responsible for the activities of extracts of the plants of this genus. No clinical study

  5. SYMBIOTIC SENSING: Exploring and Exploiting Cooperative Sensing in Heterogeneous Sensor Networks

    NARCIS (Netherlands)

    Le Viet Duc, L Duc

    2016-01-01

    During the last several years we have witnessed the emergence of smartphone-based sensing applications that include activity recognition, urban sensing, social sensing, and health monitoring. In fact, most smartphones have various sensors, wireless communication interfaces, a large memory capacity,

  6. The KCLBOT: Exploiting RGB-D Sensor Inputs for Navigation Environment Building and Mobile Robot Localization

    Directory of Open Access Journals (Sweden)

    Evangelos Georgiou

    2011-09-01

    Full Text Available This paper presents an alternative approach to implementing a stereo camera configuration for SLAM. The approach suggested implements a simplified method using a single RGB-D camera sensor mounted on a maneuverable non-holonomic mobile robot, the KCLBOT, used for extracting image feature depth information while maneuvering. Using a defined quadratic equation, based on the calibration of the camera, a depth computation model is derived base on the HSV color space map. Using this methodology it is possible to build navigation environment maps and carry out autonomous mobile robot path following and obstacle avoidance. This paper presents a calculation model which enables the distance estimation using the RGB-D sensor from Microsoft .NET micro framework device. Experimental results are presented to validate the distance estimation methodology.

  7. Wireless Sensor Network Exploiting High Altitude Platform in 5G Network

    Directory of Open Access Journals (Sweden)

    Veronica Windha Mahyastuty

    2017-08-01

    Full Text Available Technology development and socio-economic transformation have increased the demand for 5G cellular networks. They are expected to send information quickly and support many use cases emerging from a variety of applications. One of the use cases on the 5G network is the massive MTC (Machine Type Communication, wherein wireless sensor network (WSN is a typical application. Challenges faced by a 5G cellular network are how to model an architecture/topology to support WSN and to solve energy consumption efficiency problem in WSN. So, to overcome these challenges, a HAP system integrated with WSN which uses Low Energy Adaptive Hierarchy routing protocol is implemented. The HAP system is designed to be used at a 20-km altitude, and the topologies used are those with and without clustering. It uses 1,000 sensor nodes and Low Energy Adaptive Clustering Hierarchy protocol. This system was simulated using MATLAB. Simulations were performed to analyze the energy consumption, the number of dead nodes, and the average total packets which were sent to HAP for non-clustered topology and clustered topology. Simulation results showed that the clustered topology could reduce energy consumption and the number of dead nodes while increasing the total packet sent to HAP.*****Perkembangan teknologi dan transformasi sosial-ekonomi telah menyebabkan bisnis jaringan seluler 5G mengalami perubahan, sehingga jaringan seluler 5G diharapkan dapat mengirim informasi dengan cepat dan mendukung kasus penggunaan yang banyak bermunculan dari berbagai aplikasi. Salah satu kasus penggunaan pada jaringan 5G adalah massive Machine Type Communication (MTC. Salah satu aplikasi massive MTC adalah jaringan sensor nirkabel (JSN. Tantangan bagi jaringan seluler 5G ini adalah bagaimana memodelkan arsitektur/topologi untuk mendukung JSN dan bagaimana mengatasi masalah efisiensi konsumsi energi di JSN. Untuk menjawab tantangan ini, maka diterapkan sistem HAP yang terintegrasi JSN dan

  8. Exploiting the speckle-correlation scattering matrix for a compact reference-free holographic image sensor.

    Science.gov (United States)

    Lee, KyeoReh; Park, YongKeun

    2016-10-31

    The word 'holography' means a drawing that contains all of the information for light-both amplitude and wavefront. However, because of the insufficient bandwidth of current electronics, the direct measurement of the wavefront of light has not yet been achieved. Though reference-field-assisted interferometric methods have been utilized in numerous applications, introducing a reference field raises several fundamental and practical issues. Here we demonstrate a reference-free holographic image sensor. To achieve this, we propose a speckle-correlation scattering matrix approach; light-field information passing through a thin disordered layer is recorded and retrieved from a single-shot recording of speckle intensity patterns. Self-interference via diffusive scattering enables access to impinging light-field information, when light transport in the diffusive layer is precisely calibrated. As a proof-of-concept, we demonstrate direct holographic measurements of three-dimensional optical fields using a compact device consisting of a regular image sensor and a diffusor.

  9. Exploiting Outage and Error Probability of Cooperative Incremental Relaying in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hina Nasir

    2016-07-01

    Full Text Available This paper embeds a bi-fold contribution for Underwater Wireless Sensor Networks (UWSNs; performance analysis of incremental relaying in terms of outage and error probability, and based on the analysis proposition of two new cooperative routing protocols. Subject to the first contribution, a three step procedure is carried out; a system model is presented, the number of available relays are determined, and based on cooperative incremental retransmission methodology, closed-form expressions for outage and error probability are derived. Subject to the second contribution, Adaptive Cooperation in Energy (ACE efficient depth based routing and Enhanced-ACE (E-ACE are presented. In the proposed model, feedback mechanism indicates success or failure of data transmission. If direct transmission is successful, there is no need for relaying by cooperative relay nodes. In case of failure, all the available relays retransmit the data one by one till the desired signal quality is achieved at destination. Simulation results show that the ACE and E-ACE significantly improves network performance, i.e., throughput, when compared with other incremental relaying protocols like Cooperative Automatic Repeat reQuest (CARQ. E-ACE and ACE achieve 69% and 63% more throughput respectively as compared to CARQ in hard underwater environment.

  10. Tradition

    DEFF Research Database (Denmark)

    Otto, Ton

    2016-01-01

    : beliefs, practices, institutions, and also things. In this sense, the meaning of the term in social research is very close to its usage in common language and is not always theoretically well developed (see Shils, 1971: 123). But the concept of tradition has also been central to major theoretical debates...... on the nature of social change, especially in connection with the notion of modernity. Here tradition is linked to various forms of agency as a factor of both stability and intentional change....

  11. TR-MAC: an energy-efficient MAC protocol for wireless sensor networks exploiting noise-based transmitted reference modulation

    NARCIS (Netherlands)

    Morshed, S.; Dimitrova, D.C.; Brogle, M.; Braun, T.; Heijenk, Gerhard J.

    Energy-constrained behavior of sensor nodes is one of the most important criteria for successful deployment of wireless sensor net- works. The medium access control (MAC) protocol determines the time a sensor node transceiver spends listening or transmitting, and hence the energy consumption of the

  12. Movement Behaviour of Traditionally Managed Cattle in the Eastern Province of Zambia Captured Using Two-Dimensional Motion Sensors.

    Science.gov (United States)

    Lubaba, Caesar H; Hidano, Arata; Welburn, Susan C; Revie, Crawford W; Eisler, Mark C

    2015-01-01

    Two-dimensional motion sensors use electronic accelerometers to record the lying, standing and walking activity of cattle. Movement behaviour data collected automatically using these sensors over prolonged periods of time could be of use to stakeholders making management and disease control decisions in rural sub-Saharan Africa leading to potential improvements in animal health and production. Motion sensors were used in this study with the aim of monitoring and quantifying the movement behaviour of traditionally managed Angoni cattle in Petauke District in the Eastern Province of Zambia. This study was designed to assess whether motion sensors were suitable for use on traditionally managed cattle in two veterinary camps in Petauke District in the Eastern Province of Zambia. In each veterinary camp, twenty cattle were selected for study. Each animal had a motion sensor placed on its hind leg to continuously measure and record its movement behaviour over a two week period. Analysing the sensor data using principal components analysis (PCA) revealed that the majority of variability in behaviour among studied cattle could be attributed to their behaviour at night and in the morning. The behaviour at night was markedly different between veterinary camps; while differences in the morning appeared to reflect varying behaviour across all animals. The study results validate the use of such motion sensors in the chosen setting and highlight the importance of appropriate data summarisation techniques to adequately describe and compare animal movement behaviours if association to other factors, such as location, breed or health status are to be assessed.

  13. Engineering of a genetically encodable fluorescent voltage sensor exploiting fast Ci-VSP voltage-sensing movements.

    Science.gov (United States)

    Lundby, Alicia; Mutoh, Hiroki; Dimitrov, Dimitar; Akemann, Walther; Knöpfel, Thomas

    2008-06-25

    Ci-VSP contains a voltage-sensing domain (VSD) homologous to that of voltage-gated potassium channels. Using charge displacement ('gating' current) measurements we show that voltage-sensing movements of this VSD can occur within 1 ms in mammalian membranes. Our analysis lead to development of a genetically encodable fluorescent protein voltage sensor (VSFP) in which the fast, voltage-dependent conformational changes of the Ci-VSP voltage sensor are transduced to similarly fast fluorescence read-outs.

  14. Engineering of a genetically encodable fluorescent voltage sensor exploiting fast Ci-VSP voltage-sensing movements.

    Directory of Open Access Journals (Sweden)

    Alicia Lundby

    2008-06-01

    Full Text Available Ci-VSP contains a voltage-sensing domain (VSD homologous to that of voltage-gated potassium channels. Using charge displacement ('gating' current measurements we show that voltage-sensing movements of this VSD can occur within 1 ms in mammalian membranes. Our analysis lead to development of a genetically encodable fluorescent protein voltage sensor (VSFP in which the fast, voltage-dependent conformational changes of the Ci-VSP voltage sensor are transduced to similarly fast fluorescence read-outs.

  15. Monitoring of the new Arsta railway bridge using traditional and fiber optic sensors

    Science.gov (United States)

    Enckell-El Jemli, Merit; Karoumi, Raid; Lanaro, Flavio

    2003-08-01

    Stockholm consists of several islands connected by a number of bridges. Many of these bridges need to be repaired or replaced because of their age. Replacing and repairing existing bridges are of economic concern for many local authorities and governments. In order to minimize the costs for reparation and maintenance and to ensure the safety of civil infrastructures, there is an increasing need in our society for health monitoring of bridges. Monitoring helps us to understand the real behavior of the structure and lets us verify the design uncertainties. It is clear that monitoring will have a major role in the design of the future structures, and suitable monitoring systems will be designed together with the structures. The new Årsta Railway Bridge, which is under construction in Stockholm, is an optimized and very complex ten-span pre-stressed concrete structure. Each span has a length of 78 meters. The Swedish National Railway Administration (Banverket) has initiated a measuring campaign in order to study and understand the dynamic and static behavior of the bridge. The main objectives are: firstly, to monitor the bridge during the first 10 years including construction and testing period, and secondly, for the static study, to compare traditional measuring technique using strain transducers developed at Royal Institute of Technology, KTH, Sweden, with the fiber optic sensors developed by SMARTEC, Switzerland. After a short overview of the existing measurement systems and technique for measuring civil infrastructures, the paper illustrates the installation of KTH's and SMARTEC's monitoring systems. In addition, some very early results are included.

  16. Web-based Data Exploration, Exploitation and Visualization Tools for Satellite Sensor VIS/IR Calibration Applications

    Science.gov (United States)

    Gopalan, A.; Doelling, D. R.; Scarino, B. R.; Chee, T.; Haney, C.; Bhatt, R.

    2016-12-01

    The CERES calibration group at NASA/LaRC has developed and deployed a suite of online data exploration and visualization tools targeted towards a range of spaceborne VIS/IR imager calibration applications for the Earth Science community. These web-based tools are driven by the open-source R (Language for Statistical Computing and Visualization) with a web interface for the user to customize the results according to their application. The tool contains a library of geostationary and sun-synchronous imager spectral response functions (SRF), incoming solar spectra, SCIAMACHY and Hyperion Earth reflected visible hyper-spectral data, and IASI IR hyper-spectral data. The suite of six specific web-based tools was designed to provide critical information necessary for sensor cross-calibration. One of the challenges of sensor cross-calibration is accounting for spectral band differences and may introduce biases if not handled properly. The spectral band adjustment factors (SBAF) are a function of the earth target, atmospheric and cloud conditions or scene type and angular conditions, when obtaining sensor radiance pairs. The SBAF will need to be customized for each inter-calibration target and sensor pair. The advantages of having a community open source tool are: 1) only one archive of SCIAMACHY, Hyperion, and IASI datasets needs to be maintained, which is on the order of 50TB. 2) the framework will allow easy incorporation of new satellite SRFs and hyper-spectral datasets and associated coincident atmospheric and cloud properties, such as PW. 3) web tool or SBAF algorithm improvements or suggestions when incorporated can benefit the community at large. 4) The customization effort is on the user rather than on the host. In this paper we discuss each of these tools in detail and explore the variety of advanced options that can be used to constrain the results along with specific use cases to highlight the value-added by these datasets.

  17. Selective microwave sensors exploiting the interaction of analytes with trap states in TiO2 nanotube arrays

    Science.gov (United States)

    Zarifi, M. H.; Farsinezhad, S.; Abdolrazzaghi, M.; Daneshmand, M.; Shankar, K.

    2016-03-01

    Sensing of molecular analytes by probing the effects of their interaction with microwaves is emerging as a cheap, compact, label-free and highly sensitive detection and quantification technique. Microstrip ring-type resonators are particularly favored for this purpose due to their planar sensing geometry, electromagnetic field enhancements in the coupling gap and compatibility with established printed circuit board manufacturing. However, the lack of selectivity in what is essentially a permittivity-sensing method is an impediment to wider adoption and implementation of this sensing platform. By placing a polycrystalline anatase-phase TiO2 nanotube membrane in the coupling gap of a microwave resonator, we engineer selectivity for the detection and differentiation of methanol, ethanol and 2-propanol. The scavenging of reactive trapped holes by aliphatic alcohols adsorbed on TiO2 is responsible for the alcohol-specific detection while the different short chain alcohols are distinguished on the basis of differences in their microwave response. Electrodeless microwave sensors which allow spectral and time-dependent monitoring of the resonance frequency and quality factor provide a wealth of information in comparison with electrode-based resistive sensors for the detection of volatile organic compounds. A high dynamic range (400 ppm-10 000 ppm) is demonstrated for methanol detection.Sensing of molecular analytes by probing the effects of their interaction with microwaves is emerging as a cheap, compact, label-free and highly sensitive detection and quantification technique. Microstrip ring-type resonators are particularly favored for this purpose due to their planar sensing geometry, electromagnetic field enhancements in the coupling gap and compatibility with established printed circuit board manufacturing. However, the lack of selectivity in what is essentially a permittivity-sensing method is an impediment to wider adoption and implementation of this sensing platform

  18. Deformation Monitoring for Chinese Traditional Timber Buildings Using Fiber Bragg Grating Sensors

    Directory of Open Access Journals (Sweden)

    Ni-Lei Li

    2018-06-01

    Full Text Available The Fiber Bragg Grating (FBG sensing technique is suitable for a wide variety of measurements, including temperature, pressure, acceleration, liquid level, etc., and has been applied to many bridges and buildings in the past two decades. The fact that the FBG technique can only monitor and measure strain data for most cases when it is used for deformation measurements impedes application of the FBG sensing technique in civil infrastructures. This paper proposes FBG sensing-based deformation monitoring methods that are applicable to monitoring beam deflection, column inclination angle and mortise-tenon joint dislocation for Chinese traditional timber structures. On the basis of improved conjugated beam theory and geometrical trigonometric function relationship, the relationships between the FBG sensing strain values and the deflection of beam, inclination angle of column, as well as the amount of dislocation of mortise-tenon joint are deducted for Chinese traditional buildings. A series of experiments were conducted to verify the applicability and effectiveness of the proposed deformation monitoring methods. The results show that a good agreement is obtained between the values given by the methods proposed in this paper and other methods. This implies that the proposed deformation monitoring methods are applicable and effective in the health monitoring of Chinese traditional timber structures.

  19. Elements of kitchen toxicology to exploit the value of traditional (African recipes: The case of Egusi Okra meal in the diet of HIV+/AIDS subjects

    Directory of Open Access Journals (Sweden)

    Chiara Frazzoli

    Full Text Available The Egusi Okra soup is a traditional African meal that is considered of high nutritional value and protective against weight loss. We introduce the concept of “kitchen toxicology” to analyse the recipe of the Egusi Okra soup and highlight possible mitigation measures for toxic and/or antinutritional effects in the wide spectrum of health and nutritional needs of HIV+/AIDS subjects. In particular, we focus on toxicants (environmental contaminants, process contaminants, substances leaching from food contact materials dysregulating the immune status, as well as on interactions between nutrients, contaminants, and/or antinutrients which may lead to secondary/conditioned nutritional deficiencies or imbalances; in their turn, these can modulate the ability to cope with toxicants, and increase nutritional requirements. Recommendations are given for practices preserving the Egusi Okra soup from such risk factors, identifying points of particular attention during meal preparation, from purchase of raw ingredients through to food handling, cooking, storage, and consumption. The Egusi Okra soup is discussed in the context of a diet that is asked to mitigate complications (weight loss, opportunistic infections and support antiretroviral therapy in African countries with high HIV/AIDS prevalence. The paper discusses how nutritional interventions benefit of the integration of kitchen toxicology practices in everyday life. Toxicological risk assessment is crucial to understand the history and status of the person exposed to or affected by infectious diseases. Keywords: Traditional diet, Malnutrition, Food safety, Weight loss, Immune system, Dysmetabolic diseases, Clinical toxicology, Nutrition security

  20. Redefining Exploitation

    DEFF Research Database (Denmark)

    Agarwala, Rina

    2016-01-01

    This article examines how self-employed workers are organizing in the garments and waste collection industries in India. Although the question of who is profiting from self-employed workers’ labor is complex, the cases outlined in this paper highlight telling instances of how some self......-employed workers are organizing as workers. They are fighting labor exploitation by redefining the concept to include additional exploitation axes (from the state and middle class) and forms (including sexual). In doing so, they are redefining potential solutions, including identities and material benefits, to fit...... their unique needs. By expanding the category of “workers” beyond those defined by a narrow focus on a standard employer-employee relationship, these movements are also fighting exclusion from earlier labor protections by increasing the number of entitled beneficiaries. These struggles provide an important...

  1. Sensors

    CERN Document Server

    Pigorsch, Enrico

    1997-01-01

    This is the 5th edition of the Metra Martech Directory "EUROPEAN CENTRES OF EXPERTISE - SENSORS." The entries represent a survey of European sensors development. The new edition contains 425 detailed profiles of companies and research institutions in 22 countries. This is reflected in the diversity of sensors development programmes described, from sensors for physical parameters to biosensors and intelligent sensor systems. We do not claim that all European organisations developing sensors are included, but this is a good cross section from an invited list of participants. If you see gaps or omissions, or would like your organisation to be included, please send details. The data base invites the formation of effective joint ventures by identifying and providing access to specific areas in which organisations offer collaboration. This issue is recognised to be of great importance and most entrants include details of collaboration offered and sought. We hope the directory on Sensors will help you to find the ri...

  2. Sensors

    Energy Technology Data Exchange (ETDEWEB)

    Jensen, H. [PBI-Dansensor A/S (Denmark); Toft Soerensen, O. [Risoe National Lab., Materials Research Dept. (Denmark)

    1999-10-01

    A new type of ceramic oxygen sensors based on semiconducting oxides was developed in this project. The advantage of these sensors compared to standard ZrO{sub 2} sensors is that they do not require a reference gas and that they can be produced in small sizes. The sensor design and the techniques developed for production of these sensors are judged suitable by the participating industry for a niche production of a new generation of oxygen sensors. Materials research on new oxygen ion conducting conductors both for applications in oxygen sensors and in fuel was also performed in this project and finally a new process was developed for fabrication of ceramic tubes by dip-coating. (EHS)

  3. Ultrasonic imaging of material flaws exploiting multipath information

    Science.gov (United States)

    Shen, Xizhong; Zhang, Yimin D.; Demirli, Ramazan; Amin, Moeness G.

    2011-05-01

    In this paper, we consider ultrasonic imaging for the visualization of flaws in a material. Ultrasonic imaging is a powerful nondestructive testing (NDT) tool which assesses material conditions via the detection, localization, and classification of flaws inside a structure. Multipath exploitations provide extended virtual array apertures and, in turn, enhance imaging capability beyond the limitation of traditional multisensor approaches. We utilize reflections of ultrasonic signals which occur when encountering different media and interior discontinuities. The waveforms observed at the physical as well as virtual sensors yield additional measurements corresponding to different aspect angles. Exploitation of multipath information addresses unique issues observed in ultrasonic imaging. (1) Utilization of physical and virtual sensors significantly extends the array aperture for image enhancement. (2) Multipath signals extend the angle of view of the narrow beamwidth of the ultrasound transducers, allowing improved visibility and array design flexibility. (3) Ultrasonic signals experience difficulty in penetrating a flaw, thus the aspect angle of the observation is limited unless access to other sides is available. The significant extension of the aperture makes it possible to yield flaw observation from multiple aspect angles. We show that data fusion of physical and virtual sensor data significantly improves the detection and localization performance. The effectiveness of the proposed multipath exploitation approach is demonstrated through experimental studies.

  4. Towards the development of cascaded surface plasmon resonance POF sensors exploiting gold films and synthetic recognition elements for detection of contaminants in transformer oil

    Directory of Open Access Journals (Sweden)

    M. Pesavento

    2017-04-01

    Full Text Available The possibility of developing a multichannel optical chemical sensor, based on molecularly imprinted polymers (MIPs and surface plasmon resonance (SPR in a D-shaped multimode plastic optical fiber (POF, is presented by two cascaded SPR-POF-MIP sensors with different thicknesses of the gold layer. The low cost, the high selectivity and sensitivity of the SPR-POF-MIP platforms and the simple and modular scheme of the optical interrogation layout make this system a potentially suitable on-line multi-diagnostic tool. As a proof of principle, the possibility of simultaneous determination of two important analytes, dibenzyl disulfide (DBDS and furfural (2-FAL, in power transformer oil was investigated. Their presence gives useful indication of underway corrosive or ageing processes in power transformers, respectively. Preliminarily, the dependence of the performance of the D-shaped optical platform on the gold film thickness has been studied, comparing two platforms with 30 nm and 60 nm thick gold layers. It has been found that the resonance wavelengths are different on platforms with gold layer of different thickness, furthermore when MIPs are present on the gold as receptors, the performances of the platforms are similar in the two considered sensors. Keywords: Cascaded multianalyte detection, Surface plasmon resonance, Dibenzyl disulfide, Furfural (furan-2-carbaldehyde, Molecularly imprinted polymers, Plastic optical fibers

  5. Global Crop Area Monitoring at High Resolution Exploiting Complementary Use of Free and Open SAR and VSNIR/SWIR Sensor Data Sets

    Science.gov (United States)

    Lemoine, G.; LEO, O.

    2015-12-01

    Earth Observation imaging sensors with spatial resolutions in the 10-30 m range allow for separation of the area and crop status contributions to the radiometric signatures, typically at parcel level for a wide range of arable crop production systems. These sensors complement current monitoring efforts that deploy low (100-1000 m) resolution VSNIR/SWIR sensors like MODIS, METOP or PROBA-V, which provide denser time series, but with aggregated and mixed radiometric information for cropped areas. "Free and Open" access to US Landsat imagery has recently been complemented by the European Union's Copernicus program with access to Sentinel-1A C-band SAR and Sentinel-2A visual, near and short-ware infrared (VSNIR/SWIR) sensor data in the 10-20 m resolution range. Sentinel-1A has already proven that consistent time series can be generated at its 12 day revisit frequency. The density of Sentinel-2 time series will greatly expand the availability of [partially cloud covered] VSNIR/SWIR imagery. The release of this large new data flow coincides with wider availability of "big data" processing capacity, the public release of ever more detailed ancillary data sets that support extraction of georeferenced and robust indicators on crop production and their spatial and temporal statistics and developments in crowd-sourced mobile data collection for data validation purposes. We will illustrate the use of hybrid SAR and VSNIR/SWIR data sets from Sentinel-1 and Landsat-8 (and initially released Sentinel-2 imagery) for a number of selected examples. These include crop area delineation and classification in the Netherlands with the support of detailed parcel delineation sets for validation, detection of winter cereal cultivation in Ukraine, impact of the Syrian civil war on irrigated summer crop cultivation and recent examples in support to crop anomaly detection in food insecure areas (North Korea, Sub-Saharan Africa). We discuss method implementation, operational issues and outline

  6. Exploiting Performance of Different Low-Cost Sensors for Small Amplitude Oscillatory Motion Monitoring: Preliminary Comparisons in View of Possible Integration

    Directory of Open Access Journals (Sweden)

    Elisa Benedetti

    2016-01-01

    Full Text Available We address the problem of low amplitude oscillatory motion detection through different low-cost sensors: a LIS3LV02DQ MEMS accelerometer, a Microsoft Kinect v2 range camera, and a uBlox 6 GPS receiver. Several tests were performed using a one-direction vibrating table with different oscillation frequencies (in the range 1.5–3 Hz and small challenging amplitudes (0.02 m and 0.03 m. A Mikrotron EoSens high-resolution camera was used to give reference data. A dedicated software tool was developed to retrieve Kinect v2 results. The capabilities of the VADASE algorithm were employed to process uBlox 6 GPS receiver observations. In the investigated time interval (in the order of tens of seconds the results obtained indicate that displacements were detected with the resolution of fractions of millimeters with MEMS accelerometer and Kinect v2 and few millimeters with uBlox 6. MEMS accelerometer displays the lowest noise but a significant bias, whereas Kinect v2 and uBlox 6 appear more stable. The results suggest the possibility of sensor integration both for indoor (MEMS accelerometer + Kinect v2 and for outdoor (MEMS accelerometer + uBlox 6 applications and seem promising for structural monitoring applications.

  7. MITRE sensor layer prototype

    Science.gov (United States)

    Duff, Francis; McGarry, Donald; Zasada, David; Foote, Scott

    2009-05-01

    The MITRE Sensor Layer Prototype is an initial design effort to enable every sensor to help create new capabilities through collaborative data sharing. By making both upstream (raw) and downstream (processed) sensor data visible, users can access the specific level, type, and quantities of data needed to create new data products that were never anticipated by the original designers of the individual sensors. The major characteristic that sets sensor data services apart from typical enterprise services is the volume (on the order of multiple terabytes) of raw data that can be generated by most sensors. Traditional tightly coupled processing approaches extract pre-determined information from the incoming raw sensor data, format it, and send it to predetermined users. The community is rapidly reaching the conclusion that tightly coupled sensor processing loses too much potentially critical information.1 Hence upstream (raw and partially processed) data must be extracted, rapidly archived, and advertised to the enterprise for unanticipated uses. The authors believe layered sensing net-centric integration can be achieved through a standardize-encapsulate-syndicateaggregate- manipulate-process paradigm. The Sensor Layer Prototype's technical approach focuses on implementing this proof of concept framework to make sensor data visible, accessible and useful to the enterprise. To achieve this, a "raw" data tap between physical transducers associated with sensor arrays and the embedded sensor signal processing hardware and software has been exploited. Second, we encapsulate and expose both raw and partially processed data to the enterprise within the context of a service-oriented architecture. Third, we advertise the presence of multiple types, and multiple layers of data through geographic-enabled Really Simple Syndication (GeoRSS) services. These GeoRSS feeds are aggregated, manipulated, and filtered by a feed aggregator. After filtering these feeds to bring just the type

  8. Sensor

    OpenAIRE

    Gleeson, Helen; Dierking, Ingo; Grieve, Bruce; Woodyatt, Christopher; Brimicombe, Paul

    2015-01-01

    An electrical temperature sensor (10) comprises a liquid crystalline material (12). First and second electrically conductive contacts (14), (16), having a spaced relationship there between, contact the liquid crystalline material (12). An electric property measuring device is electrically connected to the first and second contacts (14), (16) and is arranged to measure an electric property of the liquid crystalline material (12). The liquid crystalline material (12) has a transition temperatur...

  9. The Ethics of Exploitation

    Directory of Open Access Journals (Sweden)

    Paul McLaughlin

    2008-11-01

    Full Text Available Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to demonstrate the moral complexity of exploitation. We contend, moreover, that moral evaluation of exploitation is only possible once we abandon a strictly Marxian framework and attempt, in the long run, to develop an integral ethic along Godwinian lines.

  10. Network exploitation using WAMI tracks

    Science.gov (United States)

    Rimey, Ray; Record, Jim; Keefe, Dan; Kennedy, Levi; Cramer, Chris

    2011-06-01

    Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.

  11. A fluorescent molecular sensor for pH windows in traditional and polymeric biocompatible micelles: comicellization of anionic species to shift and reshape the ON window.

    Science.gov (United States)

    Cavallaro, Gennara; Giammona, Gaetano; Pasotti, Luca; Pallavicini, Piersandro

    2011-09-12

    A new approach is presented to obtain fluorescent sensors for pH windows that work in water and under biomimetic conditions. A single molecule that features all-covalently linked components is used, thus making it capable of working as a fluorescent sensor with an OFF/ON/OFF response to pH value. The components are a tertiary amine, a pyridine, and a fluorophore (pyrene). The forms with both protonated bases or both neutral bases quench the pyrene fluorescence, whereas the form with the neutral pyridine and protonated amine groups is fluorescent. The molecular sensor is also equipped with a long alkyl chain to make it highly hydrophobic in all its protonated and unprotonated forms, that is, either when neutral or charged. Accordingly, it can be confined at any pH value either in traditional (i.e., low-molecular-weight) nonionic surfactant micelles or inside polymeric, biocompatible micellar containers. Relevant for future applications in vivo, thanks to its strong hydrophobicity, no leakage of the molecular sensor is observed from the polymeric biocompatible micelles. Due to the proximity of the pyridine and amine functions in the molecular structure and the poor hydration inside the micelles, the observed pK(a) values are low so that the ON window is positioned at very low pH values. However, the window can be shifted to biologically relevant values by comicellization of anionic species. In particular, in the micelles of the nonionic surfactant TritonX-100, a shift of the ON window to pH 4-6 is obtained by addition of the anionic sodium dodecyl sulphate surfactant, whose negative charge promotes the stability of the protonated forms of the pyridine and amine fragments. In the case of the polymeric micelles, we introduce the use of the amphiphilic polystyrene sulfonate anionic polyelectrolyte, the comicellization of which induces a shift and sharpening of the ON window that is centered at pH 4. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  12. Activity-based exploitation of Full Motion Video (FMV)

    Science.gov (United States)

    Kant, Shashi

    2012-06-01

    Video has been a game-changer in how US forces are able to find, track and defeat its adversaries. With millions of minutes of video being generated from an increasing number of sensor platforms, the DOD has stated that the rapid increase in video is overwhelming their analysts. The manpower required to view and garner useable information from the flood of video is unaffordable, especially in light of current fiscal restraints. "Search" within full-motion video has traditionally relied on human tagging of content, and video metadata, to provision filtering and locate segments of interest, in the context of analyst query. Our approach utilizes a novel machine-vision based approach to index FMV, using object recognition & tracking, events and activities detection. This approach enables FMV exploitation in real-time, as well as a forensic look-back within archives. This approach can help get the most information out of video sensor collection, help focus the attention of overburdened analysts form connections in activity over time and conserve national fiscal resources in exploiting FMV.

  13. Exploit Kit traffic analysis

    OpenAIRE

    Καπίρης, Σταμάτης; Kapiris, Stamatis

    2017-01-01

    Exploit kits have become one of the most widespread and destructive threat that Internet users face on a daily basis. Since the first actor, which has been categorized as exploit kit, namely MPack, appeared in 2006, we have seen a new era on exploit kit variants compromising popular websites, infecting hosts and delivering destructive malware, following an exponentially evolvement to date. With the growing threat landscape, large enterprises to domestic networks, have starte...

  14. Exploitability Assessment with TEASER

    Science.gov (United States)

    2017-05-01

    for architectural neutral taint analysis on top of LLVM and QEMU. POC Proof of Concept : Demonstration of an exploit on a program . vii RCE Remote Code...bug with a Proof of Concept (POC), or input to a program demonstrating the ability to use a bug to exploit the application, to demonstrate the...often leads to either computationally difficult constraint solving problems or taint explosion. Given the computational difficulty of exploit

  15. Anthropology of sexual exploitation

    Directory of Open Access Journals (Sweden)

    Lalić Velibor

    2009-01-01

    Full Text Available In this paper, the authors observe sexual exploitation from an anthropological perspective. They analyze the rational, ethical, emotional and mythological dimensions of human sexuality. Consequently, after setting the phenomenon in a social and historical context, sexual exploitation is closely observed in the contemporary age. Based on thoughts of relevant thinkers, they make the conclusion that the elimination of sexual exploitation is not an utterly legal issue, but political and economical issues as well. Namely, legal norms are not sufficient to overcome sexual exploitation, but, political and economical relationships in contemporary societies, which will be based on sincere equal opportunities must be established.

  16. Exploitation and disadvantage

    NARCIS (Netherlands)

    Ferguson, B.

    2016-01-01

    According to some accounts of exploitation, most notably Ruth Sample's (2003) degradation-based account and Robert Goodin's (1987) vulnerability-based account, exploitation occurs when an advantaged party fails to constrain their advantage in light of another's disadvantage, regardless of the cause

  17. EXPLOITATION OF GRANITE BOULDER

    Directory of Open Access Journals (Sweden)

    Ivan Cotman

    1994-12-01

    Full Text Available The processes of forming, petrography, features, properties and exploitation of granite boulders are described. The directional drilling and black powder blasting is the succesful method in exploitation of granite boulders (boulder technology (the paper is published in Croatian.

  18. Poverty-Exploitation-Alienation.

    Science.gov (United States)

    Bronfenbrenner, Martin

    1980-01-01

    Illustrates how knowledge derived from the discipline of economics can be used to help shed light on social problems such as poverty, exploitation, and alienation, and can help decision makers form policy to minimize these and similar problems. (DB)

  19. Exploiting VM/XA

    International Nuclear Information System (INIS)

    Boeheim, C.

    1990-03-01

    The Stanford Linear Accelerator Center has recently completed a conversion to IBM's VM/XA SP Release 2 operating system. The primary physics application had been constrained by the previous 16 megabyte memory limit. Work is underway to enable this application to exploit the new features of VM/XA. This paper presents a brief tutorial on how to convert an application to exploit VM/XA and discusses some of the SLAC experiences in doing so. 13 figs

  20. Fusion of Images from Dissimilar Sensor Systems

    National Research Council Canada - National Science Library

    Chow, Khin

    2004-01-01

    Different sensors exploit different regions of the electromagnetic spectrum; therefore a multi-sensor image fusion system can take full advantage of the complementary capabilities of individual sensors in the suit...

  1. Dissemination and Exploitation Strategy

    DEFF Research Database (Denmark)

    Badger, Merete; Monaco, Lucio; Fransson, Torsten

    of Technology in Sweden, Politecnico di Torino in Italy, and Eindhoven University of Technology in the Netherlands. The project is partially funded by the European Commission under the 7th Framework Programme (project no. RI-283746). This report describes the final dissemination and exploitation strategy...... for project Virtual Campus Hub. A preliminary dissemination and exploitation plan was setup early in the project as described in the deliverable D6.1 Dissemination strategy paper - preliminary version. The plan has been revised on a monthly basis during the project’s lifecycle in connection with the virtual...

  2. Managing the Innovators for Exploration and Exploitation

    Directory of Open Access Journals (Sweden)

    C. Annique UN

    2007-09-01

    Full Text Available I analyze how to manage employees to achieve a balance between exploration and exploitation in large established firms. Previous studies suggest that, although firms need to undertake both exploration and exploitation simultaneously, this is difficult either because of the scarcity of resources or because of the incompatibility of these two processes. Proposed solutions have been ambidexterity, punctuated equilibrium or specialization. I suggest another method: managing employees. Specifically, I argue that using the so-called “innovative” system of human resource management practices, consisting of team-based incentive system, team-based job design, and job rotation, enables the firm to undertake exploration and exploitation simultaneously because it provides the psychological safety for people to explore new knowledge to make novel products and develops employees to have the perspective-taking capability that enables the integration of knowledge cross-functionally for efficiency. Using the so-called “traditional” system of human resource management practices, consisting of individual-based incentive system, individual-based job design, and no job rotation, has limited impact on either exploration or exploitation because it does not create the psychological safety for people to explore new knowledge and does not develop the perspective-taking capability needed for exploitation. Moreover, mixing practices from both systems is better than only using the traditional system in achieving exploration or exploitation, but less effective than only using the innovative system as the mix of practices can create inconsistent expectations on employees.

  3. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  4. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  5. Nanostructured Basaltfiberconcrete Exploitational Characteristics

    Science.gov (United States)

    Saraykina, K. A.; Shamanov, V. A.

    2017-11-01

    The article demonstrates that the mass use of basalt fiber concrete (BFC) is constrained by insufficient study of their durability and serviceability in a variety of environments. This research is aimed at the study of the basalt fiber corrosion processes in the cement stone of BFC, the control of the new products structure formation in order to protect the reinforcing fiber from alkaline destruction and thereby improve the exploitational characteristics of the composite. The research result revealed that the modification of basaltfiber concrete by the dispersion of MWNTs contributes to the directional formation of new products in the cement matrix. The HAM additive in basaltfiberconcrete provides for the binding of portlandite to low-basic calcium hydroaluminosilicates, thus reducing the aggressive effect of the cement environment on the reinforcing fibers properties. The complex modification of BFC with nanostructured additives provides for an increase in its durability and exploitational properties (strength, frost resistance and water resistance) due to basalt fiber protection from alkali corrosion on account of the compacting of the contact zone “basalt fiber - cement stone” and designing of the new products structure and morphology of cement matrix over the fiber surface.

  6. Feasibility study of a latchup-based particle detector exploiting commercial CMOS technologies

    International Nuclear Information System (INIS)

    Gabrielli, A.; Matteucci, G.; Civera, P.; Demarchi, D.; Villani, G.; Weber, M.

    2009-01-01

    The stimulated ignition of latchup effects caused by external radiation has so far proved to be a hidden hazard. Here this effect is described as a novel approach to detect particles by means of a solid-state device susceptible to latchup effects. In addition, the device can also be used as a circuit for reading sensors devices, leaving the capability of sensing to external sensors. The paper first describes the state-of-the-art of the project and its development over the latest years, then the present and future studies are proposed. An elementary cell composed of two transistors connected in a thyristor structure is shown. The study begins using traditional bipolar transistors since the latchup effect is originated as a parasitic circuit composed of such devices. Then, an equivalent circuit built up of MOS transistors is exploited, resulting an even more promising and challenging configuration than that obtained via bipolar transistors. As the MOS transistors are widely used at present in microelectronics devices and sensors, a latchup-based cell is proposed as a novel structure for future applications in particle detection, amplification of signal sensors and radiation monitoring.

  7. Exploitation by Economic Necessity

    Directory of Open Access Journals (Sweden)

    Kristian F. Braekkan

    2015-10-01

    Full Text Available This study develops and tests a model that proposes economic necessity moderates the relationship between psychological contract violations (PCVs and organizational commitment and trust in the employing organization among non-unionized manufacturing workers (N = 226. Moderated regression analyses revealed that there was a significant interaction between PCV and economic necessity in predicting both outcomes. Specifically, the findings indicated that individuals experiencing high PCV and high economic necessity did not decrease their organizational commitment like their counterparts who endorsed lower economic necessity. They did, however, experience significantly decreased trust in their employer. The findings suggest that individuals who are forced to sell their labor power and obtain what they need through the market are more likely to continue to be exploited by their employer, as they have no other options than to continue the relationship. The importance of the findings is discussed, and recommendations for future research are provided.

  8. Exploitative Learning by Exporting

    DEFF Research Database (Denmark)

    Golovko, Elena; Lopes Bento, Cindy; Sofka, Wolfgang

    Decisions on entering foreign markets are among the most challenging but also potentially rewarding strategy choices managers can make. In this study, we examine the effect of export entry on the firm investment decisions in two activities associated with learning about new technologies...... and learning about new markets ? R&D investments and marketing investments, in search of novel insights into the content and process underlying learning by exporting. We draw from organizational learning theory for predicting changes in both R&D and marketing investment patterns that accompany firm entry......, it is predominantly the marketing-related investment decisions associated with starting to export that lead to increases in firm productivity. We conclude that learning-by-exporting might be more properly characterized as ?learning about and exploiting new markets? rather than ?learning about new technologies...

  9. Learning Metasploit exploitation and development

    CERN Document Server

    Balapure, Aditya

    2013-01-01

    A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits.This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level.Prior experience exploiting basic st

  10. Profits and Exploitation: A Reappraisal

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2011-01-01

    This paper provides a mathematical analysis of the Marxian theory of the exploitation of labour in general equilibrium models. The two main definitions of Marxian exploitation in the literature, proposed by Morishima (1974) and Roemer (1982), respectively, are analysed in the context of general convex economies. It is shown that, contrary to the received view, in general these definitions do not preserve the so-called Fundamental Marxian Theorem (FMT), which states that the exploitation of la...

  11. Enhanced Sensitivity to Detection Nanomolar Level of Cu2 + Compared to Spectrophotometry Method by Functionalized Gold Nanoparticles: Design of Sensor Assisted by Exploiting First-order Data with Chemometrics

    Science.gov (United States)

    Rasouli, Zolaikha; Ghavami, Raouf

    2018-02-01

    A simple, sensitive and efficient colorimetric assay platform for the determination of Cu2 + was proposed with the aim of developing sensitive detection based on the aggregation of AuNPs in presence of a histamine H2-receptor antagonist (famotidine, FAM) as recognition site. This study is the first to demonstrate that the molar extinction coefficients of the complexes formed by FAM and Cu2 + are very low (by analyzing the chemometrics methods on the first order data arising from different metal to ligand ratio method), leading to the undesirable sensitivity of FAM-based assays. To resolve the problem of low sensitivity, the colorimetry method based on the Cu2 +-induced aggregation of AuNPs functionalized with FAM was introduced. This procedure is accompanied by a color change from bright red to blue which can be observed with the naked eyes. Detection sensitivity obtained by the developed method increased about 100 fold compared with the spectrophotometry method. This sensor exhibited a good linear relation between the absorbance ratios at 670 to 520 nm (A670/520) and the concentration in the range 2-110 nM with LOD = 0.76 nM. The satisfactory analytical performance of the proposed sensor facilitates the development of simple and affordable UV-Vis chemosensors for environmental applications.

  12. Consensual exploitation : the moral wrong in exploitation and legal restrictions on consensual exploitative transactions

    OpenAIRE

    van der Neut, Wendy

    2014-01-01

    This thesis is about so-­‐called consensual exploitative transactions: transactions to which all parties agree voluntarily, and which are beneficial for all parties, but which are still widely considered exploitative, and for that reason legally restricted in many countries. The thesis asks two main questions: 1. What is wrong with consensual exploitation? 2.What implications does the answer to this question have for the legal restriction of consensual transactions ...

  13. Intelligence, mapping, and geospatial exploitation system (IMAGES)

    Science.gov (United States)

    Moellman, Dennis E.; Cain, Joel M.

    1998-08-01

    This paper provides further detail to one facet of the battlespace visualization concept described in last year's paper Battlespace Situation Awareness for Force XXI. It focuses on the National Imagery and Mapping Agency (NIMA) goal to 'provide customers seamless access to tailorable imagery, imagery intelligence, and geospatial information.' This paper describes Intelligence, Mapping, and Geospatial Exploitation System (IMAGES), an exploitation element capable of CONUS baseplant operations or field deployment to provide NIMA geospatial information collaboratively into a reconnaissance, surveillance, and target acquisition (RSTA) environment through the United States Imagery and Geospatial Information System (USIGS). In a baseplant CONUS setting IMAGES could be used to produce foundation data to support mission planning. In the field it could be directly associated with a tactical sensor receiver or ground station (e.g. UAV or UGV) to provide near real-time and mission specific RSTA to support mission execution. This paper provides IMAGES functional level design; describes the technologies, their interactions and interdependencies; and presents a notional operational scenario to illustrate the system flexibility. Using as a system backbone an intelligent software agent technology, called Open Agent ArchitectureTM (OAATM), IMAGES combines multimodal data entry, natural language understanding, and perceptual and evidential reasoning for system management. Configured to be DII COE compliant, it would utilize, to the extent possible, COTS applications software for data management, processing, fusion, exploitation, and reporting. It would also be modular, scaleable, and reconfigurable. This paper describes how the OAATM achieves data synchronization and enables the necessary level of information to be rapidly available to various command echelons for making informed decisions. The reasoning component will provide for the best information to be developed in the timeline

  14. Keeping Tradition

    NARCIS (Netherlands)

    Zenhong, C.; Buwalda, P.L.

    2011-01-01

    Chinese dumplings such as Jiao Zi and Bao Zi are two of the popular traditional foods in Asia. They are usually made from wheat flour dough (rice flour or starch is sometimes used) that contains fillings. They can be steamed, boiled and fried and are consumed either as a main meal or dessert. As

  15. Wideband Low Noise Amplifiers Exploiting Thermal Noise Cancellation

    NARCIS (Netherlands)

    Bruccoleri, F.; Klumperink, Eric A.M.; Nauta, Bram

    2005-01-01

    Low Noise Amplifiers (LNAs) are commonly used to amplify signals that are too weak for direct processing for example in radio or cable receivers. Traditionally, low noise amplifiers are implemented via tuned amplifiers, exploiting inductors and capacitors in resonating LC-circuits. This can render

  16. Professional Android Sensor Programming

    CERN Document Server

    Milette, Greg

    2012-01-01

    Learn to build human-interactive Android apps, starting with device sensors This book shows Android developers how to exploit the rich set of device sensors—locational, physical (temperature, pressure, light, acceleration, etc.), cameras, microphones, and speech recognition—in order to build fully human-interactive Android applications. Whether providing hands-free directions or checking your blood pressure, Professional Android Sensor Programming shows how to turn possibility into reality. The authors provide techniques that bridge the gap between accessing sensors and putting the

  17. Exploitation of heterogeneous resources for ATLAS Computing

    CERN Document Server

    Chudoba, Jiri; The ATLAS collaboration

    2018-01-01

    LHC experiments require significant computational resources for Monte Carlo simulations and real data processing and the ATLAS experiment is not an exception. In 2017, ATLAS exploited steadily almost 3M HS06 units, which corresponds to about 300 000 standard CPU cores. The total disk and tape capacity managed by the Rucio data management system exceeded 350 PB. Resources are provided mostly by Grid computing centers distributed in geographically separated locations and connected by the Grid middleware. The ATLAS collaboration developed several systems to manage computational jobs, data files and network transfers. ATLAS solutions for job and data management (PanDA and Rucio) were generalized and now are used also by other collaborations. More components are needed to include new resources such as private and public clouds, volunteers' desktop computers and primarily supercomputers in major HPC centers. Workflows and data flows significantly differ for these less traditional resources and extensive software re...

  18. ROUNDTABLE - SESSION 2 EXPLOITATION, CONSERVATION AND LEGISLATION

    Directory of Open Access Journals (Sweden)

    EDSMAN L.

    2004-01-01

    Full Text Available The link between socioeconomics and conservation and the role of legislation in conservation work was discussed in the group with participants from nine European countries. Interest and knowledge among the general public, stakeholders and managers is the key to successful conservation of native crayfish species. Exploitation and conservation do not necessarily exclude each other. A controlled fishery, where it can be sustained, may be an essential tool for conservation by increasing the general awareness and involving more people in the task of protecting the native crayfish species. This strategy is mainly possible for the noble crayfish in the northern part of its distribution, where strong traditions connected to crayfish also exist. A balance between utilisation and overexploitation has to be found and local guidelines for sustainable exploitation produced. Media, the Internet and educational material aimed at schools and stakeholders are excellent ways of reaching a wide audience with information. Universal objectives, rules and regulations at the European level are desirable and the noble crayfish and the stone crayfish should be included in Annex II of the Habitat Directive. Based on this framework detailed regulations are best worked out at the national level, considering the specific crayfish situation in the country. Information about the legislation, the purpose of the legislation and the consequences when not obeying it should be distributed. Stricter regulation of the trade with live alien crayfish is vital because of the associated risk of introducing new diseases and species.

  19. [Traditional nostrum].

    Science.gov (United States)

    Sugiyama, Shigeru

    2006-01-01

    The commercialization of drugs started toward the end of Heian period (794-1192) when not only aristocrats and monks who were traditional patrons to drug makers, but also local clans and landlords who became powerful as a result of the disbanding of aristocratic manors accumulated enough wealth to spend money on medicine. Although traveling around the country was still a dangerous endeavor, merchants assembled groups to bring lucrative foreign drugs (mainly Chinese) to remote areas. The spread of commercial drugs to common people, however, did not happen until the early Edo period (1603-1867), when the so-called barrier system was installed nationwide to make domestic travel safe. Commercialization started in large cities and gradually spread to other areas. Many nostrums popular until recently appeared in the Genroku period (1688-1703) or later. Many such nostrums were all-cures, often consisting of such active ingredients as Saussureae radix, Agalloch, or Gambir. Even in the Edo period, many people living in agricultural or fishing villages, as well as those in the lower tier, were still poor. Much of the medication available to those people was therefore made of various plant or animal-derived substances that were traditionally used as folk medicines.

  20. GOOSE: Semantic search on Internet connected sensors

    NARCIS (Netherlands)

    Schutte, K.; Bomhof, F.W.; Burghouts, G.J.; Diggelen, J. van; Hiemstra, P.; Hof, J. van 't; Kraaij, W.; Pasman, K.H.W.; Smith, A.J.E.; Versloot, C.A.; Wit, J.J. de

    2013-01-01

    More and more sensors are getting Internet connected. Examples are cameras on cell phones, CCTV cameras for traffic control as well as dedicated security and defense sensor systems. Due to the steadily increasing data volume, human exploitation of all this sensor data is impossible for effective

  1. Intelligent gas-mixture flow sensor

    NARCIS (Netherlands)

    Lammerink, Theodorus S.J.; Dijkstra, Fred; Houkes, Z.; van Kuijk, J.C.C.; van Kuijk, Joost

    A simple way to realize a gas-mixture flow sensor is presented. The sensor is capable of measuring two parameters from a gas flow. Both the flow rate and the helium content of a helium-nitrogen gas mixture are measured. The sensor exploits two measurement principles in combination with (local)

  2. Exploitation of Smart Materials and Sensors as Disruptive Technologies

    Science.gov (United States)

    2010-03-01

    could form part of an automated flight control system that might minimise buffeting or incipient stall. It might be used on manned aircraft to...healing agents into a material system on its original performance must be accounted for. Self-healing by micro-encapsulation has been used to...Massachusetts, USA(2006). 135 Afshar V, S., Warren -Smith, S. C., & Monro, T. M., "Enhancement of Fluorescence-based Sensing Using Microstructured

  3. Teotihuacan, tepeapulco, and obsidian exploitation.

    Science.gov (United States)

    Charlton, T H

    1978-06-16

    Current cultural ecological models of the development of civilization in central Mexico emphasize the role of subsistence production techniques and organization. The recent use of established and productive archeological surface survey techniques along natural corridors of communication between favorable niches for cultural development within the Central Mexican symbiotic region resulted in the location of sites that indicate an early development of a decentralized resource exploitation, manufacturing, and exchange network. The association of the development of this system with Teotihuacán indicates the importance such nonsubsistence production and exchange had in the evolution of this first central Mexican civilization. The later expansion of Teotihuacán into more distant areas of Mesoamerica was based on this resource exploitation model. Later civilizations centered at Tula and Tenochtitlán also used such a model in their expansion.

  4. Sensor agnostic object recognition using a map seeking circuit

    Science.gov (United States)

    Overman, Timothy L.; Hart, Michael

    2012-05-01

    Automatic object recognition capabilities are traditionally tuned to exploit the specific sensing modality they were designed to. Their successes (and shortcomings) are tied to object segmentation from the background, they typically require highly skilled personnel to train them, and they become cumbersome with the introduction of new objects. In this paper we describe a sensor independent algorithm based on the biologically inspired technology of map seeking circuits (MSC) which overcomes many of these obstacles. In particular, the MSC concept offers transparency in object recognition from a common interface to all sensor types, analogous to a USB device. It also provides a common core framework that is independent of the sensor and expandable to support high dimensionality decision spaces. Ease in training is assured by using commercially available 3D models from the video game community. The search time remains linear no matter how many objects are introduced, ensuring rapid object recognition. Here, we report results of an MSC algorithm applied to object recognition and pose estimation from high range resolution radar (1D), electrooptical imagery (2D), and LIDAR point clouds (3D) separately. By abstracting the sensor phenomenology from the underlying a prior knowledge base, MSC shows promise as an easily adaptable tool for incorporating additional sensor inputs.

  5. The ESA Geohazard Exploitation Platform

    Science.gov (United States)

    Bally, Philippe; Laur, Henri; Mathieu, Pierre-Philippe; Pinto, Salvatore

    2015-04-01

    Earthquakes represent one of the world's most significant hazards in terms both of loss of life and damages. In the first decade of the 21st century, earthquakes accounted for 60 percent of fatalities from natural disasters, according to the United Nations International Strategy for Disaster Reduction (UNISDR). To support mitigation activities designed to assess and reduce risks and improve response in emergency situations, satellite EO can be used to provide a broad range of geo-information services. This includes for instance crustal block boundary mapping to better characterize active faults, strain rate mapping to assess how rapidly faults are deforming, soil vulnerability mapping to help estimate how the soil is behaving in reaction to seismic phenomena, geo-information to assess the extent and intensity of the earthquake impact on man-made structures and formulate assumptions on the evolution of the seismic sequence, i.e. where local aftershocks or future main shocks (on nearby faults) are most likely to occur. In May 2012, the European Space Agency and the GEO Secretariat convened the International Forum on Satellite EO for Geohazards now known as the Santorini Conference. The event was the continuation of a series of international workshops such as those organized by the Geohazards Theme of the Integrated Global Observing Strategy Partnership. In Santorini the seismic community has set out a vision of the EO contribution to an operational global seismic risk program, which lead to the Geohazard Supersites and Natural Laboratories (GSNL) initiative. The initial contribution of ESA to suuport the GSNL was the first Supersites Exploitation Platform (SSEP) system in the framework of Grid Processing On Demand (GPOD), now followed by the Geohazard Exploitation Platform (GEP). In this presentation, we will describe the contribution of the GEP for exploiting satellite EO for geohazard risk assessment. It is supporting the GEO Supersites and has been further

  6. Adaptive sensor fusion using genetic algorithms

    International Nuclear Information System (INIS)

    Fitzgerald, D.S.; Adams, D.G.

    1994-01-01

    Past attempts at sensor fusion have used some form of Boolean logic to combine the sensor information. As an alteniative, an adaptive ''fuzzy'' sensor fusion technique is described in this paper. This technique exploits the robust capabilities of fuzzy logic in the decision process as well as the optimization features of the genetic algorithm. This paper presents a brief background on fuzzy logic and genetic algorithms and how they are used in an online implementation of adaptive sensor fusion

  7. Artificial intelligence based event detection in wireless sensor networks

    NARCIS (Netherlands)

    Bahrepour, M.

    2013-01-01

    Wireless sensor networks (WSNs) are composed of large number of small, inexpensive devices, called sensor nodes, which are equipped with sensing, processing, and communication capabilities. While traditional applications of wireless sensor networks focused on periodic monitoring, the focus of more

  8. Virtual Sensor Test Instrumentation

    Science.gov (United States)

    Wang, Roy

    2011-01-01

    Virtual Sensor Test Instrumentation is based on the concept of smart sensor technology for testing with intelligence needed to perform sell-diagnosis of health, and to participate in a hierarchy of health determination at sensor, process, and system levels. A virtual sensor test instrumentation consists of five elements: (1) a common sensor interface, (2) microprocessor, (3) wireless interface, (4) signal conditioning and ADC/DAC (analog-to-digital conversion/ digital-to-analog conversion), and (5) onboard EEPROM (electrically erasable programmable read-only memory) for metadata storage and executable software to create powerful, scalable, reconfigurable, and reliable embedded and distributed test instruments. In order to maximize the efficient data conversion through the smart sensor node, plug-and-play functionality is required to interface with traditional sensors to enhance their identity and capabilities for data processing and communications. Virtual sensor test instrumentation can be accessible wirelessly via a Network Capable Application Processor (NCAP) or a Smart Transducer Interlace Module (STIM) that may be managed under real-time rule engines for mission-critical applications. The transducer senses the physical quantity being measured and converts it into an electrical signal. The signal is fed to an A/D converter, and is ready for use by the processor to execute functional transformation based on the sensor characteristics stored in a Transducer Electronic Data Sheet (TEDS). Virtual sensor test instrumentation is built upon an open-system architecture with standardized protocol modules/stacks to interface with industry standards and commonly used software. One major benefit for deploying the virtual sensor test instrumentation is the ability, through a plug-and-play common interface, to convert raw sensor data in either analog or digital form, to an IEEE 1451 standard-based smart sensor, which has instructions to program sensors for a wide variety of

  9. Relativistic quantum metrology: exploiting relativity to improve quantum measurement technologies.

    Science.gov (United States)

    Ahmadi, Mehdi; Bruschi, David Edward; Sabín, Carlos; Adesso, Gerardo; Fuentes, Ivette

    2014-05-22

    We present a framework for relativistic quantum metrology that is useful for both Earth-based and space-based technologies. Quantum metrology has been so far successfully applied to design precision instruments such as clocks and sensors which outperform classical devices by exploiting quantum properties. There are advanced plans to implement these and other quantum technologies in space, for instance Space-QUEST and Space Optical Clock projects intend to implement quantum communications and quantum clocks at regimes where relativity starts to kick in. However, typical setups do not take into account the effects of relativity on quantum properties. To include and exploit these effects, we introduce techniques for the application of metrology to quantum field theory. Quantum field theory properly incorporates quantum theory and relativity, in particular, at regimes where space-based experiments take place. This framework allows for high precision estimation of parameters that appear in quantum field theory including proper times and accelerations. Indeed, the techniques can be applied to develop a novel generation of relativistic quantum technologies for gravimeters, clocks and sensors. As an example, we present a high precision device which in principle improves the state-of-the-art in quantum accelerometers by exploiting relativistic effects.

  10. Prospects of geothermal resource exploitation

    International Nuclear Information System (INIS)

    Bourrelier, P.H.; Cornet, F.; Fouillac, C.

    1994-01-01

    The use of geothermal energy to generate electricity has only occurred during the past 50 years by drilling wells in aquifers close to magmas and producing either dry steam or hot water. The world's production of electricity from geothermal energy is over 6000 MWe and is still growing. The direct use of geothermal energy for major urban communities has been developed recently by exploitation of aquifers in sedimentary basins under large towns. Scaling up the extraction of heat implies the exploitation of larger and better located fields requiring an appropriate method of extraction; the objective of present attempts in USA, Japan and Europe is to create heat exchangers by the circulation of water between several deep wells. Two field categories are considered: the extension of classical geothermal fields beyond the aquifer areas, and areas favoured by both a high geothermal gradient, fractures inducing a natural permeability at large scale, and good commercial prospects (such as in the Rhenan Graben). Hot dry rocks concept has gained a large interest. 1 fig., 5 tabs., 11 refs

  11. A new measure of interpersonal exploitativeness

    Directory of Open Access Journals (Sweden)

    Amy B. Brunell

    2013-05-01

    Full Text Available Measures of exploitativeness evidence problems with validity and reliability. The present set of studies assessed a new measure (the Interpersonal Exploitativeness Scale that defines exploitativeness in terms of reciprocity. In Studies 1 and 2, 33 items were administered to participants. Exploratory and Confirmatory Factor Analysis demonstrated that a single factor consisting of six items adequately assess interpersonal exploitativeness. Study 3 results revealed that the Interpersonal Exploitativeness Scale was positively associated with normal narcissism, pathological narcissism, psychological entitlement, and negative reciprocity and negatively correlated with positive reciprocity. In Study 4, participants competed in a commons dilemma. Those who scored higher on the Interpersonal Exploitativeness Scale were more likely to harvest a greater share of resources over time, even while controlling for other relevant variables, such as entitlement. Together, these studies show the Interpersonal Exploitativeness Scale to be a valid and reliable measure of interpersonal exploitativeness. The authors discuss the implications of these studies.

  12. Exploitation in International Paid Surrogacy Arrangements

    OpenAIRE

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate probl...

  13. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    Science.gov (United States)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  14. The exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Wilkinson, Stephen

    2003-04-01

    This paper discusses the exploitation argument against commercial surrogacy: the claim that commercial surrogacy is morally objectionable because it is exploitative. The following questions are addressed. First, what exactly does the exploitation argument amount to? Second, is commercial surrogacy in fact exploitative? Third, if it were exploitative, would this provide a sufficient reason to prohibit (or otherwise legislatively discourage) it? The focus throughout is on the exploitation of paid surrogates, although it is noted that other parties (e.g. 'commissioning parents') may also be the victims of exploitation. It is argued that there are good reasons for believing that commercial surrogacy is often exploitative. However, even if we accept this, the exploitation argument for prohibiting (or otherwise legislatively discouraging) commercial surrogacy remains quite weak. One reason for this is that prohibition may well 'backfire' and lead to potential surrogates having to do other things that are more exploitative and/or more harmful than paid surrogacy. It is concluded therefore that those who oppose exploitation should (rather than attempting to stop particular practices like commercial surrogacy) concentrate on: (a) improving the conditions under which paid surrogates 'work'; and (b) changing the background conditions (in particular, the unequal distribution of power and wealth) which generate exploitative relationships.

  15. A Comprehensive Study of Data Collection Schemes Using Mobile Sinks in Wireless Sensor Networks

    Science.gov (United States)

    Khan, Abdul Waheed; Abdullah, Abdul Hanan; Anisi, Mohammad Hossein; Bangash, Javed Iqbal

    2014-01-01

    Recently sink mobility has been exploited in numerous schemes to prolong the lifetime of wireless sensor networks (WSNs). Contrary to traditional WSNs where sensory data from sensor field is ultimately sent to a static sink, mobile sink-based approaches alleviate energy-holes issues thereby facilitating balanced energy consumption among nodes. In mobility scenarios, nodes need to keep track of the latest location of mobile sinks for data delivery. However, frequent propagation of sink topological updates undermines the energy conservation goal and therefore should be controlled. Furthermore, controlled propagation of sinks' topological updates affects the performance of routing strategies thereby increasing data delivery latency and reducing packet delivery ratios. This paper presents a taxonomy of various data collection/dissemination schemes that exploit sink mobility. Based on how sink mobility is exploited in the sensor field, we classify existing schemes into three classes, namely path constrained, path unconstrained, and controlled sink mobility-based schemes. We also organize existing schemes based on their primary goals and provide a comparative study to aid readers in selecting the appropriate scheme in accordance with their particular intended applications and network dynamics. Finally, we conclude our discussion with the identification of some unresolved issues in pursuit of data delivery to a mobile sink. PMID:24504107

  16. The Exploitation of Evolving Resources

    CERN Document Server

    McGlade, Jacqueline; Law, Richard

    1993-01-01

    The impact of man on the biosphere is profound. Quite apart from our capacity to destroy natural ecosystems and to drive species to extinction, we mould the evolution of the survivors by the selection pressures we apply to them. This has implications for the continued health of our natural biological resources and for the way in which we seek to optimise yield from those resources. Of these biological resources, fish stocks are particularly important to mankind as a source of protein. On a global basis, fish stocks provide the major source of protein for human consumption from natural ecosystems, amounting to some seventy million tonnes in 1970. Although fisheries management has been extensively developed over the last century, it has not hitherto considered the evolutionary consequences of fishing activity. While this omission may not have been serious in the past, the ever increasing intensity of exploitation and the deteriorating health of fish stocks has generated an urgent need for a better understanding...

  17. Swedish mines. Underground exploitation methods

    International Nuclear Information System (INIS)

    Paucard, A.

    1960-01-01

    Between 1949 and 1957, 10 engineers of the Mining research and exploitation department of the CEA visited 17 Swedish mines during 5 field trips. This paper presents a compilation of the information gathered during these field trips concerning the different underground mining techniques used in Swedish iron mines: mining with backfilling (Central Sweden and Boliden mines); mining without backfilling (mines of the polar circle area). The following techniques are described successively: pillar drawing and backfilled slices (Ammeberg, Falun, Garpenberg, Boliden group), sub-level pillar drawing (Grangesberg, Bloettberget, Haeksberg), empty room and sub-level pillar drawing (Bodas, Haksberg, Stripa, Bastkarn), storage chamber pillar drawing (Bodas, Haeksberg, Bastkarn), and pillar drawing by block caving (ldkerberget). Reprint of a paper published in Revue de l'Industrie Minerale, vol. 41, no. 12, 1959 [fr

  18. Exploiting social evolution in biofilms

    DEFF Research Database (Denmark)

    Boyle, Kerry E; Heilmann, Silja; van Ditmarsch, Dave

    2013-01-01

    Bacteria are highly social organisms that communicate via signaling molecules, move collectively over surfaces and make biofilm communities. Nonetheless, our main line of defense against pathogenic bacteria consists of antibiotics-drugs that target individual-level traits of bacterial cells...... and thus, regrettably, select for resistance against their own action. A possible solution lies in targeting the mechanisms by which bacteria interact with each other within biofilms. The emerging field of microbial social evolution combines molecular microbiology with evolutionary theory to dissect...... the molecular mechanisms and the evolutionary pressures underpinning bacterial sociality. This exciting new research can ultimately lead to new therapies against biofilm infections that exploit evolutionary cheating or the trade-off between biofilm formation and dispersal....

  19. Energy for lunar resource exploitation

    Science.gov (United States)

    Glaser, Peter E.

    1992-02-01

    Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.

  20. Motherhood Surrogacy: Progress or Exploitation?

    OpenAIRE

    Hemion Braho

    2015-01-01

    Motherhood surrogacy is almost considered as a new way to born next to natural born, adoption and IVF treatments. If the other practices are accepted by the social and scientific community, the motherhood surrogacy brings some problems, especially on a social point of view. This happens because of the big sufferance of the women involved in this practice and because of the social distortion of this practice transforming the traditional family structures and bringing social, legal and healthy ...

  1. Leveraging Energy Harvesting and Wake-Up Receivers for Long-Term Wireless Sensor Networks.

    Science.gov (United States)

    Ait Aoudia, Fayçal; Gautier, Matthieu; Magno, Michele; Berder, Olivier; Benini, Luca

    2018-05-15

    Wireless sensor nodes are traditionally powered by individual batteries, and a significant effort has been devoted to maximizing the lifetime of these devices. However, as the batteries can only store a finite amount of energy, the network is still doomed to die, and changing the batteries is not always possible. A promising solution is to enable each node to harvest energy directly in its environment, using individual energy harvesters. Moreover, novel ultra-low power wake-up receivers, which allow continuous listening of the channel with negligible power consumption, are emerging. These devices enable asynchronous communication, further reducing the power consumption related to communication, which is typically one the most energy-consuming tasks in wireless sensor networks. Energy harvesting and wake-up receivers can be combined to significantly increase the energy efficiency of sensor networks. In this paper, we propose an energy manager for energy harvesting wireless sensor nodes and an asynchronous medium access control protocol, which exploits ultra-low power wake-up receivers. The two components are designed to work together and especially to fit the stringent constraints of wireless sensor nodes. The proposed approach has been implemented on a real hardware platform and tested in the field. Experimental results demonstrate the benefits of the proposed approach in terms of energy efficiency, power consumption and throughput, which can be up to more than two-times higher compared to traditional schemes.

  2. Taste sensor; Mikaku sensor

    Energy Technology Data Exchange (ETDEWEB)

    Toko, K. [Kyushu University, Fukuoka (Japan)

    1998-03-05

    This paper introduces a taste sensor having a lipid/polymer membrane to work as a receptor of taste substances. The paper describes the following matters: this sensor uses a hollow polyvinyl chloride rod filled with KCl aqueous solution, and placed with silver and silver chloride wires, whose cross section is affixed with a lipid/polymer membrane as a lipid membrane electrode to identify taste from seven or eight kinds of response patterns of electric potential output from the lipid/polymer membrane; measurements of different substances presenting acidic taste, salty taste, bitter taste, sweet taste and flavor by using this sensor identified clearly each taste (similar response is shown to a similar taste even if the substances are different); different responses are indicated on different brands of beers; from the result of measuring a great variety of mineral waters, a possibility was suggested that this taste sensor could be used for water quality monitoring sensors; and application of this taste sensor may be expected as a maturation control sensor for Japanese sake (wine) and miso (bean paste) manufacturing. 2 figs., 1 tab.

  3. Exploiting Symmetry on Parallel Architectures.

    Science.gov (United States)

    Stiller, Lewis Benjamin

    1995-01-01

    This thesis describes techniques for the design of parallel programs that solve well-structured problems with inherent symmetry. Part I demonstrates the reduction of such problems to generalized matrix multiplication by a group-equivariant matrix. Fast techniques for this multiplication are described, including factorization, orbit decomposition, and Fourier transforms over finite groups. Our algorithms entail interaction between two symmetry groups: one arising at the software level from the problem's symmetry and the other arising at the hardware level from the processors' communication network. Part II illustrates the applicability of our symmetry -exploitation techniques by presenting a series of case studies of the design and implementation of parallel programs. First, a parallel program that solves chess endgames by factorization of an associated dihedral group-equivariant matrix is described. This code runs faster than previous serial programs, and discovered it a number of results. Second, parallel algorithms for Fourier transforms for finite groups are developed, and preliminary parallel implementations for group transforms of dihedral and of symmetric groups are described. Applications in learning, vision, pattern recognition, and statistics are proposed. Third, parallel implementations solving several computational science problems are described, including the direct n-body problem, convolutions arising from molecular biology, and some communication primitives such as broadcast and reduce. Some of our implementations ran orders of magnitude faster than previous techniques, and were used in the investigation of various physical phenomena.

  4. Electric current sensors: a review

    International Nuclear Information System (INIS)

    Ripka, Pavel

    2010-01-01

    The review makes a brief overview of traditional methods of measurement of electric current and shows in more detail relatively new types of current sensors. These include Hall sensors with field concentrators, AMR current sensors, magneto-optical and superconducting current sensors. The influence of the magnetic core properties on the error of the current transformer shows why nanocrystalline materials are so advantageous for this application. Built-in CMOS current sensors are important tools for monitoring the health of integrated circuits. Of special industrial value are current clamps which can be installed without breaking the measured conductor. Parameters of current sensors are also discussed, including geometrical selectivity. This parameter specific for current sensors means the ability to suppress the influence of currents external to the sensor (including the position of the return conductor) and also suppress the influence on the position of the measured conductor with respect to the current. (topical review)

  5. Two questions about surrogacy and exploitation.

    Science.gov (United States)

    Wertheimer, Alan

    1992-01-01

    In this article I will consider two related questions about surrogacy and exploitation: (1) Is surrogacy exploitative? (2) If surrogacy is exploitative, what is the moral force of this exploitation? Briefly stated, I shall argue that whether surrogacy is exploitative depends on whether exploitation must be harmful to the exploited party or whether (as I think) there can be mutually advantageous exploitation. It also depends on some facts about surrogacy about which we have little reliable evidence and on our philosophical view on what counts as a harm to the surrogate. Our answer to the second question will turn in part on the account of exploitation we invoke in answering the first question and in part on the way in which we resolve some other questions about the justification of state interference. I shall suggest, however, that if surrogacy is a form of voluntary and mutually advantageous exploitation, then there is a strong presumption that surrogacy contracts should be permitted and even enforceable, although that presumption may be overridden on other grounds.

  6. Technical Report: Sleep-Route - Routing through Sleeping Sensors

    OpenAIRE

    Sarkar, Chayan; Rao, Vijay S.; Prasad, R. Venkatesha

    2014-01-01

    In this article, we propose an energy-efficient data gathering scheme for wireless sensor network called Sleep-Route, which splits the sensor nodes into two sets - active and dormant (low-power sleep). Only the active set of sensor nodes participate in data collection. The sensing values of the dormant sensor nodes are predicted with the help of an active sensor node. Virtual Sensing Framework (VSF) provides the mechanism to predict the sensing values by exploiting the data correlation among ...

  7. Strain Wave Acquisition by a Fiber Optic Coherent Sensor for Impact Monitoring.

    Science.gov (United States)

    Sbarufatti, Claudio; Beligni, Alessio; Gilioli, Andrea; Ferrario, Maddalena; Mattarei, Marco; Martinelli, Mario; Giglio, Marco

    2017-07-13

    A novel fiber optic sensing technology for high frequency dynamics detection is proposed in this paper, specifically tailored for structural health monitoring applications based on strain wave analysis, for both passive impact identification and active Lamb wave monitoring. The sensing solution relies on a fiber optic-based interferometric architecture associated to an innovative coherent detection scheme, which retrieves in a completely passive way the high-frequency phase information of the received optical signal. The sensing fiber can be arranged into different layouts, depending on the requirement of the specific application, in order to enhance the sensor sensitivity while still ensuring a limited gauge length if punctual measures are required. For active Lamb wave monitoring, this results in a sensing fiber arranged in multiple loops glued on an aluminum thin panel in order to increase the phase signal only in correspondence to the sensing points of interest. Instead, for passive impact identification, the required sensitivity is guaranteed by simply exploiting a longer gauge length glued to the structure. The fiber optic coherent (FOC) sensor is exploited to detect the strain waves emitted by a piezoelectric transducer placed on the aluminum panel or generated by an impulse hammer, respectively. The FOC sensor measurements have been compared with both a numerical model based on Finite Elements and traditional piezoelectric sensors, confirming a good agreement between experimental and simulated results for both active and passive impact monitoring scenarios.

  8. Antioxidant phytochemicals in fresh produce: exploitation of genotype variation and advancements in analytical protocols

    Science.gov (United States)

    Manganaris, George A.; Goulas, Vlasios; Mellidou, Ifigeneia; Drogoudi, Pavlina

    2017-12-01

    Horticultural commodities (fruit and vegetables) are the major dietary source of several bioactive compounds of high nutraceutical value for humans, including polyphenols, carotenoids and vitamins. The aim of the current review was dual. Firstly, towards the eventual enhancement of horticultural crops with bio-functional compounds, the natural genetic variation in antioxidants found in different species and cultivar/genotypes is underlined. Notably, some landraces and/or traditional cultivars have been characterized by substantially higher phytochemical content, i.e. small tomato of Santorini island (cv. ‘Tomataki Santorinis’) possesses appreciably high amounts of ascorbic acid. The systematic screening of key bioactive compounds in a wide range of germplasm for the identification of promising genotypes and the restoration of key gene fractions from wild species and landraces may help in reducing the loss of agro-biodiversity, creating a healthier ‘gene pool’ as the basis of future adaptation. Towards this direction, large scale comparative studies in different cultivars/genotypes of a given species provide useful insights about the ones of higher nutritional value. Secondly, the advancements in the employment of analytical techniques to determine the antioxidant potential through a convenient, easy and fast way are outlined. Such analytical techniques include electron paramagnetic resonance (EPR) and infrared (IR) spectroscopy, electrochemical and chemometric methods, flow injection analysis (FIA), optical sensors and high resolution screening (HRS). Taking into consideration that fruits and vegetables are complex mixtures of water- and lipid-soluble antioxidants, the exploitation of chemometrics to develop “omics” platforms (i.e. metabolomics, foodomics) is a promising tool for researchers to decode and/or predict antioxidant activity of fresh produce. For industry, the use of cheap and rapid optical sensors and IR spectroscopy is recommended to

  9. Antioxidant Phytochemicals in Fresh Produce: Exploitation of Genotype Variation and Advancements in Analytical Protocols

    Directory of Open Access Journals (Sweden)

    George A. Manganaris

    2018-02-01

    Full Text Available Horticultural commodities (fruit and vegetables are the major dietary source of several bioactive compounds of high nutraceutical value for humans, including polyphenols, carotenoids and vitamins. The aim of the current review was dual. Firstly, toward the eventual enhancement of horticultural crops with bio-functional compounds, the natural genetic variation in antioxidants found in different species and cultivars/genotypes is underlined. Notably, some landraces and/or traditional cultivars have been characterized by substantially higher phytochemical content, i.e., small tomato of Santorini island (cv. “Tomataki Santorinis” possesses appreciably high amounts of ascorbic acid (AsA. The systematic screening of key bioactive compounds in a wide range of germplasm for the identification of promising genotypes and the restoration of key gene fractions from wild species and landraces may help in reducing the loss of agro-biodiversity, creating a healthier “gene pool” as the basis of future adaptation. Toward this direction, large scale comparative studies in different cultivars/genotypes of a given species provide useful insights about the ones of higher nutritional value. Secondly, the advancements in the employment of analytical techniques to determine the antioxidant potential through a convenient, easy and fast way are outlined. Such analytical techniques include electron paramagnetic resonance (EPR and infrared (IR spectroscopy, electrochemical, and chemometric methods, flow injection analysis (FIA, optical sensors, and high resolution screening (HRS. Taking into consideration that fruits and vegetables are complex mixtures of water- and lipid-soluble antioxidants, the exploitation of chemometrics to develop “omics” platforms (i.e., metabolomics, foodomics is a promising tool for researchers to decode and/or predict antioxidant activity of fresh produce. For industry, the use of optical sensors and IR spectroscopy is recommended to

  10. Radiation environmental impact assessment of copper exploitation

    International Nuclear Information System (INIS)

    Fan Guang; Wen Zhijian

    2010-01-01

    The radiation environmental impact of mineral exploitation on the surrounding environment has become a public concern. This paper presents the radiation environmental impact assessment of copper exploitation. Based on the project description and detailed investigations of surrounding environment, systematic radiation environmental impacts have been identified. The environmental impacts are assessed during both construction and operation phase. The environmental protection measures have also been proposed. The related conclusion and measures can play an active role in copper exploitation and environmental protection. (authors)

  11. Exploitation and exploration dynamics in recessionary times

    OpenAIRE

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting existing resources. As such, firms possessing the ability to simultaneously perform exploitative and explorative initiatives are more resilient. In this respect, the performance implications of balancing ...

  12. Sensor Alerting Capability

    Science.gov (United States)

    Henriksson, Jakob; Bermudez, Luis; Satapathy, Goutam

    2013-04-01

    There is a large amount of sensor data generated today by various sensors, from in-situ buoys to mobile underwater gliders. Providing sensor data to the users through standardized services, language and data model is the promise of OGC's Sensor Web Enablement (SWE) initiative. As the amount of data grows it is becoming difficult for data providers, planners and managers to ensure reliability of data and services and to monitor critical data changes. Intelligent Automation Inc. (IAI) is developing a net-centric alerting capability to address these issues. The capability is built on Sensor Observation Services (SOSs), which is used to collect and monitor sensor data. The alerts can be configured at the service level and at the sensor data level. For example it can alert for irregular data delivery events or a geo-temporal statistic of sensor data crossing a preset threshold. The capability provides multiple delivery mechanisms and protocols, including traditional techniques such as email and RSS. With this capability decision makers can monitor their assets and data streams, correct failures or be alerted about a coming phenomena.

  13. The economics of exploiting gas hydrates

    International Nuclear Information System (INIS)

    Döpke, Lena-Katharina; Requate, Till

    2014-01-01

    We investigate the optimal exploitation of methane hydrates, a recent discovery of methane resources under the sea floor, mainly located along the continental margins. Combustion of methane (releasing CO2) and leakage through blow-outs (releasing CH4) contribute to the accumulation of greenhouse gases. A second externality arises since removing solid gas hydrates from the sea bottom destabilizes continental margins and thus increases the risk of marine earthquakes. We show that in such a model three regimes can occur: i) resource exploitation will be stopped in finite time, and some of the resource will stay in situ, ii) the resource will be used up completely in finite time, and iii) the resource will be exhausted in infinite time. We also show how to internalize the externalities by policy instruments. - Highlights: • We set up a model of optimal has hydrate exploitation • We incorporate to types of damages: contribution to global warming and geo-hazards • We characterize optimal exploitation paths and study decentralization with an exploitation tax. • Three regimes can occur: • i) exploitation in finite time and some of the stock remaining in situ, • ii) exploitation in finite time and the resource will be exhausted, • iii) exploitation and exhaustion in infinite time

  14. Exploitation and exploration dynamics in recessionary times

    NARCIS (Netherlands)

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting

  15. Packaging of Sin Goods - Commitment or Exploitation?

    DEFF Research Database (Denmark)

    Nafziger, Julia

    to such self-control problems, and possibly exploit them, by offering different package sizes. In a competitive market, either one or three (small, medium and large) packages are offered. In contrast to common intuition, the large, and not the small package is a commitment device. The latter serves to exploit...

  16. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    sexual exploitation of children by peacekeepers is particularly insidious. ... sexual exploitation and abuse should involve an understanding of the social .... The charges of sexual misconduct, and the consequent media exposure, have ..... awareness programmes such as video tapes, lectures and training manuals, designed.

  17. Exploration, Exploitation, and Organizational Coordination Mechanisms

    Directory of Open Access Journals (Sweden)

    Silvio Popadiuk

    2016-03-01

    Full Text Available This paper presents an empirical relationship among exploration, exploitation, and organizational coordination mechanisms, classified as the centralization of decision-making, formalization, and connectedness. In order to analyze the findings of this survey, we used two techniques: Principal Component Analysis (PCA and Partial Least Squares Path Modeling (PLS-PM. Our analysis was supported by 249 answers from managers of companies located in Brazil (convenience sampling. Contrary to expectations, centralization and exploitation were negatively associated. Our data supports the research hypothesis that formalization is positively associated with exploitation. Although the relationship between formalization and exploration were significant, the result is contrary to the research hypothesis that we made. The relationships among connectedness and exploitation, and connectedness and exploration were both positive and significant. This relationship means that the more connectedness increases, the higher the likelihood of exploitation and exploration.

  18. Novel PET sensors

    International Nuclear Information System (INIS)

    Cooper, C.R.

    2001-03-01

    This thesis describes the design, synthesis and evaluation of novel molecular sensors that utilize the phenomena of Photoinduced Electron Transfer (PET). PET design can be incorporated into molecules to allow them to selectively bind certain guest molecules. PET works by the modulation of electron potentials within a molecule. Binding events between a host and guest can, if designed suitably, change these potentials enough to cause a transfer of electronic charge within the molecular sensor. This event can be accurately and sensitively monitored by the use of ultra violet or fluorescence spectroscopy. A sensor molecule can be constructed by matching the guest to a suitable receptor site and incorporating this into a molecule containing a fluorophore with the correct electron potential characteristics. By using existing synthetic routes as well as exploiting new pathways these sensor molecules C n be constructed to contain a fluorophore separated from a guest receptor(s) by suitable spacers units. When put together these facets go to creating molecules that by design are sensitive and selective for certain guest molecules or functional groups. This methodology allows the synthetic chemist to rationally design and synthesise PET sensors, tailored to the needs of the guest. In this thesis the synthesis and evaluation of a novel PET sensors for D-glucosamine, disaccharides and fluoride is presented. It is believed that the novel sensors using the PET phenomenon presented in this thesis are a worthwhile extension of previous works undertaken by other groups around the world and shows new pathways to increasingly complex and sophisticated sensor molecular design. (author)

  19. Ambient Sensors

    NARCIS (Netherlands)

    Börner, Dirk; Specht, Marcus

    2014-01-01

    This software sketches comprise two custom-built ambient sensors, i.e. a noise and a movement sensor. Both sensors measure an ambient value and process the values to a color gradient (green > yellow > red). The sensors were built using the Processing 1.5.1 development environment. Available under

  20. Herbivory eliminates fitness costs of mutualism exploiters.

    Science.gov (United States)

    Simonsen, Anna K; Stinchcombe, John R

    2014-04-01

    A common empirical observation in mutualistic interactions is the persistence of variation in partner quality and, in particular, the persistence of exploitative phenotypes. For mutualisms between hosts and symbionts, most mutualism theory assumes that exploiters always impose fitness costs on their host. We exposed legume hosts to mutualistic (nitrogen-fixing) and exploitative (non-nitrogen-fixing) symbiotic rhizobia in field conditions, and manipulated the presence or absence of insect herbivory to determine if the costly fitness effects of exploitative rhizobia are context-dependent. Exploitative rhizobia predictably reduced host fitness when herbivores were excluded. However, insects caused greater damage on hosts associating with mutualistic rhizobia, as a consequence of feeding preferences related to leaf nitrogen content, resulting in the elimination of fitness costs imposed on hosts by exploitative rhizobia. Our experiment shows that herbivory is potentially an important factor in influencing the evolutionary dynamic between legumes and rhizobia. Partner choice and host sanctioning are theoretically predicted to stabilize mutualisms by reducing the frequency of exploitative symbionts. We argue that herbivore pressure may actually weaken selection on choice and sanction mechanisms, thus providing one explanation of why host-based discrimination mechanisms may not be completely effective in eliminating nonbeneficial partners. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  1. Understanding traditional African healing

    OpenAIRE

    MOKGOBI, M.G.

    2014-01-01

    Traditional African healing has been in existence for many centuries yet many people still seem not to understand how it relates to God and religion/spirituality. Some people seem to believe that traditional healers worship the ancestors and not God. It is therefore the aim of this paper to clarify this relationship by discussing a chain of communication between the worshipers and the Almighty God. Other aspects of traditional healing namely types of traditional healers, training of tradition...

  2. Semantics empowered web 3.0 managing enterprise, social, sensor, and cloud-based data and services for advanced applications

    CERN Document Server

    Sheth, Amit

    2012-01-01

    After the traditional document-centric Web 1.0 and user-generated content focused Web 2.0, Web 3.0 has become a repository of an ever growing variety of Web resources that include data and services associated with enterprises, social networks, sensors, cloud, as well as mobile and other devices that constitute the Internet of Things. These pose unprecedented challenges in terms of heterogeneity (variety), scale (volume), and continuous changes (velocity), as well as present corresponding opportunities if they can be exploited. Just as semantics has played a critical role in dealing with data h

  3. Peat exploitation - Environment. Effects and measures

    International Nuclear Information System (INIS)

    Stenbeck, G.

    1996-01-01

    This report gives a detailed description of the influence of peat exploitation on the land-, water- and atmospheric environments. Proposals for mitigatory measures to minimize damage to the environment are also given

  4. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    from sexual exploitation and sexual abuse (ST/SGB/2003/13) (UN, Secretary .... In addition, in most situations, UN personnel have enjoyed immunity from local .... 9 Official UN statistics show a higher incidence of allegations reported against.

  5. Exploitation of linkage learning in evolutionary algorithms

    CERN Document Server

    Chen, Ying-ping

    2010-01-01

    The exploitation of linkage learning is enhancing the performance of evolutionary algorithms. This monograph examines recent progress in linkage learning, with a series of focused technical chapters that cover developments and trends in the field.

  6. Exploitative and Deceptive Resource Acquisition Strategies

    Directory of Open Access Journals (Sweden)

    Joshua J. Reynolds

    2015-07-01

    Full Text Available Life history strategy (LHS and life history contingencies (LHCs should theoretically influence the use of exploitative and deceptive resource acquisition strategies. However, little research has been done in this area. The purpose of the present work was to create measures of exploitative strategies and test the predictions of life history theory. Pilot studies developed and validated a behavioral measure of cheating called the Dot Game. The role of individual LHS and LHCs (manipulated via validated story primes on cheating was investigated in Study 1. Studies 2a through 2c were conducted to develop and validate a self-report measure called the Exploitative and Deceptive Resource Acquisition Strategy Scale (EDRASS. Finally, Study 3 investigated life history and EDRASS. Results indicated that while LHS influences exploitative strategies, life history contingences had little effect. Implications of these findings are discussed.

  7. Organ sales: exploitative at any price?

    Science.gov (United States)

    Lawlor, Rob

    2014-05-01

    In many cases, claims that a transaction is exploitative will focus on the details of the transaction, such as the price paid or conditions. For example, in a claim that a worker is exploited, the grounds for the claim are usually that the pay is not sufficient or the working conditions too dangerous. In some cases, however, the claim that a transaction is exploitative is not seen to rely on these finer details. Many, for example, claim that organ sales would be exploitative, in a way that doesn't seem to depend on the details. This article considers, but ultimately rejects, a number of arguments which could be used to defend this sort of claim. © 2012 John Wiley & Sons Ltd.

  8. Thinking Outside of the Blue Marble: Novel Ocean Applications Using the VIIRS Sensor

    Science.gov (United States)

    Vandermeulen, Ryan A.; Arnone, Robert

    2016-01-01

    While planning for future space-borne sensors will increase the quality, quantity, and duration of ocean observations in the years to come, efforts to extend the limits of sensors currently in orbit can help shed light on future scientific gains as well as associated uncertainties. Here, we present several applications that are unique to the polar orbiting Visual Infrared Imaging Radiometer Suite (VIIRS), each of which challenge the threshold capabilities of the sensor and provide lessons for future missions. For instance, while moderate resolution polar orbiters typically have a one day revisit time, we are able to obtain multiple looks of the same area by focusing on the extreme zenith angles where orbital views overlap, and pair these observations with those from other sensors to create pseudo-geostationary data sets. Or, by exploiting high spatial resolution (imaging) channels and analyzing patterns of synoptic covariance across the visible spectrum, we can obtain higher spatial resolution bio-optical products. Alternatively, non-traditional products can illuminate important biological interactions in the ocean, such as the use of the Day-Night-Band to provide some quantification of phototactic behavior of marine life along light polluted beaches, as well as track the location of marine fishing vessel fleets along ocean fronts. In this talk, we explore ways to take full advantage of the capabilities of existing sensors in order to maximize insights for future missions.

  9. A Theory of Exploitative Child Labor

    OpenAIRE

    Carol Ann Rogers; Kenneth A. Swinnerton

    2003-01-01

    Child labor laws should aim to protect children who work, instead of trying to remove children from work. In this paper, we identify an instance when the risk of exploitation lowers the expected bene…t of child labor to the child,and therefore suppresses child labor force participation. Targeted legal intervention that lowers or removes the risk of exploitation raises child participation in the labor market, child welfare, and overall societal welfare. Targeting on child labor more broadly ma...

  10. Understanding traditional African healing.

    Science.gov (United States)

    Mokgobi, M G

    2014-09-01

    Traditional African healing has been in existence for many centuries yet many people still seem not to understand how it relates to God and religion/spirituality. Some people seem to believe that traditional healers worship the ancestors and not God. It is therefore the aim of this paper to clarify this relationship by discussing a chain of communication between the worshipers and the Almighty God. Other aspects of traditional healing namely types of traditional healers, training of traditional healers as well as the role of traditional healers in their communities are discussed. In conclusion, the services of traditional healers go far beyond the uses of herbs for physical illnesses. Traditional healers serve many roles which include but not limited to custodians of the traditional African religion and customs, educators about culture, counselors, social workers and psychologists.

  11. Wireless multimedia sensor networks on reconfigurable hardware information reduction techniques

    CERN Document Server

    Ang, Li-minn; Chew, Li Wern; Yeong, Lee Seng; Chia, Wai Chong

    2013-01-01

    Traditional wireless sensor networks (WSNs) capture scalar data such as temperature, vibration, pressure, or humidity. Motivated by the success of WSNs and also with the emergence of new technology in the form of low-cost image sensors, researchers have proposed combining image and audio sensors with WSNs to form wireless multimedia sensor networks (WMSNs).

  12. Sol-Gel Thin Films for Plasmonic Gas Sensors

    Science.gov (United States)

    Della Gaspera, Enrico; Martucci, Alessandro

    2015-01-01

    Plasmonic gas sensors are optical sensors that use localized surface plasmons or extended surface plasmons as transducing platform. Surface plasmons are very sensitive to dielectric variations of the environment or to electron exchange, and these effects have been exploited for the realization of sensitive gas sensors. In this paper, we review our research work of the last few years on the synthesis and the gas sensing properties of sol-gel based nanomaterials for plasmonic sensors. PMID:26184216

  13. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  14. Sensors on speaking terms: Schedule-based medium access control protocols for wireless sensor networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.

    2007-01-01

    Wireless sensor networks make the previously unobservable, observable. The basic idea behind these networks is straightforward: all wires are cut in traditional sensing systems and the sensors are equipped with batteries and radio's to virtually restore the cut wires. The resulting sensors can be

  15. Automated motion imagery exploitation for surveillance and reconnaissance

    Science.gov (United States)

    Se, Stephen; Laliberte, France; Kotamraju, Vinay; Dutkiewicz, Melanie

    2012-06-01

    Airborne surveillance and reconnaissance are essential for many military missions. Such capabilities are critical for troop protection, situational awareness, mission planning and others, such as post-operation analysis / damage assessment. Motion imagery gathered from both manned and unmanned platforms provides surveillance and reconnaissance information that can be used for pre- and post-operation analysis, but these sensors can gather large amounts of video data. It is extremely labour-intensive for operators to analyse hours of collected data without the aid of automated tools. At MDA Systems Ltd. (MDA), we have previously developed a suite of automated video exploitation tools that can process airborne video, including mosaicking, change detection and 3D reconstruction, within a GIS framework. The mosaicking tool produces a geo-referenced 2D map from the sequence of video frames. The change detection tool identifies differences between two repeat-pass videos taken of the same terrain. The 3D reconstruction tool creates calibrated geo-referenced photo-realistic 3D models. The key objectives of the on-going project are to improve the robustness, accuracy and speed of these tools, and make them more user-friendly to operational users. Robustness and accuracy are essential to provide actionable intelligence, surveillance and reconnaissance information. Speed is important to reduce operator time on data analysis. We are porting some processor-intensive algorithms to run on a Graphics Processing Unit (GPU) in order to improve throughput. Many aspects of video processing are highly parallel and well-suited for optimization on GPUs, which are now commonly available on computers. Moreover, we are extending the tools to handle video data from various airborne platforms and developing the interface to the Coalition Shared Database (CSD). The CSD server enables the dissemination and storage of data from different sensors among NATO countries. The CSD interface allows

  16. Exploitation of Labour and Exploitation of Commodities: a “New Interpretation”

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2011-01-01

    In the standard Okishio-Morishima approach, the existence of profits is proved to be equivalent to the exploitation of labour. Yet, it can also be proved that the existence of profits is equivalent to the ‘exploitation’ of any good. Labour and commodity exploitation are just different numerical representations of the productiveness of the economy. This paper presents an alternative approach to exploitation theory which is related to the New Interpretation (Duménil 1980; Foley 1982). In this a...

  17. Silent Localization of Underwater Sensors Using Magnetometers

    Directory of Open Access Journals (Sweden)

    Jonas Callmer

    2010-01-01

    Full Text Available Sensor localization is a central problem for sensor networks. If the sensor positions are uncertain, the target tracking ability of the sensor network is reduced. Sensor localization in underwater environments is traditionally addressed using acoustic range measurements involving known anchor or surface nodes. We explore the usage of triaxial magnetometers and a friendly vessel with known magnetic dipole to silently localize the sensors. The ferromagnetic field created by the dipole is measured by the magnetometers and is used to localize the sensors. The trajectory of the vessel and the sensor positions are estimated simultaneously using an Extended Kalman Filter (EKF. Simulations show that the sensors can be accurately positioned using magnetometers.

  18. Motion sensor technologies in education

    Directory of Open Access Journals (Sweden)

    T. Bratitsis

    2014-05-01

    Full Text Available This paper attempts to raise a discussion regarding motion sensor technologies, mainly seen as peripherals of contemporary video game consoles, by examining their exploitation within educational context. An overview of the existing literature is presented, while attempting to categorize the educational approaches which involve motion sensor technologies, in two parts. The first one concerns the education of people with special needs. The utilization of motion sensor technologies, incorporated by game consoles, in the education of such people is examined. The second one refers to various educational approaches in regular education, under which not so many research approaches, but many teaching ideas can be found. The aim of the paper is to serve as a reference point for every individual/group, willing to explore the Sensor-Based Games Based Learning (SBGBL research area, by providing a complete and structured literature review.

  19. Exploitation in International Paid Surrogacy Arrangements

    Science.gov (United States)

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly‐paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty. PMID:27471338

  20. Exploitation in International Paid Surrogacy Arrangements.

    Science.gov (United States)

    Wilkinson, Stephen

    2016-05-01

    Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly-paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty.

  1. Attention Sensor

    NARCIS (Netherlands)

    Börner, Dirk; Kalz, Marco; Specht, Marcus

    2014-01-01

    This software sketch was used in the context of an experiment for the PhD project “Ambient Learning Displays”. The sketch comprises a custom-built attention sensor. The sensor measured (during the experiment) whether a participant looked at and thus attended a public display. The sensor was built

  2. Energy harvesting from human motion: exploiting swing and shock excitations

    International Nuclear Information System (INIS)

    Ylli, K; Hoffmann, D; Willmann, A; Becker, P; Folkmer, B; Manoli, Y

    2015-01-01

    Modern compact and low power sensors and systems are leading towards increasingly integrated wearable systems. One key bottleneck of this technology is the power supply. The use of energy harvesting techniques offers a way of supplying sensor systems without the need for batteries and maintenance. In this work we present the development and characterization of two inductive energy harvesters which exploit different characteristics of the human gait. A multi-coil topology harvester is presented which uses the swing motion of the foot. The second device is a shock-type harvester which is excited into resonance upon heel strike. Both devices were modeled and designed with the key constraint of device height in mind, in order to facilitate the integration into the shoe sole. The devices were characterized under different motion speeds and with two test subjects on a treadmill. An average power output of up to 0.84 mW is achieved with the swing harvester. With a total device volume including the housing of 21 cm 3 a power density of 40 μW cm −3 results. The shock harvester generates an average power output of up to 4.13 mW. The power density amounts to 86 μW cm −3 for the total device volume of 48 cm 3 . Difficulties and potential improvements are discussed briefly. (paper)

  3. Oil exploitation and the environmental Kuznets curve

    International Nuclear Information System (INIS)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar

    2009-01-01

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  4. Oil exploitation and the environmental Kuznets curve

    Energy Technology Data Exchange (ETDEWEB)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar [Department of Agricultural Economics, College of Agriculture, Shiraz University, Shiraz, Fars (Iran)

    2009-01-15

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  5. Rethinking exploitation: a process-centered account.

    Science.gov (United States)

    Jansen, Lynn A; Wall, Steven

    2013-12-01

    Exploitation has become an important topic in recent discussions of biomedical and research ethics. This is due in no small measure to the influence of Alan Wertheimer's path-breaking work on the subject. This paper presents some objections to Wertheimer's account of the concept. The objections attempt to show that his account places too much emphasis on outcome-based considerations and too little on process-based considerations. Building on these objections, the paper develops an alternative process-centered account of the concept. This alternative account of exploitation takes as its point of departure the broadly Kantian notion that it is wrong to use another as an instrument for the advancement of one's own ends. It sharpens this slippery notion and adds a number of refinements to it. The paper concludes by arguing that process-centered accounts of exploitation better illuminate the ethical challenges posed by research on human subjects than outcome-centered accounts.

  6. Shale gas exploitation: Status, problems and prospect

    Directory of Open Access Journals (Sweden)

    Shiqian Wang

    2018-02-01

    Full Text Available Over the past five years, great progress has been made in shale gas exploitation, which has become the most driving force for global gas output growth. Hydrocarbon extraction from shale helps drive the USA on the road to energy independence. Besides, shale oil & gas production has been kept in a sustained growth by continuous improvement in drilling efficiency and well productivity in the case of tumbling oil prices and rig counts. Shale gas reserves and production have been in a rapid growth in China owing to the Lower Paleozoic Wufeng and Longmaxi shale gas exploitation in the Sichuan Basin, which has become an important sector for the future increment of gas reserves and output in China. However, substantial progress has been made neither in non-marine shale gas exploitation as previously expected nor in the broad complicated tectonic areas in South China for which a considerable investment was made. Analysis of the basic situation and issues in domestic shale gas development shows that shale gas exploitation prospects are constrained by many problems in terms of resources endowment, horizontal well fracturing technology, etc. especially in non-marine shale deposits and complicated tectonic areas in South China where hot shales are widely distributed but geological structures are found severely deformed and over matured. Discussion on the prospects shows that the sustained and steady growth in shale gas reserves and production capacity in the coming years lies in the discovery and supersession of new shale plays in addition to Wufeng and Longmaxi shale plays, and that a technological breakthrough in ultra-high-pressure and ultra-deep (over 3500 m buried in the Sichuan Basin marine shale gas exploitation is the key and hope. Keywords: Shale gas, Exploitation, Marine facies, Hot shale, Resource endowment, Sichuan Basin, South China, Complicated tectonic area, Gas play

  7. The evolution and exploitation of the fiber-optic hydrophone

    Science.gov (United States)

    Hill, David J.

    2007-07-01

    In the late 1970s one of the first applications identified for fibre-optic sensing was the fibre-optic hydrophone. It was recognised that the technology had the potential to provide a cost effective solution for large-scale arrays of highly sensitive hydrophones which could be interrogated over large distances. Consequently both the United Kingdom and United States navies funded the development of this sonar technology to the point that it is now deployed on submarines and as seabed arrays. The basic design of a fibre-optic hydrophone has changed little; comprising a coil of optical fibre wound on a compliant mandrel, interrogated using interferometric techniques. Although other approaches are being investigated, including the development of fibre-laser hydrophones, the interferometric approach remains the most efficient way to create highly multiplexed arrays of acoustic sensors. So much so, that the underlying technology is now being exploited in civil applications. Recently the exploration and production sector of the oil and gas industry has begun funding the development of fibre-optic seismic sensing using seabed mounted, very large-scale arrays of four component (three accelerometers and a hydrophone) packages based upon the original technology developed for sonar systems. This has given new impetus to the development of the sensors and the associated interrogation systems which has led to the technology being adopted for other commercial uses. These include the development of networked in-road fibre-optic Weigh-in-Motion sensors and of intruder detection systems which are able to acoustically monitor long lengths of border, on both land and at sea. After two decades, the fibre-optic hydrophone and associated technology has matured and evolved into a number of highly capable sensing solutions used by a range of industries.

  8. How Less Alienation Creates More Exploitation? Audience Labour on Social Network Sites.

    Directory of Open Access Journals (Sweden)

    Eran Fisher

    2012-05-01

    Full Text Available Abstract: The notion of audience labour has been an important contribution to Marxist political economy of the media. It revised the traditional political economy analysis, which focused on media ownership, by suggesting that media was also a site of production, constituting particular relations of production. Such analysis highlighted the active role of audience in the creation of media value as both commodities and workers, thus pointing to audience exploitation. Recently, in light of paradigmatic transformations in the media environment – particularly the emergence of Web 2.0 and social network sites – there has been a renewed interest in such analysis, and a reexamination of audience exploitation. Focusing on Facebook as a case-study, this article examines audience labour on social network sites along two Marxist themes – exploitation and alienation. It argues for a historical shift in the link between exploitation and alienation of audience labour, concurrent with the shift from mass media to social media. In the mass media, the capacity for exploitation of audience labour was quite limited while the alienation that such work created was high. In contrast, social media allows for the expansion and intensification of exploitation. Simultaneously, audience labour on social media – because it involves communication and sociability – also ameliorates alienation by allowing self-expression, authenticity, and relations with others. Moreover, the article argues that the political economy of social network sites is founded on a dialectical link between exploitation and alienation: in order to be de-alienated, Facebook users must communicate and socialize, thus exacerbating their exploitation. And vice-versa, in order for Facebook to exploit the work of its users, it must contribute to their de-alienation.

  9. Balancing Information Analysis and Decision Value: A Model to Exploit the Decision Process

    Science.gov (United States)

    2011-12-01

    technical intelli- gence e.g. signals and sensors (SIGINT and MASINT), imagery (!MINT), as well and human and open source intelligence (HUMINT and OSINT ...Clark 2006). The ability to capture large amounts of da- ta and the plenitude of modem intelligence information sources provides a rich cache of...many tech- niques for managing information collected and derived from these sources , the exploitation of intelligence assets for decision-making

  10. Human Infrastructure Detection and Exploitation (HIDE)

    Science.gov (United States)

    2009-11-01

    7  Figure 4. Picture of the fluxgate magnetometer and the coil-type magnetic sensor...may also be used to detect the usage of computer monitors. We used two different B-field sensors (figure 4), namely, (1) a fluxgate magnetometer ...collected at 256 samples per second. The three-axis fluxgate magnetometer used was an Applied Physics Systems Model 1540. It has the sensitivity

  11. EDITORIAL: Humidity sensors Humidity sensors

    Science.gov (United States)

    Regtien, Paul P. L.

    2012-01-01

    produced at relatively low cost. Therefore, they find wide use in lots of applications. However, the method requires a material that possesses some conflicting properties: stable and reproducible relations between air humidity, moisture uptake and a specific property (for instance the length of a hair, the electrical impedance of the material), fast absorption and desorption of the water vapour (to obtain a short response time), small hysteresis, wide range of relative humidity (RH) and temperature-independent output (only responsive to RH). For these reasons, much research is done and is still going on to find suitable materials that combine high performance and low price. In this special feature, three of the four papers report on absorption sensors, all with different focus. Aziz et al describe experiments with newly developed materials. The surface structure is extensively studied, in view of its ability to rapidly absorb water vapour and exhibit a reproducible change in the resistance and capacitance of the device. Sanchez et al employ optical fibres coated with a thin moisture-absorbing layer as a sensitive humidity sensor. They have studied various coating materials and investigated the possibility of using changes in optical properties of the fibre (here the lossy mode resonance) due to a change in humidity of the surrounding air. The third paper, by Weremczuk et al, focuses on a cheap fabrication method for absorption-based humidity sensors. The inkjet technology appears to be suitable for mass fabrication of such sensors, which is demonstrated by extensive measurements of the electrical properties (resistance and capacitance) of the absorbing layers. Moreover, they have developed a model that describes the relation between humidity and the electrical parameters of the moisture-sensitive layer. Despite intensive research, absorption sensors still do not meet the requirements for high accuracy applications. The dew-point temperature method is more appropriate

  12. FSH: fast spaced seed hashing exploiting adjacent hashes.

    Science.gov (United States)

    Girotto, Samuele; Comin, Matteo; Pizzi, Cinzia

    2018-01-01

    Patterns with wildcards in specified positions, namely spaced seeds , are increasingly used instead of k -mers in many bioinformatics applications that require indexing, querying and rapid similarity search, as they can provide better sensitivity. Many of these applications require to compute the hashing of each position in the input sequences with respect to the given spaced seed, or to multiple spaced seeds. While the hashing of k -mers can be rapidly computed by exploiting the large overlap between consecutive k -mers, spaced seeds hashing is usually computed from scratch for each position in the input sequence, thus resulting in slower processing. The method proposed in this paper, fast spaced-seed hashing (FSH), exploits the similarity of the hash values of spaced seeds computed at adjacent positions in the input sequence. In our experiments we compute the hash for each positions of metagenomics reads from several datasets, with respect to different spaced seeds. We also propose a generalized version of the algorithm for the simultaneous computation of multiple spaced seeds hashing. In the experiments, our algorithm can compute the hashing values of spaced seeds with a speedup, with respect to the traditional approach, between 1.6[Formula: see text] to 5.3[Formula: see text], depending on the structure of the spaced seed. Spaced seed hashing is a routine task for several bioinformatics application. FSH allows to perform this task efficiently and raise the question of whether other hashing can be exploited to further improve the speed up. This has the potential of major impact in the field, making spaced seed applications not only accurate, but also faster and more efficient. The software FSH is freely available for academic use at: https://bitbucket.org/samu661/fsh/overview.

  13. Personalized medicine: a confluence of traditional and contemporary medicine.

    Science.gov (United States)

    Jafari, Samineh; Abdollahi, Mohammad; Saeidnia, Soodabeh

    2014-01-01

    Traditional systems of medicine have attained great popularity among patients in recent years. Success of this system in the treatment of disease warrants consideration, particularly in cases for which conventional medicine has been insufficient. This study investigates the similarities in principles and approaches of 3 traditional systems and explores whether conventional medicine is able to exploit the advantages of traditional systems. This study first identifies and explores the advantages of 3 well-known systems-traditional Iranian medicine (TIM), ayurveda, and traditional Chinese medicine (TCM)-that are similar in their basic principles and methods. Second, it clarifies whether and how conventional medicine could exploit the advantages of traditional systems as it modernizes, to become more personalized. Finally, this study investigates the possibility that conventional medicine could benefit from traditional typology to improve its personalization. The acknowledgment of the unity of humans and nature, applying rational methods, and personalized approaches is fundamentally similar in the 3 systems. Additionally, they all promote the holistic view that health is harmony and disease is disharmony of the body. Other similarities include their recognition of the unique nature of every person and their categorization of people into different body types. Although conventional medicine has mostly failed to incorporate the advantages of traditional medicine, its integration with traditional medicine is achievable. For instance, exploiting traditional typologies in genomic and other studies may facilitate personalization of conventional medicine. From its review, the research team concludes that prospects are bright for the integration of traditional and conventional medicines and, consequently, for a dramatic improvement in health systems.

  14. On the dynamics of exploited fish populations

    National Research Council Canada - National Science Library

    Beverton, R. J. H; Holt, Sidney J

    1993-01-01

    ...-brooding cichlids, and viviparity in many sharks and toothcarps. Moreover, fish are of considerable importance to the survival of the human species in the form of nutritious, delicious and diverse food. Rational exploitation and management of our global stocks of fishes must rely upon a detailed and precise insight of their biology. The...

  15. Child Exploitation: Some Pieces of the Puzzle.

    Science.gov (United States)

    Rohlader, Dorothy

    The report addresses the status in North Carolina and in the nation of child exploitation. Legislative and judicial backgrounds of child pornography and child prostitution are reviewed, and difficulties in obtaining statistical data are noted. Law enforcement issues in pornography are cited, and suggestions for further legislation regarding child…

  16. Exploiting a natural auxotrophy for genetic selection.

    Science.gov (United States)

    Ramage, Elizabeth; Gallagher, Larry; Manoil, Colin

    2012-08-01

    We exploited the natural histidine auxotrophy of Francisella species to develop hisD (encodes histidinol dehydrogenase) as a positive selection marker. A shuttle plasmid (pBR103) carrying Escherichia coli hisD and designed for cloning of PCR fragments replicated in both attenuated and highly virulent Francisella strains. During this work, we formulated a simplified defined growth medium for Francisella novicida.

  17. Growth, Mortality and Exploitation Rates of Sarotherodon ...

    African Journals Online (AJOL)

    Evans

    ABSTRACT. Sarotherodon melanotheron population of Dominli Lagoon in the Western Region of Ghana was studied for its growth and mortality parameters as well as exploitation rate. The study generally aimed at providing basic information necessary for the assessment and management of the fish stock in the lagoon.

  18. Economic factors of vulnerability trade and exploitation

    NARCIS (Netherlands)

    Allodi, L.

    2017-01-01

    Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently exists on the economics of attack acquisition

  19. Exploiting indigenous knowledge in the environmental conservation ...

    African Journals Online (AJOL)

    ... of agriculture and reared livestock (especially goats). Over several years, they developed sustainable and effective exploitation mechanisms of the existing biodiversity resources to satisfy their individual needs and those of their societies in general. Journal of Language, Technology and Entrepreneurship in Africa Vol.

  20. Exploiting citation contexts for physics retrieval

    DEFF Research Database (Denmark)

    Dabrowska, Anna; Larsen, Birger

    2015-01-01

    The text surrounding citations within scientific papers may contain terms that usefully describe cited documents and can benefit retrieval. We present a preliminary study that investigates appending ci- tation contexts from citing documents to cited documents in the iSearch test collection. We ex...... in a large collection of physics papers, paving the way for future research that exploits citation contexts for retrieval....

  1. The environmental impacts of foamed concrete production and exploitation

    Science.gov (United States)

    Namsone, E.; Korjakins, A.; Sahmenko, G.; Sinka, M.

    2017-10-01

    This paper presents a study focusing on the environmental impacts of foamed concrete production and exploitation. CO2 emissions are very important factor for describing durability and sustainability of any building material and its life cycle. The building sector is one of the largest energy-consuming sectors in the world. In this study CO2 emissions are evaluated with regard to three types of energy resources (gas, coal and eco-friendly fuel). The related savings on raw materials are up to 120 t of water per 1000 t of traditionally mixed foamed concrete and up to 350 t of sand per 1000 t of foamed concrete produced with intensive mixing technology. In addition, total reduction of CO2 emissions (up to 60 t per 1000 m3 of material) and total energy saving from introduction of foamed concrete production (depending on the type of fuel) were calculated. In order to analyze the conditions of exploitation, both thermal conductivity and thickness of wall was determined. All obtained and calculated results were compared to those of the commercially produced autoclaved aerated concrete.

  2. Exploiting the Dynamics of Soft Materials for Machine Learning.

    Science.gov (United States)

    Nakajima, Kohei; Hauser, Helmut; Li, Tao; Pfeifer, Rolf

    2018-06-01

    Soft materials are increasingly utilized for various purposes in many engineering applications. These materials have been shown to perform a number of functions that were previously difficult to implement using rigid materials. Here, we argue that the diverse dynamics generated by actuating soft materials can be effectively used for machine learning purposes. This is demonstrated using a soft silicone arm through a technique of multiplexing, which enables the rich transient dynamics of the soft materials to be fully exploited as a computational resource. The computational performance of the soft silicone arm is examined through two standard benchmark tasks. Results show that the soft arm compares well to or even outperforms conventional machine learning techniques under multiple conditions. We then demonstrate that this system can be used for the sensory time series prediction problem for the soft arm itself, which suggests its immediate applicability to a real-world machine learning problem. Our approach, on the one hand, represents a radical departure from traditional computational methods, whereas on the other hand, it fits nicely into a more general perspective of computation by way of exploiting the properties of physical materials in the real world.

  3. Self-report measure of financial exploitation of older adults.

    Science.gov (United States)

    Conrad, Kendon J; Iris, Madelyn; Ridings, John W; Langley, Kate; Wilber, Kathleen H

    2010-12-01

    this study was designed to improve the measurement of financial exploitation (FE) by testing psychometric properties of the older adult financial exploitation measure (OAFEM), a client self-report instrument. rasch item response theory and traditional validation approaches were used. Questionnaires were administered by 22 adult protective services investigators from 7 agencies in Illinois to 227 substantiated abuse clients. Analyses included tests for dimensionality, model fit, and additional construct validation. Results from the OAFEM were also compared with the substantiation decision of abuse and with investigators' assessments of FE using a staff report version. Hypotheses were generated to test hypothesized relationships. the OAFEM, including the original 79-, 54-, and 30-item measures, met stringent Rasch analysis fit and unidimensionality criteria and had high internal consistency and item reliability. The validation results were supportive, while leading to reconsideration of aspects of the hypothesized theoretical hierarchy. Thresholds were suggested to demonstrate levels of severity. the measure is now available to aid in the assessment of FE of older adults by both clinicians and researchers. Theoretical refinements developed using the empirically generated item hierarchy may help to improve assessment and intervention.

  4. Sensors, Volume 4, Thermal Sensors

    Science.gov (United States)

    Scholz, Jorg; Ricolfi, Teresio

    1996-12-01

    'Sensors' is the first self-contained series to deal with the whole area of sensors. It describes general aspects, technical and physical fundamentals, construction, function, applications and developments of the various types of sensors. This volume describes the construction and applicational aspects of thermal sensors while presenting a rigorous treatment of the underlying physical principles. It provides a unique overview of the various categories of sensors as well as of specific groups, e.g. temperature sensors (resistance thermometers, thermocouples, and radiation thermometers), noise and acoustic thermometers, heat-flow and mass-flow sensors. Specific facettes of applications are presented by specialists from different fields including process control, automotive technology and cryogenics. This volume is an indispensable reference work and text book for both specialists and newcomers, researchers and developers.

  5. Dissemination and Exploitation: Project Goals beyond Science

    Science.gov (United States)

    Hamann, Kristin; Reitz, Anja

    2017-04-01

    Dissemination and Exploitation are essential parts of public funded projects. In Horizon 2020 a plan for the exploitation and dissemination of results (PEDR) is a requirement. The plan should contain a clear vision on the objectives of the project in relation to actions for dissemination and potential exploitation of the project results. The actions follow the basic idea to spread the knowledge and results gathered within the project and face the challenge of how to bring the results into potentially relevant policy circle and how they impact the market. The plan follows the purpose to assess the impact of the project and to address various target groups who are interested in the project results. Simply put, dissemination concentrates on the transfer of knowledge and exploitation on the commercialization of the project. Beyond the question of the measurability of project`s impact, strategies within science marketing can serve purposes beyond internal and external communication. Accordingly, project managers are facing the challenge to implement a dissemination and exploitation strategy that ideally supports the identification of all partners with the project and matches the current discourse of the project`s content within the society, politics and economy. A consolidated plan might unite all projects partners under a central idea and supports the identification with the project beyond the individual research questions. Which applications, strategies and methods can be used to bring forward a PEDR that accompanies a project successfully and allows a comprehensive assessment of the project afterwards? Which hurdles might project managers experience in the dissemination process and which tasks should be fulfilled by the project manager?

  6. Trolling may intensify exploitation in crappie fisheries

    Science.gov (United States)

    Meals, K. O.; Dunn, A. W.; Miranda, Leandro E.

    2012-01-01

    In some parts of the USA, anglers targeting crappies Pomoxis spp. are transitioning from mostly stationary angling with a single pole around submerged structures to using multiple poles while drifting with the wind or under power. This shift in fishing methods could result in a change in catch efficiency, possibly increasing exploitation rates to levels that would be of concern to managers. We studied the catch statistics of anglers fishing while trolling with multiple poles (trollers) and those fishing with single poles (polers) in Mississippi reservoirs. Specifically, we tested whether (1) various catch statistics differed between trollers and polers, (2) catch rates of trollers were related to the number of poles fished, and (3) trollers could raise exploitation rates to potentially unsustainable levels. Results showed that participation in the crappie fisheries was about equally split between polers and trollers. In spring, 90% of crappie anglers were polers; in summer, 85% of crappie anglers were trollers. The size of harvested crappies was similar for the two angler groups, but the catch per hour was almost three times higher for trollers than for polers. Catch rates by trollers were directly correlated to the number of poles fished, although the relationship flattened as the number of poles increased. The average harvest rate for one troller fishing with three poles was similar to the harvest rate obtained by one poler. Simulations predicted that at the existing mix of about 50% polers and 50% trollers and with no restrictions on the number of poles used by trollers, exploitation of crappies is about 1.3 times higher than that in a polers-only fishery; under a scenario in which 100% of crappie anglers were trollers, exploitation was forecasted to increase to about 1.7 times the polers-only rate. The efficiency of trolling for crappies should be of concern to fishery managers because crappie fisheries are mostly consumptive and may increase exploitation

  7. An energy efficient distance-aware routing algorithm with multiple mobile sinks for wireless sensor networks.

    Science.gov (United States)

    Wang, Jin; Li, Bin; Xia, Feng; Kim, Chang-Seob; Kim, Jeong-Uk

    2014-08-18

    Traffic patterns in wireless sensor networks (WSNs) usually follow a many-to-one model. Sensor nodes close to static sinks will deplete their limited energy more rapidly than other sensors, since they will have more data to forward during multihop transmission. This will cause network partition, isolated nodes and much shortened network lifetime. Thus, how to balance energy consumption for sensor nodes is an important research issue. In recent years, exploiting sink mobility technology in WSNs has attracted much research attention because it can not only improve energy efficiency, but prolong network lifetime. In this paper, we propose an energy efficient distance-aware routing algorithm with multiple mobile sink for WSNs, where sink nodes will move with a certain speed along the network boundary to collect monitored data. We study the influence of multiple mobile sink nodes on energy consumption and network lifetime, and we mainly focus on the selection of mobile sink node number and the selection of parking positions, as well as their impact on performance metrics above. We can see that both mobile sink node number and the selection of parking position have important influence on network performance. Simulation results show that our proposed routing algorithm has better performance than traditional routing ones in terms of energy consumption.

  8. An Energy Efficient Distance-Aware Routing Algorithm with Multiple Mobile Sinks for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jin Wang

    2014-08-01

    Full Text Available Traffic patterns in wireless sensor networks (WSNs usually follow a many-to-one model. Sensor nodes close to static sinks will deplete their limited energy more rapidly than other sensors, since they will have more data to forward during multihop transmission. This will cause network partition, isolated nodes and much shortened network lifetime. Thus, how to balance energy consumption for sensor nodes is an important research issue. In recent years, exploiting sink mobility technology in WSNs has attracted much research attention because it can not only improve energy efficiency, but prolong network lifetime. In this paper, we propose an energy efficient distance-aware routing algorithm with multiple mobile sink for WSNs, where sink nodes will move with a certain speed along the network boundary to collect monitored data. We study the influence of multiple mobile sink nodes on energy consumption and network lifetime, and we mainly focus on the selection of mobile sink node number and the selection of parking positions, as well as their impact on performance metrics above. We can see that both mobile sink node number and the selection of parking position have important influence on network performance. Simulation results show that our proposed routing algorithm has better performance than traditional routing ones in terms of energy consumption.

  9. EXPLOITATION OF GLASS SAND ON THE OPEN PIT »VRTLINSKA« (MOSLAVINA, CROATIA

    Directory of Open Access Journals (Sweden)

    Slavko Vujec

    1994-12-01

    Full Text Available The exploitation of glass sand in Slavonia and Moslavina has a long tradition. The open-pit »Vrtlinska« is-accordirtg to its dimensions and production capacity the biggest one in this regions. Exploitation reserves within this open pit amount about 1 000 000 t glass sand of a very good quality, and the production capacity is 200 000 t yearly according to real needs during design and opening the pit, i. e. before the war. This article discusses geological and geomechanical characteristics of the deposit, as well as the exploitation process, which is considerably matching natural characteristics of the deposit. A more detailed description is given of the planned exploitation phase I above groundwater level which is carried out according to discontinuous system. For the exploitation of the depth part under groundwater level in the phase II, the necessity of further examination of hydrogeological characteristics of the deposit is presented, in order to acquire necessary information on groundwater regime and drainage conditions. Such knowledge will influence the choice of the most appropriate solutions in the exploitation of the depth part of the deposit.

  10. Traffic Profiling in Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Kirykos, Georgios

    2006-01-01

    .... Wireless sensor networks pose unique challenges and limitations to the traditional schemes, which are used in the other wireless networks for security protection, and are due mainly to the increased...

  11. TRADITIONAL CHINESE HERBAL MEDICINE

    NARCIS (Netherlands)

    ZHU, YP; WOERDENBAG, HJ

    1995-01-01

    Herbal medicine, acupuncture and moxibustion, and massage and the three major constituent parts of traditional Chinese medicine. Although acupuncture is well known in many Western countries, Chinese herbal medicine, the mos important part of traditional Chinese medicine, is less well known in the

  12. Traditional timber frames

    NARCIS (Netherlands)

    Jorissen, A.J.M.; Hamer, den J.; Leijten, A.J.M.; Salenikovich, A.

    2014-01-01

    Due to new possibilities traditional timber framing has become increasingly popular since the beginning of the 21e century. Although traditional timber framing has been used for centuries, the expected mechanical behaviour is not dealt with in great detail in building codes, guidelines or text

  13. Gas Sensor

    KAUST Repository

    Luebke, Ryan

    2015-01-22

    A gas sensor using a metal organic framework material can be fully integrated with related circuitry on a single substrate. In an on-chip application, the gas sensor can result in an area-efficient fully integrated gas sensor solution. In one aspect, a gas sensor can include a first gas sensing region including a first pair of electrodes, and a first gas sensitive material proximate to the first pair of electrodes, wherein the first gas sensitive material includes a first metal organic framework material.

  14. Gas Sensor

    KAUST Repository

    Luebke, Ryan; Eddaoudi, Mohamed; Omran, Hesham; Belmabkhout, Youssef; Shekhah, Osama; Salama, Khaled N.

    2015-01-01

    A gas sensor using a metal organic framework material can be fully integrated with related circuitry on a single substrate. In an on-chip application, the gas sensor can result in an area-efficient fully integrated gas sensor solution. In one aspect, a gas sensor can include a first gas sensing region including a first pair of electrodes, and a first gas sensitive material proximate to the first pair of electrodes, wherein the first gas sensitive material includes a first metal organic framework material.

  15. Sensor web

    Science.gov (United States)

    Delin, Kevin A. (Inventor); Jackson, Shannon P. (Inventor)

    2011-01-01

    A Sensor Web formed of a number of different sensor pods. Each of the sensor pods include a clock which is synchronized with a master clock so that all of the sensor pods in the Web have a synchronized clock. The synchronization is carried out by first using a coarse synchronization which takes less power, and subsequently carrying out a fine synchronization to make a fine sync of all the pods on the Web. After the synchronization, the pods ping their neighbors to determine which pods are listening and responded, and then only listen during time slots corresponding to those pods which respond.

  16. Sustainable exploitation and management of aquatic resources

    DEFF Research Database (Denmark)

    Neuenfeldt, Stefan; Köster, Fritz

    2014-01-01

    DTU Aqua conducts research, provides advice,educates at university level and contributes toinnovation in sustainable exploitation andmanagement of aquatic resources. The vision of DTUAqua is to enable ecologically and economicallysustainable exploitation of aquatic resourcesapplying an integrated...... management. Marineecosystems aims at understanding the mechanisms that govern the interaction between individuals,species and populations in an ecosystem enabling us to determine the stability and flexibility of theecosystem.Marine living resources looks at the sustainable utilization of fish and shellfish...... stocks.Ecosystem effects expands from the ecosystem approach to fisheries management to an integratedapproach where other human activities are taken into consideration. Fisheries management developsmethods, models and tools for predicting and evaluating the effects of management measures andregulations...

  17. Exploiting HRM in support of lean manufacturing

    DEFF Research Database (Denmark)

    Jørgensen, Frances; Matthiesen, Rikke

    The purpose of this paper is to investigate the ways in HRM practices are-and could potentially be-exploited to support lean manufacturing in practice. First, a review of the pertinent literature regarding HRM, SHRM, and lean manufacturing is presented to provide an understanding of the mechanisms...... by which HRM practices could, theoretically, be used to support a lean implementation. Data presented in the paper are derived from 1) a longitudinal case study on lean implementation and 2) from managers currently involved with lean manufacturing in a second company. The relevant literature and the data...... depicting the potential role in supporting HRM/lean integrated practices. The analysis of the model with respect to the theoretical background emphasizes a number of areas in which HRM could be more fully exploited in order to more successfully support lean implementation, for example, by stressing HRM...

  18. Exploiting Non-Markovianity for Quantum Control.

    Science.gov (United States)

    Reich, Daniel M; Katz, Nadav; Koch, Christiane P

    2015-07-22

    Quantum technology, exploiting entanglement and the wave nature of matter, relies on the ability to accurately control quantum systems. Quantum control is often compromised by the interaction of the system with its environment since this causes loss of amplitude and phase. However, when the dynamics of the open quantum system is non-Markovian, amplitude and phase flow not only from the system into the environment but also back. Interaction with the environment is then not necessarily detrimental. We show that the back-flow of amplitude and phase can be exploited to carry out quantum control tasks that could not be realized if the system was isolated. The control is facilitated by a few strongly coupled, sufficiently isolated environmental modes. Our paradigmatic example considers a weakly anharmonic ladder with resonant amplitude control only, restricting realizable operations to SO(N). The coupling to the environment, when harnessed with optimization techniques, allows for full SU(N) controllability.

  19. Exploiting Quantum Resonance to Solve Combinatorial Problems

    Science.gov (United States)

    Zak, Michail; Fijany, Amir

    2006-01-01

    Quantum resonance would be exploited in a proposed quantum-computing approach to the solution of combinatorial optimization problems. In quantum computing in general, one takes advantage of the fact that an algorithm cannot be decoupled from the physical effects available to implement it. Prior approaches to quantum computing have involved exploitation of only a subset of known quantum physical effects, notably including parallelism and entanglement, but not including resonance. In the proposed approach, one would utilize the combinatorial properties of tensor-product decomposability of unitary evolution of many-particle quantum systems for physically simulating solutions to NP-complete problems (a class of problems that are intractable with respect to classical methods of computation). In this approach, reinforcement and selection of a desired solution would be executed by means of quantum resonance. Classes of NP-complete problems that are important in practice and could be solved by the proposed approach include planning, scheduling, search, and optimal design.

  20. Exploiting Inhibitory Siglecs to Combat Food Allergies

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-16-1-0302 TITLE: Exploiting Inhibitory Siglecs to Combat Food Allergies PRINCIPAL INVESTIGATOR: Michael Kulis, Ph.D...CONTRACTING ORGANIZATION: University of North Carolina at Chapel Hill Chapel Hill, NC 27599 REPORT DATES: October 2017 TYPE OF REPORT: Annual PREPARED FOR...Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite

  1. Dandruff: The most commercially exploited skin disease

    Directory of Open Access Journals (Sweden)

    Ranganathan S

    2010-01-01

    Full Text Available The article discuss in detail about the prevalence, pathophysiology, clinical manifestations of dandruff including the etio-pathology. The article also discusses in detail about various treatment methods available for dandruff. The status of dandruff being amphibious - a disease/disorder, and relatively less medical intervention is sought after for the treatment, dandruff is the most commercially exploited skin and scalp disorder/disease by personal care industries.

  2. Exploiting partial knowledge for efficient model analysis

    OpenAIRE

    Macedo, Nuno; Cunha, Alcino; Pessoa, Eduardo José Dias

    2017-01-01

    The advancement of constraint solvers and model checkers has enabled the effective analysis of high-level formal specification languages. However, these typically handle a specification in an opaque manner, amalgamating all its constraints in a single monolithic verification task, which often proves to be a performance bottleneck. This paper addresses this issue by proposing a solving strategy that exploits user-provided partial knowledge, namely by assigning symbolic bounds to the problem’s ...

  3. Amplifiers Exploiting Thermal Noise Canceling: A Review

    OpenAIRE

    Klumperink, Eric A.M.; Bruccoleri, Federico; Stroet, Peter; Nauta, Bram

    2004-01-01

    Wide-band LNAs suffer from a fundamental trade-off between noise figure NF and source impedance matching, which limits NF to values typically above 3dB. Recently, a feed-forward noise canceling technique has been proposed to break this trade-off. This paper reviews the principle of the technique and its key properties. Although the technique has been applied to wideband CMOS LNAs, it can just as well be implemented exploiting transconductance elements realized with oth...

  4. Exploiting thesauri knowledge in medical guideline formalization

    OpenAIRE

    Serban, R.C.; ten Teije, A.C.M.

    2009-01-01

    Objectives: As in software product lifecycle, the effort spent in maintaining medical knowl edge in guidelines can be reduced, if modularization, formalization and tracking of domain knowledge are employed across the guideline development phases. Methods: We propose to exploit and combine knowledge templates with medical background knowledge from existing thesauri in order to produce reusable building blocks used in guideline development. These tem- plates enable easier guideline formalizatio...

  5. Exploitation as the Unequal Exchange of Labour : An Axiomatic Approach

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2009-01-01

    In subsistence economies with general convex technology and rational optimising agents, a new, axiomatic approach is developed, which allows an explicit analysis of the core positive and normative intuitions behind the concept of exploitation. Three main new axioms, called Labour Exploitation in Subsistence Economies , Relational Exploitation , and Feasibility of Non-Exploitation , are presented and it is proved that they uniquely characterise a definition of exploitation conceptually related...

  6. Security option file - Exploitation (DOS-Expl)

    International Nuclear Information System (INIS)

    2016-01-01

    This document aims at presenting functions performed by Cigeo during its exploitation phase, its main technical and security options which are envisaged with respect to different types of internal or external risks, and a first assessment of its impact on mankind and on the environment during its exploitation in normal operation as well as in incidental or accidental situations. A first volume addresses security principles, approach and management in relationship with the legal and regulatory framework. The second volume presents input data related to waste parcels and used for the installation sizing and operation, the main site characteristics, the main technical options regarding structures and equipment, and the main options regarding exploitation (parcel management, organisational and human aspects, and effluent management). The third volume describes how parcel are processed from their arrival to their setting in storage compartment, an inventory of internal and external risks, and a first assessment of consequences of scenarios on mankind and on the environment. The fourth volume presents options and operations which are envisaged regarding Cigeo closure, and inventory of associated risks

  7. Chemical sensors

    International Nuclear Information System (INIS)

    Hubbard, C.W.; Gordon, R.L.

    1987-05-01

    The revolution in analytical chemistry promised by recent developments in the field of chemical sensors has potential for significant positive impact on both research and production activities conducted by and for the Department of Energy. Analyses which were, in the past, performed only with a roomful of expensive equipment can now be performed with miniature solid-state electronic devices or small optical probes. Progress in the development of chemical sensors has been rapid, and the field is currently growing at a great rate. In accordance, Pacific Northwest Laboratory initiated a survey of recent literature so that contributors to active programs in research on analytical methods could be made aware of principles and applications of this new technology. This report presents the results of that survey. The sensors discussed here are divided into three types: micro solid-state devices, optical sensors, and piezoelectric crystal devices. The report is divided into three corresponding sections. The first section, ''Micro Solid-State Devices,'' discusses the design, operation, and application of electronic sensors that are produced in much the same way as standard solid-state electronic devices. The second section, ''Optrodes,'' covers the design and operation of chemical sensors that use fiber optics to detect chemically induced changes in optical properties. The final section, ''Piezoelectric Crystal Detectors,'' discusses two types of chemical sensors that depend on the changes in the properties of an oscillating piezoelectric crystal to detect the presence of certain materials. Advantages and disadvantages of each type of sensor are summarized in each section

  8. Traditional medicine and genomics

    Directory of Open Access Journals (Sweden)

    Kalpana Joshi

    2010-01-01

    Full Text Available ′Omics′ developments in the form of genomics, proteomics and metabolomics have increased the impetus of traditional medicine research. Studies exploring the genomic, proteomic and metabolomic basis of human constitutional types based on Ayurveda and other systems of oriental medicine are becoming popular. Such studies remain important to developing better understanding of human variations and individual differences. Countries like India, Korea, China and Japan are investing in research on evidence-based traditional medicines and scientific validation of fundamental principles. This review provides an account of studies addressing relationships between traditional medicine and genomics.

  9. Traditional medicine and genomics.

    Science.gov (United States)

    Joshi, Kalpana; Ghodke, Yogita; Shintre, Pooja

    2010-01-01

    'Omics' developments in the form of genomics, proteomics and metabolomics have increased the impetus of traditional medicine research. Studies exploring the genomic, proteomic and metabolomic basis of human constitutional types based on Ayurveda and other systems of oriental medicine are becoming popular. Such studies remain important to developing better understanding of human variations and individual differences. Countries like India, Korea, China and Japan are investing in research on evidence-based traditional medicines and scientific validation of fundamental principles. This review provides an account of studies addressing relationships between traditional medicine and genomics.

  10. High-Performance Motion Estimation for Image Sensors with Video Compression

    Directory of Open Access Journals (Sweden)

    Weizhi Xu

    2015-08-01

    Full Text Available It is important to reduce the time cost of video compression for image sensors in video sensor network. Motion estimation (ME is the most time-consuming part in video compression. Previous work on ME exploited intra-frame data reuse in a reference frame to improve the time efficiency but neglected inter-frame data reuse. We propose a novel inter-frame data reuse scheme which can exploit both intra-frame and inter-frame data reuse for ME in video compression (VC-ME. Pixels of reconstructed frames are kept on-chip until they are used by the next current frame to avoid off-chip memory access. On-chip buffers with smart schedules of data access are designed to perform the new data reuse scheme. Three levels of the proposed inter-frame data reuse scheme are presented and analyzed. They give different choices with tradeoff between off-chip bandwidth requirement and on-chip memory size. All three levels have better data reuse efficiency than their intra-frame counterparts, so off-chip memory traffic is reduced effectively. Comparing the new inter-frame data reuse scheme with the traditional intra-frame data reuse scheme, the memory traffic can be reduced by 50% for VC-ME.

  11. Estimating propagation velocity through a surface acoustic wave sensor

    Science.gov (United States)

    Xu, Wenyuan; Huizinga, John S.

    2010-03-16

    Techniques are described for estimating the propagation velocity through a surface acoustic wave sensor. In particular, techniques which measure and exploit a proper segment of phase frequency response of the surface acoustic wave sensor are described for use as a basis of bacterial detection by the sensor. As described, use of velocity estimation based on a proper segment of phase frequency response has advantages over conventional techniques that use phase shift as the basis for detection.

  12. Improving Decision Making in Ocean Race Sailing using Sensor Data

    NARCIS (Netherlands)

    van Hillegersberg, Jos; Vroling, Mark; Smit, Floris

    While in some sports, experiences have been gained using traditional information and decision support systems, using large sensor datasets for sports analytics is a recent phenomenon. Using sensor data to arrive at effective decision support for sports encompasses various challenges: (1) Sensor data

  13. Distributed sensor networks

    CERN Document Server

    Rubin, Donald B; Carlin, John B; Iyengar, S Sitharama; Brooks, Richard R; University, Clemson

    2014-01-01

    An Overview, S.S. Iyengar, Ankit Tandon, and R.R. BrooksMicrosensor Applications, David ShepherdA Taxonomy of Distributed Sensor Networks, Shivakumar Sastry and S.S. IyengarContrast with Traditional Systems, R.R. BrooksDigital Signal Processing Background, Yu Hen HuImage-Processing Background Lynne Grewe and Ben ShahshahaniObject Detection and Classification, Akbar M. SayeedParameter Estimation David FriedlanderTarget Tracking with Self-Organizing Distributed Sensors R.R. Brooks, C. Griffin, D.S. Friedlander, and J.D. KochCollaborative Signal and Information Processing: AnInformation-Directed Approach Feng Zhao, Jie Liu, Juan Liu, Leonidas Guibas, and James ReichEnvironmental Effects, David C. SwansonDetecting and Counteracting Atmospheric Effects Lynne L. GreweSignal Processing and Propagation for Aeroacoustic Sensor Networks, Richard J. Kozick, Brian M. Sadler, and D. Keith WilsonDistributed Multi-Target Detection in Sensor Networks Xiaoling Wang, Hairong Qi, and Steve BeckFoundations of Data Fusion f...

  14. MASM: a market architecture for sensor management in distributed sensor networks

    Science.gov (United States)

    Viswanath, Avasarala; Mullen, Tracy; Hall, David; Garga, Amulya

    2005-03-01

    Rapid developments in sensor technology and its applications have energized research efforts towards devising a firm theoretical foundation for sensor management. Ubiquitous sensing, wide bandwidth communications and distributed processing provide both opportunities and challenges for sensor and process control and optimization. Traditional optimization techniques do not have the ability to simultaneously consider the wildly non-commensurate measures involved in sensor management in a single optimization routine. Market-oriented programming provides a valuable and principled paradigm to designing systems to solve this dynamic and distributed resource allocation problem. We have modeled the sensor management scenario as a competitive market, wherein the sensor manager holds a combinatorial auction to sell the various items produced by the sensors and the communication channels. However, standard auction mechanisms have been found not to be directly applicable to the sensor management domain. For this purpose, we have developed a specialized market architecture MASM (Market architecture for Sensor Management). In MASM, the mission manager is responsible for deciding task allocations to the consumers and their corresponding budgets and the sensor manager is responsible for resource allocation to the various consumers. In addition to having a modified combinatorial winner determination algorithm, MASM has specialized sensor network modules that address commensurability issues between consumers and producers in the sensor network domain. A preliminary multi-sensor, multi-target simulation environment has been implemented to test the performance of the proposed system. MASM outperformed the information theoretic sensor manager in meeting the mission objectives in the simulation experiments.

  15. Automotive sensors

    Science.gov (United States)

    Marek, Jiri; Illing, Matthias

    2003-01-01

    Sensors are an essential component of most electronic systems in the car. They deliver input parameters for comfort features, engine and emission control as well as for the active and passive safety systems. New technologies such as silicon micromachining play an important role for the introduction of these sensors in all vehicle classes. The importance and use of these sensor technologies in today"s automotive applications will be shown in this article. Finally an outlook on important current developments and new functions in the car will be given.

  16. Piezoceramic Sensors

    CERN Document Server

    Sharapov, Valeriy

    2011-01-01

    This book presents the latest and complete information about various types of piezosensors. A sensor is a converter of the measured physical size to an electric signal. Piezoelectric transducers and sensors are based on piezoelectric effects. They have proven to be versatile tools for the measurement of various processes. They are used for quality assurance, process control and for research and development in many different industries. In each area of application specific requirements to the parameters of transducers and sensors are developed. This book presents the fundamentals, technical des

  17. Cross-platform wireless sensor network development

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg; Kusy, Branislav

    Design and development of wireless sensor network applications adds an additional layer of complexity to traditional computer systems. The developer needs to be an expert in resource constrained embedded devices as well as traditional desktop computers. We propose Tinylnventor, an open...

  18. Cloud Based Earth Observation Data Exploitation Platforms

    Science.gov (United States)

    Romeo, A.; Pinto, S.; Loekken, S.; Marin, A.

    2017-12-01

    In the last few years data produced daily by several private and public Earth Observation (EO) satellites reached the order of tens of Terabytes, representing for scientists and commercial application developers both a big opportunity for their exploitation and a challenge for their management. New IT technologies, such as Big Data and cloud computing, enable the creation of web-accessible data exploitation platforms, which offer to scientists and application developers the means to access and use EO data in a quick and cost effective way. RHEA Group is particularly active in this sector, supporting the European Space Agency (ESA) in the Exploitation Platforms (EP) initiative, developing technology to build multi cloud platforms for the processing and analysis of Earth Observation data, and collaborating with larger European initiatives such as the European Plate Observing System (EPOS) and the European Open Science Cloud (EOSC). An EP is a virtual workspace, providing a user community with access to (i) large volume of data, (ii) algorithm development and integration environment, (iii) processing software and services (e.g. toolboxes, visualization routines), (iv) computing resources, (v) collaboration tools (e.g. forums, wiki, etc.). When an EP is dedicated to a specific Theme, it becomes a Thematic Exploitation Platform (TEP). Currently, ESA has seven TEPs in a pre-operational phase dedicated to geo-hazards monitoring and prevention, costal zones, forestry areas, hydrology, polar regions, urban areas and food security. On the technology development side, solutions like the multi cloud EO data processing platform provides the technology to integrate ICT resources and EO data from different vendors in a single platform. In particular it offers (i) Multi-cloud data discovery, (ii) Multi-cloud data management and access and (iii) Multi-cloud application deployment. This platform has been demonstrated with the EGI Federated Cloud, Innovation Platform Testbed Poland

  19. Heisenberg's heirs exploit loopholes in his law

    International Nuclear Information System (INIS)

    Taubes, G.

    1994-01-01

    This article describes research into Heisenberg's Uncertainty Principle. Loopholes in the principle have led to a series of experiments using sophisticated optical techniques to extract information from a quantum system without disturbing the variable being measured. The experiments are based on a technique called back-action evasion, which exploits the possibility of channeling all the uncertainty generated by measuring one quantum variable (e.g. laser beam intensity) onto a related variable known as the conjugate observable (beam phase). These experiments and others are described

  20. Liposomal cancer therapy: exploiting tumor characteristics

    DEFF Research Database (Denmark)

    Kaasgaard, Thomas; Andresen, Thomas Lars

    2010-01-01

    an overview of current strategies for improving the different stages of liposomal cancer therapy, which involve transporting drug-loaded liposomes through the bloodstream, increasing tumor accumulation, and improving drug release and cancer cell uptake after accumulation at the tumor target site. What...... the reader will gain: The review focuses on strategies that exploit characteristic features of solid tumors, such as abnormal vasculature, overexpression of receptors and enzymes, as well as acidic and thiolytic characteristics of the tumor microenvironment. Take home message: It is concluded that the design...

  1. Pilot plant for exploitation of geothermal waters

    Directory of Open Access Journals (Sweden)

    Stojiljković Dragan T.

    2006-01-01

    Full Text Available In Sijarinska spa, there are some 15 mineral and thermomineral springs, that are already being used for therapeutic purposes. For the exploitation of heat energy boring B-4 is very interesting. It is a boring of a closed type, with the water temperature of about 78°C and a flow rate of about 33 l/s. Waters with the flow rate of about 6 l/s are currently used for heating of the Gejzer hotel, and waters of the flow rate of about 0,121 l/s for the pilot drying plant. The paper presents this pilot plant. .

  2. Exploiting Redundancy in an OFDM SDR Receiver

    Directory of Open Access Journals (Sweden)

    Tomas Palenik

    2009-01-01

    Full Text Available Common OFDM system contains redundancy necessary to mitigate interblock interference and allows computationally effective single-tap frequency domain equalization in receiver. Assuming the system implements an outer error correcting code and channel state information is available in the receiver, we show that it is possible to understand the cyclic prefix insertion as a weak inner ECC encoding and exploit the introduced redundancy to slightly improve error performance of such a system. In this paper, an easy way to implement modification to an existing SDR OFDM receiver is presented. This modification enables the utilization of prefix redundancy, while preserving full compatibility with existing OFDM-based communication standards.

  3. Geothermal resources: exploration and exploitation. A bibliography

    Energy Technology Data Exchange (ETDEWEB)

    1976-07-01

    This comprehensive bibliography contains 5476 citations of foreign and domestic research reports, journal articles, patents, conference proceedings, and books concerned with the exploration and exploitation of geothermal resources. The coverage dates back as far as useful references could be obtained and extends through June 1976. References are arranged in broad subject categories and are made up of complete bibliographic citations. These are followed by a listing of subject descriptors used to describe the subject content of each reference. Four indexes are included: Corporate, Personal Author, Subject, and Report Number. Also included is a list of journals from which articles were selected. (LBS)

  4. How Less Alienation Creates More Exploitation? Audience Labour on Social Network Sites.

    OpenAIRE

    Eran Fisher

    2012-01-01

    Abstract: The notion of audience labour has been an important contribution to Marxist political economy of the media. It revised the traditional political economy analysis, which focused on media ownership, by suggesting that media was also a site of production, constituting particular relations of production. Such analysis highlighted the active role of audience in the creation of media value as both commodities and workers, thus pointing to audience exploitation. Recently, in light of parad...

  5. Analysis on digital management of uranium geological archives and its second exploitation and utilization

    International Nuclear Information System (INIS)

    Kong Hui

    2009-01-01

    The enormous data and examples show that the second exploitation and utilization of geological archives information are important and necessary for geological prospecting. The author deeply studies and analyzes the information service system for uranium geology, it is believed that the traditional management mode of geological archives must be transformed into modernized service mode. The way of how to expand, apply and improve the 'management and analytical system for uranium resources information' is discussed for implementing geo-informational construction. (authors)

  6. Exploiting nonlinear dynamics in a coupled-core fluxgate magnetometer

    International Nuclear Information System (INIS)

    Bulsara, Adi R; In, Visarath; Kho, Andy; Longhini, Patrick; Neff, Joe; Anderson, Gregory; Obra, Christopher; Palacios, Antonio; Baglio, Salvatore; Ando, Bruno

    2008-01-01

    Unforced bistable dynamical systems having dynamics of the general form τ F x-dot (t)=-∇ x U(x) cannot oscillate (i.e. switch between their stable attractors). However, a number of such systems subject to carefully crafted coupling schemes have been shown to exhibit oscillatory behavior under carefully chosen operating conditions. This behavior, in turn, affords a new mechanism for the detection and quantification of target signals having magnitude far smaller than the energy barrier height in the potential energy function U(x) for a single (uncoupled) element. The coupling-induced oscillations are a feature that appears to be universal in systems described by bi- or multi-stable potential energy functions U(x), and are being exploited in a new class of dynamical sensors being developed by us. In this work we describe one of these devices, a coupled-core fluxgate magnetometer (CCFM), whose operation is underpinned by this dynamic behavior. We provide an overview of the underlying dynamics and, also, quantify the performance of our test device; in particular, we provide a quantitative performance comparison to a conventional (single-core) fluxgate magnetometer via a 'resolution' parameter that embodies the device sensitivity (the slope of its input–output transfer characteristic) as well as the noise floor

  7. Design principles of a conditional futile cycle exploited for regulation.

    Science.gov (United States)

    Tolla, Dean A; Kiley, Patricia J; Lomnitz, Jason G; Savageau, Michael A

    2015-07-01

    In this report, we characterize the design principles of futile cycling in providing rapid adaptation by regulatory proteins that act as environmental sensors. In contrast to the energetically wasteful futile cycles that are avoided in metabolic pathways, here we describe a conditional futile cycle exploited for a regulatory benefit. The FNR (fumarate and nitrate reduction) cycle in Escherichia coli operates under two regimes - a strictly futile cycle in the presence of O2 and as a pathway under anoxic conditions. The computational results presented here use FNR as a model system and provide evidence that cycling of this transcription factor and its labile sensory cofactor between active and inactive states affords rapid signaling and adaptation. We modify a previously developed mechanistic model to examine a family of FNR models each with different cycling speeds but mathematically constrained to be otherwise equivalent, and we identify a trade-off between energy expenditure and response time that can be tuned by evolution to optimize cycling rate of the FNR system for a particular ecological context. Simulations mimicking experiments with proposed double mutant strains offer suggestions for experimentally testing our predictions and identifying potential fitness effects. Our approach provides a computational framework for analyzing other conditional futile cycles, which when placed in their larger biological context may be found to confer advantages to the organism.

  8. Characteristics of thermal-mineral waters in Backa region (Vojvodina) and their exploitation in spa tourism

    Energy Technology Data Exchange (ETDEWEB)

    Kosic, Kristina; Pivac, Tatjana; Romelic, Jovan; Lazic, Lazar; Stojanovic, Vladimir [Faculty of Science, Department of Geography, Tourism and Hotel Management, University of Novi Sad, Trg Dositeja Obradovica 3, 21000 Novi Sad (RS)

    2011-01-15

    Hydropower, biomass, biogas, biofuels, wind power, solar energy and geothermal energy are the major resources to provide Backa region with most of its. Backa extends between 45 16' and 46 22' of the northern latitude and 18 36' and 20 37' of the eastern longitude. It occupies the north-eastern part of Vojvodina, i.e. the most north-western part of the Republic of Serbia. That is historical-geographic territory bordered on the Danube on its western and eastern side, the Tisa on its eastern side and with the state border towards Hungary on the north. In this paper, the focus will be on renewable sources, specifically geothermal energy in Backa region. The paper analyzes the characteristics of thermal-mineral waters in Backa, the condition and possibilities of their exploitation in spa tourism, and in other economic branches. The tradition of thermo-mineral waters exploitation in spas and public baths is rather long. Today, this type of thermo-mineral waters exploitation in Backa is the widest spread. Permanent, i.e. continuous exploiters of thermal-mineral waters in Backa are primarily balneal-rehabilitation centres and exploiters using the water for technological purposes. (author)

  9. The Potential Socio-economic Impacts of Gas Hydrate Exploitation

    Science.gov (United States)

    Riley, David; Schaafsma, Marije; Marin-Moreno, Héctor; Minshull, Tim A.

    2017-04-01

    the labour supply may not fit with the labour demand. In regions with an existing strong fossil fuel energy sector, hydrate development would prolong the timeframe for which this sector could significantly contribute to the local and wider economy. In unexploited areas the industry can provide considerable income to an otherwise undeveloped region. Industrialisation tends to increase regional population, pressuring existing public services, such as healthcare and transport infrastructure. Immigrant fossil fuel sector workers are predominantly young, male and single. Their presence may be linked to elevated levels of certain social issues seen as undesirable problems by the community at large, such as drug usage or alcoholism. Hydrate development provides limited benefit to indigenous communities who are still following a traditional cultural lifestyle in the proposed development area, as many opportunities are not compatible with their way of life. Additionally, industry associated infrastructure can reduce the ability of the indigenous population to utilise the land directly, or as an access route elsewhere. The range of possible impacts show that any hydrate development must be carefully managed to maximise its potential, whether this takes the form of using the revenue from hydrate exploitation to try and counter the associated issues, or whether there needs to be specific limits placed on locations where extraction can occur.

  10. KASTAMONU TRADITIONAL WOMEN CLOTHES

    Directory of Open Access Journals (Sweden)

    E.Elhan ÖZUS

    2015-08-01

    Full Text Available Clothing is a unique dressing style of a community, a period or a profession. In clothing there is social status and difference principle rather than fashion. In this context, the society created a clothing style in line with its own customs, traditions and social structure. One of the features separating societies from each other and indicating their cultural and social classes is the clothing style. As it is known, traditional Turkish clothes reflecting the characteristics of Turkish society is our most beautiful heritage from past to present. From this heritage there are several examples of women's clothes c arried to present. When these examples are examined, it is possible to see the taste, the way of understanding art, joy and the lifestyle of the history. These garments are also the documents outlining the taste and grace of Turkish people. In the present study, traditional Kastamonu women's clothing, that has an important place in traditional cultural clothes of Anatolia, is investigated . The method of the present research is primarily defined as the examination of the written sources. The study is complet ed with the observations and examinations made in Kastamonu. According to the findings of the study, traditional Kastamonu women's clothing are examined and adapted to todays’ clothing.

  11. Competing Discourses about Youth Sexual Exploitation in Canadian News Media.

    Science.gov (United States)

    Saewyc, Elizabeth M; Miller, Bonnie B; Rivers, Robert; Matthews, Jennifer; Hilario, Carla; Hirakata, Pam

    2013-10-01

    Media holds the power to create, maintain, or break down stigmatizing attitudes, which affect policies, funding, and services. To understand how Canadian news media depicts the commercial sexual exploitation of children and youth, we examined 835 Canadian newspaper articles from 1989-2008 using a mixed methods critical discourse analysis approach, comparing representations to existing research about sexually exploited youth. Despite research evidence that equal rates of boys and girls experience exploitation, Canadian news media depicted exploited youth predominantly as heterosexual girls, and described them alternately as victims or workers in a trade, often both in the same story. News media mentioned exploiters far less often than victims, and portrayed them almost exclusively as male, most often called 'customers' or 'consumers,' and occasionally 'predators'; in contrast, research has documented the majority of sexually exploited boys report female exploiters. Few news stories over the past two decades portrayed the diversity of victims, perpetrators, and venues of exploitation reported in research. The focus on victims but not exploiters helps perpetuate stereotypes of sexual exploitation as business or a 'victimless crime,' maintains the status quo, and blurs responsibility for protecting youth under the UN Convention on the Rights of the Child. Health care providers and researchers can be advocates for accuracy in media coverage about sexual exploitation; news reporters and editors should focus on exploiters more than victims, draw on existing research evidence to avoid perpetuating stereotypes, and use accurate terms, such as commercial sexual exploitation, rather than terms related to business or trade.

  12. Uncovering Indicators of Commercial Sexual Exploitation.

    Science.gov (United States)

    Bounds, Dawn; Delaney, Kathleen R; Julion, Wrenetha; Breitenstein, Susan

    2017-07-01

    It is estimated that annually 100,000 to 300,000 youth are at risk for sex trafficking; a commercial sex act induced by force, fraud, or coercion, or any such act where the person induced to perform such an act is younger than 18 years of age. Increasingly, such transactions are occurring online via Internet-based sites that serve the commercial sex industry. Commercial sex transactions involving trafficking are illegal; thus, Internet discussions between those involved must be veiled. Even so, transactions around sex trafficking do occur. Within these transactions are innuendos that provide one avenue for detecting potential activity. The purpose of this study is to identify linguistic indicators of potential commercial sexual exploitation within the online comments of men posted on an Internet site. Six hundred sixty-six posts from five Midwest cities and 363 unique members were analyzed via content analysis. Three main indicators were found: the presence of youth or desire for youthfulness, presence of pimps, and awareness of vulnerability. These findings begin a much-needed dialogue on uncovering online risks of commercial sexual exploitation and support the need for further research on Internet indicators of sex trafficking.

  13. Large size space construction for space exploitation

    Science.gov (United States)

    Kondyurin, Alexey

    2016-07-01

    Space exploitation is impossible without large space structures. We need to make sufficient large volume of pressurized protecting frames for crew, passengers, space processing equipment, & etc. We have to be unlimited in space. Now the size and mass of space constructions are limited by possibility of a launch vehicle. It limits our future in exploitation of space by humans and in development of space industry. Large-size space construction can be made with using of the curing technology of the fibers-filled composites and a reactionable matrix applied directly in free space. For curing the fabric impregnated with a liquid matrix (prepreg) is prepared in terrestrial conditions and shipped in a container to orbit. In due time the prepreg is unfolded by inflating. After polymerization reaction, the durable construction can be fitted out with air, apparatus and life support systems. Our experimental studies of the curing processes in the simulated free space environment showed that the curing of composite in free space is possible. The large-size space construction can be developed. A project of space station, Moon base, Mars base, mining station, interplanet space ship, telecommunication station, space observatory, space factory, antenna dish, radiation shield, solar sail is proposed and overviewed. The study was supported by Humboldt Foundation, ESA (contract 17083/03/NL/SFe), NASA program of the stratospheric balloons and RFBR grants (05-08-18277, 12-08-00970 and 14-08-96011).

  14. PROBA-V Mission Exploitation Platform

    Directory of Open Access Journals (Sweden)

    Erwin Goor

    2016-07-01

    Full Text Available As an extension of the PROBA-Vegetation (PROBA-V user segment, the European Space Agency (ESA, de Vlaamse Instelling voor Technologisch Onderzoek (VITO, and partners TRASYS and Spacebel developed an operational Mission Exploitation Platform (MEP to drastically improve the exploitation of the PROBA-V Earth Observation (EO data archive, the archive from the historical SPOT-VEGETATION mission, and derived products by researchers, service providers, and thematic users. The analysis of the time series of data (petabyte range is addressed, as well as the large scale on-demand processing of the complete archive, including near real-time data. The platform consists of a private cloud environment, a Hadoop-based processing environment and a data manager. Several applications are released to the users, e.g., a full resolution viewing service, a time series viewer, pre-defined on-demand processing chains, and virtual machines with powerful tools and access to the data. After an initial release in January 2016 a research platform was deployed gradually, allowing users to design, debug, and test applications on the platform. From the PROBA-V MEP, access to, e.g., Sentinel-2 and Sentinel-3 data will be addressed as well.

  15. Optischer Sensor

    OpenAIRE

    Brandenburg, A.; Hutter, F.; Edelhaeuser, R.

    1992-01-01

    WO 2010040565 A1 UPAB: 20100506 NOVELTY - The integrated optical sensor comprises a first waveguide (4), a second waveguide (5) optically coupled to the first waveguide via a directional coupler, a substrate, which carries the first and the second waveguides, a single waveguide coupled with a light source, and an output waveguide coupled with a light-sensitive element. The sensor has a functional surface in the region of the directional coupler for depositing or deposition of the substance to...

  16. Wireless sensor

    Science.gov (United States)

    Lamberti, Vincent E.; Howell, JR, Layton N.; Mee, David K.; Sepaniak, Michael J.

    2016-02-09

    Disclosed is a sensor for detecting a target material. The sensor includes a ferromagnetic metal and a molecular recognition reagent coupled to the ferromagnetic metal. The molecular recognition reagent is operable to expand upon exposure to vapor or liquid from the target material such that the molecular recognition reagent changes a tensile stress upon the ferromagnetic metal. The target material is detected based on changes in the magnetic switching characteristics of the ferromagnetic metal caused by the changes in the tensile stress.

  17. Traditional Chinese Biotechnology

    Science.gov (United States)

    Xu, Yan; Wang, Dong; Fan, Wen Lai; Mu, Xiao Qing; Chen, Jian

    The earliest industrial biotechnology originated in ancient China and developed into a vibrant industry in traditional Chinese liquor, rice wine, soy sauce, and vinegar. It is now a significant component of the Chinese economy valued annually at about 150 billion RMB. Although the production methods had existed and remained basically unchanged for centuries, modern developments in biotechnology and related fields in the last decades have greatly impacted on these industries and led to numerous technological innovations. In this chapter, the main biochemical processes and related technological innovations in traditional Chinese biotechnology are illustrated with recent advances in functional microbiology, microbial ecology, solid-state fermentation, enzymology, chemistry of impact flavor compounds, and improvements made to relevant traditional industrial facilities. Recent biotechnological advances in making Chinese liquor, rice wine, soy sauce, and vinegar are reviewed.

  18. Sensors for ultra-fast silicon detectors

    Energy Technology Data Exchange (ETDEWEB)

    Sadrozinski, H.F.-W., E-mail: hartmut@scipp.ucsc.edu [Santa Cruz Institute for Particle Physics, UC Santa Cruz, Santa Cruz, CA 95064 (United States); Baselga, M.; Ely, S.; Fadeyev, V.; Galloway, Z.; Ngo, J.; Parker, C.; Schumacher, D.; Seiden, A.; Zatserklyaniy, A. [Santa Cruz Institute for Particle Physics, UC Santa Cruz, Santa Cruz, CA 95064 (United States); Cartiglia, N. [INFN Torino, Torino (Italy); Pellegrini, G.; Fernández-Martínez, P.; Greco, V.; Hidalgo, S.; Quirion, D. [Centro Nacional de Microelectrónica, IMB-CNM-CSIC, Barcelona (Spain)

    2014-11-21

    We report on electrical and charge collection tests of silicon sensors with internal gain as part of our development of ultra-fast silicon detectors. Using C–V and α TCT measurements, we investigate the non-uniform doping profile of so-called low-gain avalanche detectors (LGAD). These are n-on-p pad sensors with charge multiplication due to the presence of a thin, low-resistivity diffusion layer below the junction, obtained with a highly doped implant. We compare the bias dependence of the pulse shapes of traditional sensors and of LGAD sensors with different dopant density of the diffusion layer, and extract the internal gain.

  19. Sensors for ultra-fast silicon detectors

    International Nuclear Information System (INIS)

    Sadrozinski, H.F.-W.; Baselga, M.; Ely, S.; Fadeyev, V.; Galloway, Z.; Ngo, J.; Parker, C.; Schumacher, D.; Seiden, A.; Zatserklyaniy, A.; Cartiglia, N.; Pellegrini, G.; Fernández-Martínez, P.; Greco, V.; Hidalgo, S.; Quirion, D.

    2014-01-01

    We report on electrical and charge collection tests of silicon sensors with internal gain as part of our development of ultra-fast silicon detectors. Using C–V and α TCT measurements, we investigate the non-uniform doping profile of so-called low-gain avalanche detectors (LGAD). These are n-on-p pad sensors with charge multiplication due to the presence of a thin, low-resistivity diffusion layer below the junction, obtained with a highly doped implant. We compare the bias dependence of the pulse shapes of traditional sensors and of LGAD sensors with different dopant density of the diffusion layer, and extract the internal gain

  20. Mathematical theories of distributed sensor networks

    CERN Document Server

    Iyengar, Sitharama S; Balakrishnan, N

    2014-01-01

    Mathematical Theory of Distributed Sensor Networks demonstrates how mathematical theories can be used to provide distributed sensor modeling and to solve important problems such as coverage hole detection and repair. The book introduces the mathematical and computational structure by discussing what they are, their applications and how they differ from traditional systems. The text also explains how mathematics are utilized to provide efficient techniques implementing effective coverage, deployment, transmission, data processing, signal processing, and data protection within distributed sensor networks. Finally, the authors discuss some important challenges facing mathematics to get more incite to the multidisciplinary area of distributed sensor networks.

  1. Healthier Traditional Food

    OpenAIRE

    Edward F. Millen

    2017-01-01

    The study of traditional food and healthy eating habits has been one of the fast growing areas. All humans, both men and women, require food for their survival. However, both men and women indulge in food as if it were their sole purpose of existence. Hence, eating disorders are common among men and women. Then media has played an effective role not only in establishing faulty standards for traditional healthy food but also it has highlighted the importance of healthy eating. It has brought t...

  2. Nanomaterials and Chemical Sensors

    Directory of Open Access Journals (Sweden)

    Sukumar BASU

    2011-11-01

    Full Text Available Nanomaterials and nanosensors are two most important iconic words of the modern science & Technology. Though nano technology is relatively a new area of research & development it will soon be included in the most modern electronic circuitry used for advanced computing systems. Since it will provide the potential link between the nanotechnology and the macroscopic world the development is primarily directed towards exploitation of nanotechnology to computer chip miniaturization and vast storage capacity. However, for implementation in the consumer products the present high cost of production must be overcome. There are different ways to make nanosensors e.g. top-down lithography, bottom-up assembly, and self molecular assembly. Consequently, nanomaterials & nanosensors have to be made compatible with the consumer technologies. The progress in detecting and sensing different chemical species with increased accuracy may transform the human society from uncertainty and inaccuracy to more precise and definite world of information. For example, extremely low concentrations of air pollutants or toxic materials in air & water around us can be accurately and economically detected in no time to save the human beings from the serious illnesses. Also, the medical sensors will help in diagnoses of the diseases, their treatment and in predicting the future profile of the individual so that the health insurance companies may exploit the opportunity to grant or to deny the health coverage. Other social issues like privacy invasion and security may be best monitored by the widespread use of the surveillance devices using nanosensors.

  3. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  4. The Theory of Exploitation as the Unequal Exchange of Labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2016-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  5. The theory of exploitation as the unequal exchange of labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2017-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  6. Low Power and High Sensitivity MOSFET-Based Pressure Sensor

    International Nuclear Information System (INIS)

    Zhang Zhao-Hua; Ren Tian-Ling; Zhang Yan-Hong; Han Rui-Rui; Liu Li-Tian

    2012-01-01

    Based on the metal-oxide-semiconductor field effect transistor (MOSFET) stress sensitive phenomenon, a low power MOSFET pressure sensor is proposed. Compared with the traditional piezoresistive pressure sensor, the present pressure sensor displays high performances on sensitivity and power consumption. The sensitivity of the MOSFET sensor is raised by 87%, meanwhile the power consumption is decreased by 20%. (cross-disciplinary physics and related areas of science and technology)

  7. Low-frequency characteristics extension for vibration sensors

    Institute of Scientific and Technical Information of China (English)

    杨学山; 高峰; 候兴民

    2004-01-01

    Traditional magneto-electric vibration sensors and servo accelerometers have severe shortcomings when used to measure vibration where low frequency components predominate. A low frequency characteristic extension for velocity vibration sensors is presented in this paper. The passive circuit technology, active compensation technology and the closedcycle pole compensation technology are used to extend the measurable range and to improve low frequency characteristics of sensors. Thses three types of low frequency velocity vibration sensors have been developed and widely adopted in China.

  8. Differential Sensor for PH Monitoring of Environmental Objects

    Directory of Open Access Journals (Sweden)

    Romanenko Sergey

    2016-01-01

    Full Text Available Differential pH sensor is proposed. Reference electrode and measuring electrode are the same type. Reference electrode is immersed in standard buffer solution with known pH value. The differential pH sensor has longer service life as compared with the traditionally used sensors with silver chloride reference electrode. Ultrasonic cleaning system is proposed to clean the primary measuring transducer from pollution that form as result of silting during long-term operation with the sensor.

  9. Total exploitation of an ornamental granite quarry

    Directory of Open Access Journals (Sweden)

    Taboada, J.

    2005-09-01

    Full Text Available In this paper we propose a methodology to estimate the recovery percentage for each of the products which can be obtained from the exploitation of an ornamental granite quarry: block, semiblock, masonry-transverse stone, and the smaller materials that can be used to obtain construction aggregates. This methodology ensures that quarry exploitation is exhaustive, thereby minimising the production of spoils and the consequent negative impact on the environment. The analysis is based on a detailed and exhaustive compilation of discontinuity data from the research fronts, which are then interpreted statistically and projected over the three weakness planes that are a particular feature of ornamental granite deposits. Using this information, and bearing in mind the minimum commercially viable sizes for each kind of granite, the corresponding recovery rates are calculated for each material in each plane. The results are then integrated using spatial techniques, and the result is an evaluation of quarry contents with a view to total exploitation. This methodology was applied to a quarry in the opening phase in order to carry out an a priori assessment of the economic feasibility of the quarry.

    En este trabajo se propone una metodología para estimar el porcentaje de recuperación de cada uno de los productos que se pueden obtener en la explotación de una cantera de granito ornamental: bloque, semibloque, manpostería y per piaños, y material restante destinado a la obtención de áridos. De esta manera se logra un aprovechamiento integral de la cantera, evitándose la generación de estériles y el subsiguiente impacto ambiental producido por éstos. La metodología de análisis se basa en la recopilación detallada y exhaustiva de datos de discontinuidades en los frentes de investigación, que se interpretan estadísticamente y se proyectan sobre los tres planos de debilidad propios del granito ornamental. Con esta información, y las

  10. Noodles, traditionally and today

    Directory of Open Access Journals (Sweden)

    Na Zhang

    2016-09-01

    Full Text Available Chinese noodles originated in the Han dynasty, which has more than 4,000 years of history. There are many stories about the origin of noodles. To a certain extent, noodles also reflect the cultural traditions and customs of China, which essentially means “human nature” and “worldly common sense”. There are thousands of varieties of noodles in China, according to the classification of the shape of noodles, seasoning gravy, cooking craft, and so on. Many noodles have local characteristics. Noodles are accepted by people from all over the world. The industrial revolution and the development of the food industry realized the transition from a traditional handicraft industry to mass production using machinery. In addition, the invention of instant noodles and their mass production also greatly changed the noodle industry. In essence, noodles are a kind of cereal food, which is the main body of the traditional Chinese diet. It is the main source of energy for Chinese people and the most economical energy food. Adhering to the principle of “making cereal food the main food”, is to maintain our Chinese good diet tradition, which can avoid the disadvantages of a high energy, high fat, and low carbohydrate diet, and promote health. The importance of the status of noodles in the dietary structure of residents in our country and the health impact should not be ignored.

  11. Traditional Cherokee Food.

    Science.gov (United States)

    Hendrix, Janey B.

    A collection for children and teachers of traditional Cherokee recipes emphasizes the art, rather than the science, of cooking. The hand-printed, illustrated format is designed to communicate the feeling of Cherokee history and culture and to encourage readers to collect and add family recipes. The cookbook could be used as a starting point for…

  12. Modern vs. Traditional.

    Science.gov (United States)

    Zhenhui, Rao

    1999-01-01

    This article discusses traditional methods, such as the grammar-translation, and modern methods, the communicative approach, for teaching English-as-a-foreign-language in China. The relationship between linguistic accuracy and communicative competence, student-centered orientation, and the role of the teacher are highlighted. (Author/VWL)

  13. Non-Traditional Wraps

    Science.gov (United States)

    Owens, Buffy

    2009-01-01

    This article presents a recipe for non-traditional wraps. In this article, the author describes how adults and children can help with the recipe and the skills involved with this recipe. The bigger role that children can play in the making of the item the more they are apt to try new things and appreciate the texture and taste.

  14. Making Tradition Healthy

    Centers for Disease Control (CDC) Podcasts

    2007-11-01

    In this podcast, a Latina nutrition educator shows how a community worked with local farmers to grow produce traditionally enjoyed by Hispanic/Latinos.  Created: 11/1/2007 by National Diabetes Education Program (NDEP), a joint program of the Centers for Disease Control and Prevention and the National Institutes of Health.   Date Released: 11/10/2007.

  15. Wireless sensor network

    Science.gov (United States)

    Perotti, Jose M.; Lucena, Angel R.; Mullenix, Pamela A.; Mata, Carlos T.

    2006-05-01

    Current and future requirements of aerospace sensors and transducers demand the design and development of a new family of sensing devices, with emphasis on reduced weight, power consumption, and physical size. This new generation of sensors and transducers will possess a certain degree of intelligence in order to provide the end user with critical data in a more efficient manner. Communication between networks of traditional or next-generation sensors can be accomplished by a Wireless Sensor Network (WSN) developed by NASA's Instrumentation Branch and ASRC Aerospace Corporation at Kennedy Space Center (KSC), consisting of at least one central station and several remote stations and their associated software. The central station is application-dependent and can be implemented on different computer hardware, including industrial, handheld, or PC-104 single-board computers, on a variety of operating systems: embedded Windows, Linux, VxWorks, etc. The central stations and remote stations share a similar radio frequency (RF) core module hardware that is modular in design. The main components of the remote stations are an RF core module, a sensor interface module, batteries, and a power management module. These modules are stackable, and a common bus provides the flexibility to stack other modules for additional memory, increased processing, etc. WSN can automatically reconfigure to an alternate frequency if interference is encountered during operation. In addition, the base station will autonomously search for a remote station that was perceived to be lost, using relay stations and alternate frequencies. Several wireless remote-station types were developed and tested in the laboratory to support different sensing technologies, such as resistive temperature devices, silicon diodes, strain gauges, pressure transducers, and hydrogen leak detectors.

  16. A Data-Gathering Scheme with Joint Routing and Compressive Sensing Based on Modified Diffusion Wavelets in Wireless Sensor Networks.

    Science.gov (United States)

    Gu, Xiangping; Zhou, Xiaofeng; Sun, Yanjing

    2018-02-28

    Compressive sensing (CS)-based data gathering is a promising method to reduce energy consumption in wireless sensor networks (WSNs). Traditional CS-based data-gathering approaches require a large number of sensor nodes to participate in each CS measurement task, resulting in high energy consumption, and do not guarantee load balance. In this paper, we propose a sparser analysis that depends on modified diffusion wavelets, which exploit sensor readings' spatial correlation in WSNs. In particular, a novel data-gathering scheme with joint routing and CS is presented. A modified ant colony algorithm is adopted, where next hop node selection takes a node's residual energy and path length into consideration simultaneously. Moreover, in order to speed up the coverage rate and avoid the local optimal of the algorithm, an improved pheromone impact factor is put forward. More importantly, theoretical proof is given that the equivalent sensing matrix generated can satisfy the restricted isometric property (RIP). The simulation results demonstrate that the modified diffusion wavelets' sparsity affects the sensor signal and has better reconstruction performance than DFT. Furthermore, our data gathering with joint routing and CS can dramatically reduce the energy consumption of WSNs, balance the load, and prolong the network lifetime in comparison to state-of-the-art CS-based methods.

  17. Challenging tradition in Nigeria.

    Science.gov (United States)

    Supriya, K E

    1991-01-01

    In Nigeria since 1987, the National Association of Nigeria Nurses and Midwives (NSNNM) has used traditional medial and traditional health care workers to curtail the practice of female circumcision. Other harmful traditions are being changed also, such as early marriage, taboos of pregnancy and childbirth, and scarification. 30,000 member of NANNM are involved in this effort to halt the harmful practices themselves and to change community opinion. The program involved national and state level workshops on harmful health consequences of traditional practices and instruction on how to conduct focus group discussions to assess women's beliefs and practices. The focus groups were found to be a particularly successful method of opening up discussion of taboo topics and expressing deep emotions. The response to the knowledge that circumcision was not necessary was rage and anger, which was channeled into advocacy roles or change in the practice. The result was the channeled into advocacy roles for change in the practice. The result was the development of books, leaflets and videos. One community group designed a dress with a decorative motif of tatoos and bodily cuts to symbolize circumcision and scarring. Plays and songs were written and performed. Artists provided models of female genitalia both before and after circumcision. The campaign has been successful in bringing this issue to the public attention in prominent ways, such a national television, health talk shows, and women;s magazines. One of the most important results of the effort has been the demonstration that culture and tradition can be changed from within, rather than from outside imposition of values and beliefs.

  18. Small battery operated unattended radar sensor for security systems

    Science.gov (United States)

    Plummer, Thomas J.; Brady, Stephen; Raines, Robert

    2013-06-01

    McQ has developed, tested, and is supplying to Unattended Ground Sensor (UGS) customers a new radar sensor. This radar sensor is designed for short range target detection and classification. The design emphasis was to have low power consumption, totally automated operation, a very high probability of detection coupled with a very low false alarm rate, be able to locate and track targets, and have a price compatible with the UGS market. The radar sensor complements traditional UGS sensors by providing solutions for scenarios that are difficult for UGS. The design of this radar sensor and the testing are presented in this paper.

  19. Environmental effects of geothermal energy exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, H [Japan Metals and Chemicals Co., Ltd., Japan

    1975-01-01

    The environmental effects of geothermal power generation which cause air and water pollution and destruction of natural areas are reviewed. The production of steam and hot water affect existing hot springs sources and can cause ground subsidence. Harmful gas can be released onto the atmosphere from fumarolic gas and hot springs. Hydrothermal geothermal fields occasionally contain harmful substances such as arsenic in the hot water. Serious environmental effects can result from geothermal exploitation activities such as the felling of trees for road construction, well drilling, and plant construction. Once geothermal power generation has begun, the release of H/sub 2/S into the atmosphere and the reinjection of hot water are conducted continuously and sufficient countermeasures can be taken. One problem is the effects of plant construction and operation on natural parks. It is important to reach a compromise between development and protection of natural senic areas. Two figures, two tables, and 13 references are provided.

  20. CHARACTERISTICS OF HYDROCARBON EXPLOITATION IN ARCTIC CIRCLE

    Directory of Open Access Journals (Sweden)

    Vanja Lež

    2013-12-01

    Full Text Available The existence of large quantities of hydrocarbons is supposed within the Arctic Circle. Assumed quantities are 25% of the total undiscovered hydrocarbon reserves on Earth, mostly natural gas. Over 500 major and minor gas accumulations within the Arctic Circle were discovered so far, but apart from Snøhvit gas field, there is no commercial exploitation of natural gas from these fields. Arctic gas projects are complicated, technically hard to accomplish, and pose a great threat to the return of investment, safety of people and equipment and for the ecosystem. Russia is a country that is closest to the realization of the Arctic gas projects that are based on the giant gas fields. The most extreme weather conditions in the seas around Greenland are the reason why this Arctic region is the least explored and furthest from the realization of any gas project (the paper is published in Croatian .

  1. Geometric saliency to characterize radar exploitation performance

    Science.gov (United States)

    Nolan, Adam; Keserich, Brad; Lingg, Andrew; Goley, Steve

    2014-06-01

    Based on the fundamental scattering mechanisms of facetized computer-aided design (CAD) models, we are able to define expected contributions (EC) to the radar signature. The net result of this analysis is the prediction of the salient aspects and contributing vehicle morphology based on the aspect. Although this approach does not provide the fidelity of an asymptotic electromagnetic (EM) simulation, it does provide very fast estimates of the unique scattering that can be consumed by a signature exploitation algorithm. The speed of this approach is particularly relevant when considering the high dimensionality of target configuration variability due to articulating parts which are computationally burdensome to predict. The key scattering phenomena considered in this work are the specular response from a single bounce interaction with surfaces and dihedral response formed between the ground plane and vehicle. Results of this analysis are demonstrated for a set of civilian target models.

  2. Exploitation and use of coal field gas

    Energy Technology Data Exchange (ETDEWEB)

    Wang, K; Li, Z; Sun, Q

    1982-04-25

    There are slightly more than 440 mine shafts in the world from which gas is pumped at the same time coal is being mined, the volume pumped being 3.125 billion cubic meters. All the countries of the world today widely use gas as a fuel and as a raw material for the chemical industry. In China 40 percent of the total number of mine shafts are high gas mine shafts. In China, gas is used largely as fuel by the people, to fire boilers, to make formaldehyde, and to make carbon ink. Prospects are good for the exploitation of mine shaft gas that is produced in association with coal. Mine shaft gas is a top quality energy source with an extraction life that is longer than coals. (DP)

  3. Summary of radiation protection in exploitation

    International Nuclear Information System (INIS)

    Garcier, Yves; Guers, Rene; Bidard, Francoise; Colson, Philippe; Gonin, Michele; Delabre, Herve; Hemidy, Pierre-Yves; Corgnet, Bruno; Perrin, Marie-Claire; Phan Hoang, Long; Abela, Gonzague; Crepieux, Virginie; Guyot, Pierre; Haranger, Didier; Warembourg, Philippe

    2004-01-01

    This document proposes a large and detailed overview of notions and practices regarding radiation protection in relationship with an NPP exploitation framework. It presents the main notions: matter structure, radioactivity, interactions between matter and radiations, types of ionizing radiation, magnitudes and measurement units, exposure modes, main principles of radiation protection, means of protection against internal and external exposures. The second part proposes an overview of the origin of radiological risks in a nuclear power plant. This origin can be found in fission products, activation products, actinides, designed protections, or circuit contaminations. These radiological risks are more precisely identified and described in terms of detection and prevention (internal exposure risk, contamination risk, iodine-related risk, alpha radiation-related risk, access to the reactor building). The next part addresses the medical and radiological follow-up of exposed workers by a special medical control, by an individual exposure control, by a specific control of female personnel, and by attention to exceptional exposures. Measurement means are presented (detection principles, installation continuous control, workspaces control, personnel contamination control, follow-up of individual dose) as well as collective and individual protection means. The management of radiation protection is addressed through a presentation of decision and management structures for radiation protection, and of EDF objectives and ambitions in this domain. The organization of radiation protection during exploitation is described: responsibilities for radiation protection in a nuclear power station, requirements for workers, preparation of interventions in controlled zone, work execution in controlled zone, zone controls and radiological cleanness of installations. The two last chapters address issues and practices of radiation protection in the case of deconstruction or dismantling, and

  4. Demystifying traditional herbal medicine with modern approach.

    Science.gov (United States)

    Li, Fu-Shuang; Weng, Jing-Ke

    2017-07-31

    Plants have long been recognized for their therapeutic properties. For centuries, indigenous cultures around the world have used traditional herbal medicine to treat a myriad of maladies. By contrast, the rise of the modern pharmaceutical industry in the past century has been based on exploiting individual active compounds with precise modes of action. This surge has yielded highly effective drugs that are widely used in the clinic, including many plant natural products and analogues derived from these products, but has fallen short of delivering effective cures for complex human diseases with complicated causes, such as cancer, diabetes, autoimmune disorders and degenerative diseases. While the plant kingdom continues to serve as an important source for chemical entities supporting drug discovery, the rich traditions of herbal medicine developed by trial and error on human subjects over thousands of years contain invaluable biomedical information just waiting to be uncovered using modern scientific approaches. Here we provide an evolutionary and historical perspective on why plants are of particular significance as medicines for humans. We highlight several plant natural products that are either in the clinic or currently under active research and clinical development, with particular emphasis on their mechanisms of action. Recent efforts in developing modern multi-herb prescriptions through rigorous molecular-level investigations and standardized clinical trials are also discussed. Emerging technologies, such as genomics and synthetic biology, are enabling new ways for discovering and utilizing the medicinal properties of plants. We are entering an exciting era where the ancient wisdom distilled into the world's traditional herbal medicines can be reinterpreted and exploited through the lens of modern science.

  5. Moving Target Information Exploitation Electronic Learning

    Science.gov (United States)

    2005-10-01

    Traditional - ISR WebTAS – eLearning ................................................................. 6 MTIX e- Learning Technical Requirements...than on a specific schedule, so learners can take the curriculum when needed and at their own pace . E- Learning is a form of instructional authoring...can save training expenses, because it can be used over and over again. E- Learning also allows the user to study at his or her own convenience

  6. Improving industrial yeast strains: exploiting natural and artificial diversity.

    Science.gov (United States)

    Steensels, Jan; Snoek, Tim; Meersman, Esther; Picca Nicolino, Martina; Voordeckers, Karin; Verstrepen, Kevin J

    2014-09-01

    Yeasts have been used for thousands of years to make fermented foods and beverages, such as beer, wine, sake, and bread. However, the choice for a particular yeast strain or species for a specific industrial application is often based on historical, rather than scientific grounds. Moreover, new biotechnological yeast applications, such as the production of second-generation biofuels, confront yeast with environments and challenges that differ from those encountered in traditional food fermentations. Together, this implies that there are interesting opportunities to isolate or generate yeast variants that perform better than the currently used strains. Here, we discuss the different strategies of strain selection and improvement available for both conventional and nonconventional yeasts. Exploiting the existing natural diversity and using techniques such as mutagenesis, protoplast fusion, breeding, genome shuffling and directed evolution to generate artificial diversity, or the use of genetic modification strategies to alter traits in a more targeted way, have led to the selection of superior industrial yeasts. Furthermore, recent technological advances allowed the development of high-throughput techniques, such as 'global transcription machinery engineering' (gTME), to induce genetic variation, providing a new source of yeast genetic diversity. © 2014 The Authors. FEMS Microbiology Reviews published by John Wiley & Sons Ltd on behalf of Federation of European Microbiological Societies.

  7. Exploitation of vegetables and fruits through lactic acid fermentation.

    Science.gov (United States)

    Di Cagno, Raffaella; Coda, Rossana; De Angelis, Maria; Gobbetti, Marco

    2013-02-01

    Lactic acid fermentation represents the easiest and the most suitable way for increasing the daily consumption of fresh-like vegetables and fruits. Literature data are accumulating, and this review aims at describing the main features of the lactic acid bacteria to be used for fermentation. Lactic acid bacteria are a small part of the autochthonous microbiota of vegetables and fruits. The diversity of the microbiota markedly depends on the intrinsic and extrinsic parameters of the plant matrix. Notwithstanding the reliable value of the spontaneous fermentation to stabilize and preserve raw vegetables and fruits, a number of factors are in favour of using selected starters. Two main options may be pursued for the controlled lactic acid fermentation of vegetables and fruits: the use of commercial/allochthonous and the use of autochthonous starters. Several evidences were described in favour of the use of selected autochthonous starters, which are tailored for the specific plant matrix. Pro-technological, sensory and nutritional criteria for selecting starters were reported as well as several functional properties, which were recently ascribed to autochthonous lactic acid bacteria. The main features of the protocols used for the manufacture of traditional, emerging and innovative fermented vegetables and fruits were reviewed. Tailored lactic acid bacteria starters completely exploit the potential of vegetables and fruits, which enhances the hygiene, sensory, nutritional and shelf life properties. Copyright © 2012 Elsevier Ltd. All rights reserved.

  8. Improving industrial yeast strains: exploiting natural and artificial diversity

    Science.gov (United States)

    Steensels, Jan; Snoek, Tim; Meersman, Esther; Nicolino, Martina Picca; Voordeckers, Karin; Verstrepen, Kevin J

    2014-01-01

    Yeasts have been used for thousands of years to make fermented foods and beverages, such as beer, wine, sake, and bread. However, the choice for a particular yeast strain or species for a specific industrial application is often based on historical, rather than scientific grounds. Moreover, new biotechnological yeast applications, such as the production of second-generation biofuels, confront yeast with environments and challenges that differ from those encountered in traditional food fermentations. Together, this implies that there are interesting opportunities to isolate or generate yeast variants that perform better than the currently used strains. Here, we discuss the different strategies of strain selection and improvement available for both conventional and nonconventional yeasts. Exploiting the existing natural diversity and using techniques such as mutagenesis, protoplast fusion, breeding, genome shuffling and directed evolution to generate artificial diversity, or the use of genetic modification strategies to alter traits in a more targeted way, have led to the selection of superior industrial yeasts. Furthermore, recent technological advances allowed the development of high-throughput techniques, such as ‘global transcription machinery engineering’ (gTME), to induce genetic variation, providing a new source of yeast genetic diversity. PMID:24724938

  9. Radiation sensor

    International Nuclear Information System (INIS)

    Brown, W.L.; Geronime, R.L.

    1977-01-01

    Radiation sensor and thermocouple, respectively, which can be used for reactor in-core instrumentation. The radiation sensor consists of an inconel conductor wire and rhodium emitter wire, the thermocouple of two intertwined alumel or chromel wires. Both are arranged in the center of a metal tube relative to which they are separated by an insulator made of SiO 2 fibers. This insulator is first introduced as a loose fabric between the radiation sensor and the thermocouple, respectively, and the metal tube and then compacted to a density of 35-73% of pure SiO 2 by drawing the tube. There is no need for soldering or welding. The insulation resistivity at room temperature ist between 10 14 and 10 15 ohms. (ORU) [de

  10. Water Sensors

    Science.gov (United States)

    1992-01-01

    Mike Morris, former Associate Director of STAC, formed pHish Doctor, Inc. to develop and sell a pH monitor for home aquariums. The monitor, or pHish Doctor, consists of a sensor strip and color chart that continually measures pH levels in an aquarium. This is important because when the level gets too high, ammonia excreted by fish is highly toxic; at low pH, bacteria that normally break down waste products stop functioning. Sales have run into the tens of thousands of dollars. A NASA Tech Brief Technical Support Package later led to a salt water version of the system and a DoE Small Business Innovation Research (SBIR) grant for development of a sensor for sea buoys. The company, now known as Ocean Optics, Inc., is currently studying the effects of carbon dioxide buildup as well as exploring other commercial applications for the fiber optic sensor.

  11. Eddy current probe development based on a magnetic sensor array

    International Nuclear Information System (INIS)

    Vacher, F.

    2007-06-01

    This research deals with in the study of the use of innovating magnetic sensors in eddy current non destructive inspection. The author reports an analysis survey of magnetic sensor performances. This survey enables the selection of magnetic sensor technologies used in non destructive inspection. He presents the state-of-the-art of eddy current probes exploiting the qualities of innovating magnetic sensors, and describes the methods enabling the use of these magnetic sensors in non destructive testing. Two main applications of innovating magnetic sensors are identified: the detection of very small defects by means of magneto-resistive sensors, and the detection of deep defects by means of giant magneto-impedances. Based on the use of modelling, optimization, signal processing tools, probes are manufactured for these both applications

  12. Sadum: Traditional and Contemporary

    Directory of Open Access Journals (Sweden)

    Ratna Panggabean

    2009-07-01

    Full Text Available Sadum is one of the traditional cloths of the Batak people in North Sumatra. It is woven on a back strap loom with supplementary weft technique. Sadum is a warp faced weaving made of cotton and beads woven into the cloth. Ritually it is used as a shoulder cloth, gifts exchanges, and in dances. It also bears the symbol of good tidings and blessings for the receiver. The cloth has change during times in technique, color, patterns, as well as in functions. But the use as a ritual cloth stays the same. The basic weaving techniques and equipments used to create it hasn’t change, but its material and added techniques has made this cloth become more rich in color, pattern, and texture. Most changes began when the Europeans came to Indonesia and introduced new material such as synthetic fibers and colors. In the 70s traditional cloth of Indonesia got its boost when the government declared batik as Indonesian national attire. This encourages other traditional weavings to develop into contemporary clothing. Later, new techniques and material were introduced to the Sadum weavings including embroidery, silk and golden threads which were never used before.

  13. Practical Use Technique of Sensor

    International Nuclear Information System (INIS)

    Hwang, Gyu Seop

    1985-11-01

    This book tells of practical use technology of sensor, introducing the recent trend of sensor for electronic industry, IC temperature sensor, radiation temperature sensor of surface acoustic wave, optical fiber temperature sensor, a polyelectrolyte film humidity sensor, semiconductor pressure sensor for industrial instrumentation, silicon integration pressure sensor, thick film humidity sensor and its application, photo sensor reflection type, and color sensor. It also deals with sensor for FA, sensor for a robot and sensor for the chemical industry.

  14. Practical Use Technique of Sensor

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, Gyu Seop

    1985-11-15

    This book tells of practical use technology of sensor, introducing the recent trend of sensor for electronic industry, IC temperature sensor, radiation temperature sensor of surface acoustic wave, optical fiber temperature sensor, a polyelectrolyte film humidity sensor, semiconductor pressure sensor for industrial instrumentation, silicon integration pressure sensor, thick film humidity sensor and its application, photo sensor reflection type, and color sensor. It also deals with sensor for FA, sensor for a robot and sensor for the chemical industry.

  15. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, E.

    2017-12-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (an EC Copernicus contributing mission) EO-data archive, the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers (e.g. the EC Copernicus Global Land Service) and end-users. The analysis of time series of data (PB range) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. New features are still developed, but the platform is yet fully operational since November 2016 and offers A time series viewer (browser web client and API), showing the evolution of Proba-V bands and derived vegetation parameters for any country, region, pixel or polygon defined by the user. Full-resolution viewing services for the complete data archive. On-demand processing chains on a powerfull Hadoop/Spark backend. Virtual Machines can be requested by users with access to the complete data archive mentioned above and pre-configured tools to work with this data, e.g. various toolboxes and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. Jupyter Notebooks is available with some examples python and R projects worked out to show the potential of the data. Today the platform is already used by several international third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. From the Proba-V MEP, access to other data sources such as Sentinel-2 and landsat data is also addressed. Selected components of the MEP are also deployed on public cloud infrastructures in various R&D projects. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to

  16. Mission Exploitation Platform PROBA-V

    Science.gov (United States)

    Goor, Erwin

    2016-04-01

    VITO and partners developed an end-to-end solution to drastically improve the exploitation of the PROBA-V EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data. From November 2015 an operational Mission Exploitation Platform (MEP) PROBA-V, as an ESA pathfinder project, will be gradually deployed at the VITO data center with direct access to the complete data archive. Several applications will be released to the users, e.g. - A time series viewer, showing the evolution of PROBA-V bands and derived vegetation parameters for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains e.g. for the calculation of N-daily composites. - A Virtual Machine will be provided with access to the data archive and tools to work with this data, e.g. various toolboxes and support for R and Python. After an initial release in January 2016, a research platform will gradually be deployed allowing users to design, debug and test applications on the platform. From the MEP PROBA-V, access to Sentinel-2 and landsat data will be addressed as well, e.g. to support the Cal/Val activities of the users. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to the complete data archive. To realise this, private cloud technology (openStack) is used and a distributed processing environment is built based on Hadoop. The Hadoop ecosystem offers a lot of technologies (Spark, Yarn, Accumulo, etc.) which we integrate with several open-source components. The impact of this MEP on the user community will be high and will completely change the way of working with the data and hence open the large time series to a larger

  17. Avoiding obstacles by using a proximity infrared sensor skin

    Institute of Scientific and Technical Information of China (English)

    Cao Zhengcai; Fu Yili; Wu Qidi; Wang Shuguo; Wang Guangguo

    2007-01-01

    Placement and wiring of vast amount of sensor elements on the 3-dimensionally configured robot surface to form soft sensor skin is very difficult with the traditional technology, hi this paper we propose a new method to realize such a skin. By implanting infrared sensors array in an elastic body, we obtain an elastic and tough sensor skin that can be shaped freely. The developed sensor skin is a large-area, flexible array of infrared sensors with data processing capabilities. Depending on the skin electronics, it endows its carrier with an ability to sense its surroundings. The structure, the method of infrared sensor signal processing, and basic experiments of sensor skin are presented. The validity of the infrared sensor skin is investigated by preliminary obstacle avoidance trial.

  18. Milk-based traditional Turkish desserts

    Directory of Open Access Journals (Sweden)

    Tulay Ozcan

    2009-12-01

    Full Text Available Traditional foods are the reflection of cultural inheritance and affect the lifestyle habits. Culture can be viewed as a system of socially transmitted patterns of behaviour that characterises a particular group. Despite the fact of globalisation, these are key elements to accurately estimate a population’s dietary patterns and how these have been shaped through time. In Turkey, a meal with family or friends traditionally ends with a dessert, which is a testimony to the hosts’ hospitality or to the housewife’s love and affection for her husband and children, since sweets and desserts are important elements of Turkish cuisine. However, the consciousnesses of nutrition and healthy eating, due to rapid change in popular life style and dietary patterns, has contributed to the increased interest in traditional foods with potential health benefits, with increased uncertainty for dessert consumption. Dairy desserts are extensively consumed due to their nutritive and sensoric characteristics. Some of traditional dairy desserts are Mustafakemalpasa, Gullac, Kazandibi, Hosmerim and Tavukgogsu, which are mainly made from milk or fresh cheese, and the current paper discusses their manufacturing processes and composition.

  19. Review of Small Commercial Sensors for Indicative Monitoring of Ambient Gas

    OpenAIRE

    ALEIXANDRE Manuel; GERBOLES Michel

    2012-01-01

    The traditional ambient gases monitor stations are expensive, big and of complex operation. So they are not suitable for a network of sensors that cover large areas. To cover large areas these traditional systems algorithms usually interpolates the measurements to calculate the gas concentrations in points far away of the physical sensors. Small commercial sensors represent a big opportunity for making sensor networks that monitor the ambient gases within large areas w...

  20. Making and exploiting fullerenes, graphene, and carbon nanotubes

    Energy Technology Data Exchange (ETDEWEB)

    Marcaccio, Massimo; Paolucci, Francesco (eds.) [Bologna Univ. (Italy). Dept. of Chemistry G. Ciamician

    2014-11-01

    This volume contains nine chapters which are presenting critical reviews of the present and future trends in modern chemistry research. The chapter ''Solubilization of Fullerenes, Carbon Nanotubes and Graphene'' by Alain Penicaud describes the various ingenious approaches to solve the solubility issue and describes in particular how graphite, and modern nanocarbons, can be made soluble by reductive dissolution. A large part of the present volume concerns the merging of nanocarbons with nanotechnology and their impact on technical development in many areas. Fullerenes, carbon nanotubes, nanodiamond and graphene find, for instance, various applications in the development of solar cells, including dye sensitized solar cells. The chapter ''Incorporation of Balls, Tubes and Bowls in Nanotechnology'' by James Mack describes the recent development of the area of fullerene fragments, and corannulene in particular, and their direct applications to organic light emitting diode (OLED) technology, while, in the chapter ''Exploiting Nanocarbons in Dye-Sensitized Solar Cells'' by Ladislav Kavan, the exploitation of nanocarbons in the development of novel dye sensitized solar cells with improved efficiency, durability and costs is thoroughly reviewed. The functionalization of CNSs has the invaluable advantage of combining their unique properties with those of other classes of materials. Supramolecular chemistry represents an elegant alternative approach for the construction of functional systems by means of noncovalent bonding interactions. In the chapter ''Supramolecular Chemistry of Carbon Nanotubes'' by Gildas Gavrel et al., the incredibly varied world of supramolecular, non-covalent functionalization of carbon nanotubes and their applications is examined and reviewed, and the synthetic strategies devised for fabricating mechanically-linked molecular architectures are described in the chapter &apos

  1. Making and exploiting fullerenes, graphene, and carbon nanotubes

    International Nuclear Information System (INIS)

    Marcaccio, Massimo; Paolucci, Francesco

    2014-01-01

    overview of the different types of fullerene-stoppered bistable rotaxanes, their switching mechanism and their potential applications. In the chapter ''Catalysis-Material Crosstalk at Tailored Nano-Carbon Interfaces'' by Michele Melchionna et al., carbon nanomaterials are described as supports for molecular and nanostructured catalysts, where their outstanding electronic and optical properties, high surface area and thermal and mechanical stability contribute to create a synergistic effect that leads to enhanced performance for a wide range of possible applications. Exploitation of nanocarbons in biology and biomedical applications has been increasingly proposed and, in particular, the chapter ''Carbon Nanotubes in Tissue Engineering'' by Susanna Bosi et al. explores applications of CNTs for tissue engineering purposes, where the tubes proved to be ideal materials for the growth and proliferation of many kind of tissues. The local chemical reactivity, the mechanical properties and the electron transfer in graphene membranes have been shown to be strongly affected by the fold-induced curvature; thus in the chapter ''Folds and Buckles at the Nanoscale: Experimental and Theoretical Investigation of the Bending Properties of Graphene Membranes'' by Vittorio Morandi, a novel methodology to investigate the mechanical properties of folded and wrinkled graphene crystals, which combine transmission electron microscopy mapping and theoretical modelling, is described. Graphene and nanocarbons in general are intensively investigated as platforms for the development of sensing devices for the selective and highly sensitive detection of biohazards. The aim of the chapter ''Graphene and Graphene Oxide Materials for Chemo- and Biosensing of Chemical and Biochemical Hazards'' by Piyush Sindhu Sharma et al. is then to bring out important advances of graphene-based sensors, with particular attention to the rapid detection and quantization of toxins, explosives, pesticides and pathogens.

  2. Chemical sensor

    Science.gov (United States)

    Rauh, R. David (Inventor)

    1990-01-01

    A sensor for detecting a chemical substance includes an insertion element having a structure which enables insertion of the chemical substance with a resulting change in the bulk electrical characteristics of the insertion element under conditions sufficient to permit effective insertion; the change in the bulk electrical characteristics of the insertion element is detected as an indication of the presence of the chemical substance.

  3. Load sensor

    NARCIS (Netherlands)

    Van den Ende, D.; Almeida, P.M.R.; Dingemans, T.J.; Van der Zwaag, S.

    2007-01-01

    The invention relates to a load sensor comprising a polymer matrix and a piezo-ceramic material such as PZT, em not bedded in the polymer matrix, which together form a compos not ite, wherein the polymer matrix is a liquid crystalline resin, and wherein the piezo-ceramic material is a PZT powder

  4. Gas sensor

    Science.gov (United States)

    Schmid, Andreas K.; Mascaraque, Arantzazu; Santos, Benito; de la Figuera, Juan

    2014-09-09

    A gas sensor is described which incorporates a sensor stack comprising a first film layer of a ferromagnetic material, a spacer layer, and a second film layer of the ferromagnetic material. The first film layer is fabricated so that it exhibits a dependence of its magnetic anisotropy direction on the presence of a gas, That is, the orientation of the easy axis of magnetization will flip from out-of-plane to in-plane when the gas to be detected is present in sufficient concentration. By monitoring the change in resistance of the sensor stack when the orientation of the first layer's magnetization changes, and correlating that change with temperature one can determine both the identity and relative concentration of the detected gas. In one embodiment the stack sensor comprises a top ferromagnetic layer two mono layers thick of cobalt deposited upon a spacer layer of ruthenium, which in turn has a second layer of cobalt disposed on its other side, this second cobalt layer in contact with a programmable heater chip.

  5. Relationship between exploitation, oscillation, MSY and extinction.

    Science.gov (United States)

    Ghosh, Bapan; Kar, T K; Legovic, T

    2014-10-01

    We give answers to two important problems arising in current fisheries: (i) how maximum sustainable yield (MSY) policy is influenced by the initial population level, and (ii) how harvesting, oscillation and MSY are related to each other in prey-predator systems. To examine the impact of initial population on exploitation, we analyze a single species model with strong Allee effect. It is found that even when the MSY exists, the dynamic solution may not converge to the equilibrium stock if the initial population level is higher but near the critical threshold level. In a prey-predator system with Allee effect in the prey species, the initial population does not have such important impact neither on MSY nor on maximum sustainable total yield (MSTY). However, harvesting the top predator may cause extinction of all species if odd number of trophic levels exist in the ecosystem. With regard to the second problem, we study two prey-predator models and establish that increasing harvesting effort either on prey, predator or both prey and predator destroys previously existing oscillation. Moreover, equilibrium stock both at MSY and MSTY level is stable. We also discuss the validity of found results to other prey-predator systems. Copyright © 2014 Elsevier Inc. All rights reserved.

  6. Exploiting Virtualization and Cloud Computing in ATLAS

    International Nuclear Information System (INIS)

    Harald Barreiro Megino, Fernando; Van der Ster, Daniel; Benjamin, Doug; De, Kaushik; Gable, Ian; Paterson, Michael; Taylor, Ryan; Hendrix, Val; Vitillo, Roberto A; Panitkin, Sergey; De Silva, Asoka; Walker, Rod

    2012-01-01

    The ATLAS Computing Model was designed around the concept of grid computing; since the start of data-taking, this model has proven very successful in the federated operation of more than one hundred Worldwide LHC Computing Grid (WLCG) sites for offline data distribution, storage, processing and analysis. However, new paradigms in computing, namely virtualization and cloud computing, present improved strategies for managing and provisioning IT resources that could allow ATLAS to more flexibly adapt and scale its storage and processing workloads on varied underlying resources. In particular, ATLAS is developing a “grid-of-clouds” infrastructure in order to utilize WLCG sites that make resources available via a cloud API. This work will present the current status of the Virtualization and Cloud Computing R and D project in ATLAS Distributed Computing. First, strategies for deploying PanDA queues on cloud sites will be discussed, including the introduction of a “cloud factory” for managing cloud VM instances. Next, performance results when running on virtualized/cloud resources at CERN LxCloud, StratusLab, and elsewhere will be presented. Finally, we will present the ATLAS strategies for exploiting cloud-based storage, including remote XROOTD access to input data, management of EC2-based files, and the deployment of cloud-resident LCG storage elements.

  7. Exploiting intrinsic fluctuations to identify model parameters.

    Science.gov (United States)

    Zimmer, Christoph; Sahle, Sven; Pahle, Jürgen

    2015-04-01

    Parameterisation of kinetic models plays a central role in computational systems biology. Besides the lack of experimental data of high enough quality, some of the biggest challenges here are identification issues. Model parameters can be structurally non-identifiable because of functional relationships. Noise in measured data is usually considered to be a nuisance for parameter estimation. However, it turns out that intrinsic fluctuations in particle numbers can make parameters identifiable that were previously non-identifiable. The authors present a method to identify model parameters that are structurally non-identifiable in a deterministic framework. The method takes time course recordings of biochemical systems in steady state or transient state as input. Often a functional relationship between parameters presents itself by a one-dimensional manifold in parameter space containing parameter sets of optimal goodness. Although the system's behaviour cannot be distinguished on this manifold in a deterministic framework it might be distinguishable in a stochastic modelling framework. Their method exploits this by using an objective function that includes a measure for fluctuations in particle numbers. They show on three example models, immigration-death, gene expression and Epo-EpoReceptor interaction, that this resolves the non-identifiability even in the case of measurement noise with known amplitude. The method is applied to partially observed recordings of biochemical systems with measurement noise. It is simple to implement and it is usually very fast to compute. This optimisation can be realised in a classical or Bayesian fashion.

  8. Fostering the Exploitation of Open Educational Resources

    Directory of Open Access Journals (Sweden)

    Thomas Richter

    2014-07-01

    Full Text Available The central concept behind Open Educational Resources (OER is opening up the access to educational resources for stakeholders who are not the usual target user group. This concept must be perceived as innovative because it describes a general economic and social paradigm shift: Education, which formerly was limited to a specific group of learners, now, is promoted as a public good. However, despite very good intentions, internationally agreed quality standards, and the availability of the required technological infrastructure, the critical threshold is not yet met. Due to several reasons, the usefulness of OER is often limited to the originally targeted context. Questions arise if the existing quality standards for Technology Enhanced Learning (TEL actually meet the specific requirements within the OER value chain, if the existing quality standards are applicable to OER in a meaningful way, and under which conditions related standards generally could support the exploitation of OER.We analyze quality standards for TEL and contrast the life cycle model of commercial learning resources against the life cycle model of OER. We investigate special demands on quality from the context of OER and, taking the former results into account, derive emergent quality criteria for OER. The paper concludes with recommendations for the design of OER and a future standard development.

  9. Exploiting Genetic Interference for Antiviral Therapy.

    Directory of Open Access Journals (Sweden)

    Elizabeth J Tanner

    2016-05-01

    Full Text Available Rapidly evolving viruses are a major threat to human health. Such viruses are often highly pathogenic (e.g., influenza virus, HIV, Ebola virus and routinely circumvent therapeutic intervention through mutational escape. Error-prone genome replication generates heterogeneous viral populations that rapidly adapt to new selection pressures, leading to resistance that emerges with treatment. However, population heterogeneity bears a cost: when multiple viral variants replicate within a cell, they can potentially interfere with each other, lowering viral fitness. This genetic interference can be exploited for antiviral strategies, either by taking advantage of a virus's inherent genetic diversity or through generating de novo interference by engineering a competing genome. Here, we discuss two such antiviral strategies, dominant drug targeting and therapeutic interfering particles. Both strategies harness the power of genetic interference to surmount two particularly vexing obstacles-the evolution of drug resistance and targeting therapy to high-risk populations-both of which impede treatment in resource-poor settings.

  10. Radiation protection in exploitation of uranium ores

    International Nuclear Information System (INIS)

    Pavlov, I.V.; Shalaev, I.L.

    1976-01-01

    The results are analyzed of the study of the radiation conditions in uranium mines, design and testing of protection means, improvement of methods and equipment for the dosimetric control in different countries since 1968 to 1975. There are outlined radiation hazards and their role in the formation of the radiation situation in mines, dispersive composition of aerosols of short-living daughter products of Rn(DPR) in the mine atmosphere. Among means of the radiation protection the following are dealt with: ventilation including the calculation of air requirements, design of ventilation systems, ventilation practices in working mines; lowering of the release of radon into the mine atmosphere by isolating non-exploited pits, application of gas-proof covers to cofferdams in faces of jointing zones, intensification of mining works in dangerous zones. Methods of air cleaning to remove Rn are suggested in brief. Apparatus are described for the individual control of the level of latent energy in the zone of miners' respiration: track dosimeters, thermoluminescent crystalls (TLC), photographic films, semiconductor systems and biophysical methods of the control for uranium mines. The efficient use of existing protection means provides the normal radiation situation in mines without significant additional investments

  11. Accelerating Large Data Analysis By Exploiting Regularities

    Science.gov (United States)

    Moran, Patrick J.; Ellsworth, David

    2003-01-01

    We present techniques for discovering and exploiting regularity in large curvilinear data sets. The data can be based on a single mesh or a mesh composed of multiple submeshes (also known as zones). Multi-zone data are typical to Computational Fluid Dynamics (CFD) simulations. Regularities include axis-aligned rectilinear and cylindrical meshes as well as cases where one zone is equivalent to a rigid-body transformation of another. Our algorithms can also discover rigid-body motion of meshes in time-series data. Next, we describe a data model where we can utilize the results from the discovery process in order to accelerate large data visualizations. Where possible, we replace general curvilinear zones with rectilinear or cylindrical zones. In rigid-body motion cases we replace a time-series of meshes with a transformed mesh object where a reference mesh is dynamically transformed based on a given time value in order to satisfy geometry requests, on demand. The data model enables us to make these substitutions and dynamic transformations transparently with respect to the visualization algorithms. We present results with large data sets where we combine our mesh replacement and transformation techniques with out-of-core paging in order to achieve significant speed-ups in analysis.

  12. Vehicle Fault Diagnose Based on Smart Sensor

    Science.gov (United States)

    Zhining, Li; Peng, Wang; Jianmin, Mei; Jianwei, Li; Fei, Teng

    In the vehicle's traditional fault diagnose system, we usually use a computer system with a A/D card and with many sensors connected to it. The disadvantage of this system is that these sensor can hardly be shared with control system and other systems, there are too many connect lines and the electro magnetic compatibility(EMC) will be affected. In this paper, smart speed sensor, smart acoustic press sensor, smart oil press sensor, smart acceleration sensor and smart order tracking sensor were designed to solve this problem. With the CAN BUS these smart sensors, fault diagnose computer and other computer could be connected together to establish a network system which can monitor and control the vehicle's diesel and other system without any duplicate sensor. The hard and soft ware of the smart sensor system was introduced, the oil press, vibration and acoustic signal are resampled by constant angle increment to eliminate the influence of the rotate speed. After the resample, the signal in every working cycle could be averaged in angle domain and do other analysis like order spectrum.

  13. Exploiting lipopolysaccharide-induced deformation of lipid bilayers to modify membrane composition and generate two-dimensional geometric membrane array patterns

    Energy Technology Data Exchange (ETDEWEB)

    Adams, Peter G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Swingle, Kirstie L. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Univ. of New Mexico, Albuquerque, NM (United States); Paxton, Walter F. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nogan, John J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Stromberg, Loreen R. [Univ. of New Mexico, Albuquerque, NM (United States); Firestone, Millicent A. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Mukundan, Harshini [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); New Mexico Consortium, Los Alamos, NM (United States); Montaño, Gabriel A. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-27

    Supported lipid bilayers have proven effective as model membranes for investigating biophysical processes and in development of sensor and array technologies. The ability to modify lipid bilayers after their formation and in situ could greatly advance membrane technologies, but is difficult via current state-of-the-art technologies. Here we demonstrate a novel method that allows the controlled post-formation processing and modification of complex supported lipid bilayer arrangements, under aqueous conditions. We exploit the destabilization effect of lipopolysaccharide, an amphiphilic biomolecule, interacting with lipid bilayers to generate voids that can be backfilled to introduce desired membrane components. We further demonstrate that when used in combination with a single, traditional soft lithography process, it is possible to generate hierarchically-organized membrane domains and microscale 2-D array patterns of domains. Significantly, this technique can be used to repeatedly modify membranes allowing iterative control over membrane composition. This approach expands our toolkit for functional membrane design, with potential applications for enhanced materials templating, biosensing and investigating lipid-membrane processes.

  14. Traditional sorghum beer "ikigage"

    OpenAIRE

    Lyumugabe Loshima, François

    2010-01-01

    Samples of traditional sorghum beer Ikigage was collected in the southern province of Rwanda and analyzed for microbiological and physico-chemical contents. Ikigage contained total aerobic mesophilic bacteria (33.55 x 106 cfu/ml), yeast (10.15 x 106 cfu/ml), lactic acid bacteria (35.35 x 104 cfu/ml), moulds (4.12 x 104 cfu/ml), E. coli (21.90 x 103 cfu/ml), fecal streptococci (22.50 x 103 cfu/ml), Staphylococcus aureus (16.02 x 103 cfu/ml), total coliform (32.30 x 103 cfu/ml), eth...

  15. In the Dirac tradition

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    1988-04-15

    It was Paul Dirac who cast quantum mechanics into the form we now use, and many generations of theoreticians openly acknowledge his influence on their thinking. When Dirac died in 1984, St. John's College, Cambridge, his base for most of his lifetime, instituted an annual lecture in his memory at Cambridge. The first lecture, in 1986, attracted two heavyweights - Richard Feynman and Steven Weinberg. Far from using the lectures as a platform for their own work, in the Dirac tradition they presented stimulating material on deep underlying questions.

  16. In the Dirac tradition

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    It was Paul Dirac who cast quantum mechanics into the form we now use, and many generations of theoreticians openly acknowledge his influence on their thinking. When Dirac died in 1984, St. John's College, Cambridge, his base for most of his lifetime, instituted an annual lecture in his memory at Cambridge. The first lecture, in 1986, attracted two heavyweights - Richard Feynman and Steven Weinberg. Far from using the lectures as a platform for their own work, in the Dirac tradition they presented stimulating material on deep underlying questions

  17. Main principles of developing exploitation models of semiconductor devices

    Science.gov (United States)

    Gradoboev, A. V.; Simonova, A. V.

    2018-05-01

    The paper represents primary tasks, solutions of which allow to develop the exploitation modes of semiconductor devices taking into account complex and combined influence of ionizing irradiation and operation factors. The structure of the exploitation model of the semiconductor device is presented, which is based on radiation and reliability models. Furthermore, it was shown that the exploitation model should take into account complex and combine influence of various ionizing irradiation types and operation factors. The algorithm of developing the exploitation model of the semiconductor devices is proposed. The possibility of creating the radiation model of Schottky barrier diode, Schottky field-effect transistor and Gunn diode is shown based on the available experimental data. The basic exploitation model of IR-LEDs based upon double AlGaAs heterostructures is represented. The practical application of the exploitation models will allow to output the electronic products with guaranteed operational properties.

  18. Transnational gestational surrogacy: does it have to be exploitative?

    Science.gov (United States)

    Kirby, Jeffrey

    2014-01-01

    This article explores the controversial practice of transnational gestational surrogacy and poses a provocative question: Does it have to be exploitative? Various existing models of exploitation are considered and a novel exploitation-evaluation heuristic is introduced to assist in the analysis of the potentially exploitative dimensions/elements of complex health-related practices. On the basis of application of the heuristic, I conclude that transnational gestational surrogacy, as currently practiced in low-income country settings (such as rural, western India), is exploitative of surrogate women. Arising out of consideration of the heuristic's exploitation conditions, a set of public education and enabled choice, enhanced protections, and empowerment reforms to transnational gestational surrogacy practice is proposed that, if incorporated into a national regulatory framework and actualized within a low income country, could possibly render such practice nonexploitative.

  19. Enhanced antibody recognition with a magneto-optic surface plasmon resonance (MO-SPR) sensor.

    Science.gov (United States)

    Manera, Maria Grazia; Ferreiro-Vila, Elías; Garcia-Martin, José Miguel; Garcia-Martin, Antonio; Rella, Roberto

    2014-08-15

    A comparison between sensing performance of traditional SPR (Surface Plasmon Resonance) and magneto-optic SPR (MOSPR) transducing techniques is presented in this work. MOSPR comes from an evolution of traditional SPR platform aiming at modulating Surface Plasmon wave by the application of an external magnetic field in transverse configuration. Previous work demonstrated that, when the Plasmon resonance is excited in these structures, the external magnetic field induces a modification of the coupling of the incident light with the Surface Plasmon Polaritons (SPP). Besides, these structures can lead to an enhancement in the magneto-optical (MO) activity when the SPP is excited. This phenomenon is exploited in this work to demonstrate the possibility to use the enhanced MO signal as proper transducer signal for investigating biomolecular interactions in liquid phase. To this purpose, the transducer surface was functionalized by thiol chemistry and used for recording the binding between Bovine Serum Albumin molecules immobilized onto the surface and its complementary target. Higher sensing performance in terms of sensitivity and lower limit of detection of the MOSPR biosensor with respect to traditional SPR sensors is demonstrated. Copyright © 2014 Elsevier B.V. All rights reserved.

  20. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, Erwin; Dries, Jeroen

    2017-04-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (a Copernicus contributing mission) EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. Furthermore data from the Copernicus Global Land Service is in scope of the platform. From November 2015 an operational Proba-V MEP environment, as an ESA operation service, is gradually deployed at the VITO data center with direct access to the complete data archive. Since autumn 2016 the platform is operational and yet several applications are released to the users, e.g. - A time series viewer, showing the evolution of Proba-V bands and derived vegetation parameters from the Copernicus Global Land Service for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains on a powerfull Hadoop/Spark backend e.g. for the calculation of N-daily composites. - Virtual Machines can be provided with access to the data archive and tools to work with this data, e.g. various toolboxes (GDAL, QGIS, GrassGIS, SNAP toolbox, …) and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. - A prototype of jupyter Notebooks is available with some examples worked out to show the potential of the data. Today the platform is used by several third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. In parallel the platform is further improved and extended. From the MEP PROBA-V, access to Sentinel-2 and landsat data will

  1. Research of Intelligent Turbidity Sensor

    OpenAIRE

    Licai Zhang; Yaoguang Wei; Yingyi Chen; Daoliang Li; Lihua Zeng

    2014-01-01

    Turbidity is an important index to evaluate the water quality. Turbidity can reflect the effects of insoluble substances that contain bait and seston on water. Traditional methods of turbidity detection are complicated, they have low efficiency and poor reliability. To solve the turbidity detection problem in aquaculture, an intelligent optical turbidity sensor which is based on scattering theory has been proposed in this paper. After analyzing the quality characteristics of aquaculture water...

  2. Exploiting Untapped Information Resources in Earth Science

    Science.gov (United States)

    Ramachandran, R.; Fox, P. A.; Kempler, S.; Maskey, M.

    2015-12-01

    One of the continuing challenges in any Earth science investigation is the amount of time and effort required for data preparation before analysis can begin. Current Earth science data and information systems have their own shortcomings. For example, the current data search systems are designed with the assumption that researchers find data primarily by metadata searches on instrument or geophysical keywords, assuming that users have sufficient knowledge of the domain vocabulary to be able to effectively utilize the search catalogs. These systems lack support for new or interdisciplinary researchers who may be unfamiliar with the domain vocabulary or the breadth of relevant data available. There is clearly a need to innovate and evolve current data and information systems in order to improve data discovery and exploration capabilities to substantially reduce the data preparation time and effort. We assert that Earth science metadata assets are dark resources, information resources that organizations collect, process, and store for regular business or operational activities but fail to utilize for other purposes. The challenge for any organization is to recognize, identify and effectively utilize the dark data stores in their institutional repositories to better serve their stakeholders. NASA Earth science metadata catalogs contain dark resources consisting of structured information, free form descriptions of data and pre-generated images. With the addition of emerging semantic technologies, such catalogs can be fully utilized beyond their original design intent of supporting current search functionality. In this presentation, we will describe our approach of exploiting these information resources to provide novel data discovery and exploration pathways to science and education communities

  3. Postural Hand Synergies during Environmental Constraint Exploitation

    Directory of Open Access Journals (Sweden)

    Cosimo Della Santina

    2017-08-01

    Full Text Available Humans are able to intuitively exploit the shape of an object and environmental constraints to achieve stable grasps and perform dexterous manipulations. In doing that, a vast range of kinematic strategies can be observed. However, in this work we formulate the hypothesis that such ability can be described in terms of a synergistic behavior in the generation of hand postures, i.e., using a reduced set of commonly used kinematic patterns. This is in analogy with previous studies showing the presence of such behavior in different tasks, such as grasping. We investigated this hypothesis in experiments performed by six subjects, who were asked to grasp objects from a flat surface. We quantitatively characterized hand posture behavior from a kinematic perspective, i.e., the hand joint angles, in both pre-shaping and during the interaction with the environment. To determine the role of tactile feedback, we repeated the same experiments but with subjects wearing a rigid shell on the fingertips to reduce cutaneous afferent inputs. Results show the persistence of at least two postural synergies in all the considered experimental conditions and phases. Tactile impairment does not alter significantly the first two synergies, and contact with the environment generates a change only for higher order Principal Components. A good match also arises between the first synergy found in our analysis and the first synergy of grasping as quantified by previous work. The present study is motivated by the interest of learning from the human example, extracting lessons that can be applied in robot design and control. Thus, we conclude with a discussion on implications for robotics of our findings.

  4. Exploiting core knowledge for visual object recognition.

    Science.gov (United States)

    Schurgin, Mark W; Flombaum, Jonathan I

    2017-03-01

    Humans recognize thousands of objects, and with relative tolerance to variable retinal inputs. The acquisition of this ability is not fully understood, and it remains an area in which artificial systems have yet to surpass people. We sought to investigate the memory process that supports object recognition. Specifically, we investigated the association of inputs that co-occur over short periods of time. We tested the hypothesis that human perception exploits expectations about object kinematics to limit the scope of association to inputs that are likely to have the same token as a source. In several experiments we exposed participants to images of objects, and we then tested recognition sensitivity. Using motion, we manipulated whether successive encounters with an image took place through kinematics that implied the same or a different token as the source of those encounters. Images were injected with noise, or shown at varying orientations, and we included 2 manipulations of motion kinematics. Across all experiments, memory performance was better for images that had been previously encountered with kinematics that implied a single token. A model-based analysis similarly showed greater memory strength when images were shown via kinematics that implied a single token. These results suggest that constraints from physics are built into the mechanisms that support memory about objects. Such constraints-often characterized as 'Core Knowledge'-are known to support perception and cognition broadly, even in young infants. But they have never been considered as a mechanism for memory with respect to recognition. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  5. Beneath Still Waters - Multistage Aquatic Exploitation of Euryale ferox (Salisb. during the Acheulian

    Directory of Open Access Journals (Sweden)

    Naama Goren-Inbar1

    2014-09-01

    Full Text Available Remains of the highly nutritious aquatic plant Fox nut – Euryale ferox Salisb. (Nymphaeaceae – were found at the Acheulian site of Gesher Benot Ya'aqov, Israel. Here, we present new evidence for complex cognitive strategies of hominins as seen in their exploitation of E. ferox nuts. We draw on excavated data and on parallels observed in traditional collecting and processing practices from Bihar, India. We suggest that during the early Middle Pleistocene, hominins implemented multistage procedures comprising underwater gathering and subsequent processing (drying, roasting and popping of E. ferox nuts. Hierarchical processing strategies are observed in the Acheulian lithic reduction sequences and butchering of game at this and other sites, but are poorly understood as regards the exploitation of aquatic plant resources. We highlight the ability of Acheulian hominins to resolve issues related to underwater gathering of E. ferox nuts during the plant's life cycle and to adopt strategies to enhance their nutritive value.

  6. Possibilities of collecting evidences about crime act of sexual exploitation in human beings

    Directory of Open Access Journals (Sweden)

    Mijalković Saša

    2006-01-01

    Full Text Available Collecting evidences about organized crime act of sexual exploitation in human begins often is very difficult because of high level of organization, secrecy ant precaution taken during committing prostitution, pornography, sex tourism and human trafficking. On the other side, high illegal profit enable criminals to engage "expensive" and experienced lawyers, whose often make values and reliability of collected evidences questionable, appealing to irregularities during police collecting procedure. Among traditional criminalities methods and proofing activities, in the study, modern tendencies in special investigative measures and techniques are considered. After that, there is pointing at specificity, meaning and value of material tracks and objects, which are essential for proofing crime act or perpetrator’s guiltiness. On the end, there is pointing at importance of victims’ cooperation in collecting evidences about their sexual exploitation.

  7. Thermal Property Engineering: Exploiting the Properties of Ceramic Nanocomposites

    Science.gov (United States)

    2018-03-01

    ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the Properties of Ceramic...return it to the originator. ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the...2015 – Dec 31 2017 4. TITLE AND SUBTITLE Thermal Property Engineering : Exploiting the Properties of Ceramic Nanocomposites 5a. CONTRACT NUMBER 5b

  8. Implementation synergies that exploit situational knowledge strategically

    DEFF Research Database (Denmark)

    Quitzau, Maj-Britt; Petersen, Jens-Phillip

    This paper illustrates how strategic and situated forms of knowledge may increase capacity to implement energy strategies in local urban development projects. Through analysis of front runner implementation projects, we show that the involved planners utilize situational learning processes...... strategically to develop more viable implementation trajectories. These findings resonate well with relational and network orienteered research in contemporary planning theory. In the selected case studies, we can see that planners deliberately seek to extend traditional planning approaches, like e.......g. regulation, with broader context‐specific learning processes. In doing so, we argue that – what we call – an implementation synergy is established by interlacing different forms of situational knowledge with strategic knowledge about how to reach a desired energy target. In conclusion, the paper identifies...

  9. Semiconductor sensors

    International Nuclear Information System (INIS)

    Hartmann, Frank

    2011-01-01

    Semiconductor sensors have been around since the 1950s and today, every high energy physics experiment has one in its repertoire. In Lepton as well as Hadron colliders, silicon vertex and tracking detectors led to the most amazing physics and will continue doing so in the future. This contribution tries to depict the history of these devices exemplarily without being able to honor all important developments and installations. The current understanding of radiation damage mechanisms and recent R and D topics demonstrating the future challenges and possible technical solutions for the SLHC detectors are presented. Consequently semiconductor sensor candidates for an LHC upgrade and a future linear collider are also briefly introduced. The work presented here is a collage of the work of many individual silicon experts spread over several collaborations across the world.

  10. Load sensor

    OpenAIRE

    Van den Ende, D.; Almeida, P.M.R.; Dingemans, T.J.; Van der Zwaag, S.

    2007-01-01

    The invention relates to a load sensor comprising a polymer matrix and a piezo-ceramic material such as PZT, em not bedded in the polymer matrix, which together form a compos not ite, wherein the polymer matrix is a liquid crystalline resin, and wherein the piezo-ceramic material is a PZT powder forming 30-60% by volume of the composite, and wherein the PZT powder forms 40-50% by volume of the composite.

  11. Image Sensor

    OpenAIRE

    Jerram, Paul; Stefanov, Konstantin

    2017-01-01

    An image sensor of the type for providing charge multiplication by impact ionisation has plurality of multiplication elements. Each element is arranged to receive charge from photosensitive elements of an image area and each element comprises a sequence of electrodes to move charge along a transport path. Each of the electrodes has an edge defining a boundary with a first electrode, a maximum width across the charge transport path and a leading edge that defines a boundary with a second elect...

  12. Optischer Sensor

    OpenAIRE

    Brandenburg, A.; Fischer, A.

    1995-01-01

    An optical sensor (1) comprising an integrated optical arrangement has a waveguide (4) and at least one defraction grating (5) arranged in this waveguide. Light can launched into the waveguide via the defraction grating. In the reflection area of defraction grating, part of the light is dispersed through the waveguide at the beam angle for which the launch conditions and thus the defraction in the waveguide are fulfilled, so that, at this angle, a dark line (14) occurs whose position is evalu...

  13. Gas sensor

    International Nuclear Information System (INIS)

    Dorogan, V.; Korotchenkov, Gh.; Vieru, T.; Prodan, I.

    2003-01-01

    The invention relates to the gas sensors on base of metal-oxide films (SnO, InO), which may be used for enviromental control, in the fireextinguishing systema etc. The gas includes an insulating substrate, an active layer, a resistive layer with ohmic contacts. The resistive layer has two or more regions with dofferent resistances , and on the active layer are two or more pairs of ohmic contacts

  14. An Energy-Efficient Approach to Enhance Virtual Sensors Provisioning in Sensor Clouds Environments.

    Science.gov (United States)

    Lemos, Marcus Vinícius de S; Filho, Raimir Holanda; Rabêlo, Ricardo de Andrade L; de Carvalho, Carlos Giovanni N; Mendes, Douglas Lopes de S; Costa, Valney da Gama

    2018-02-26

    Virtual sensors provisioning is a central issue for sensors cloud middleware since it is responsible for selecting physical nodes, usually from Wireless Sensor Networks (WSN) of different owners, to handle user's queries or applications. Recent works perform provisioning by clustering sensor nodes based on the correlation measurements and then selecting as few nodes as possible to preserve WSN energy. However, such works consider only homogeneous nodes (same set of sensors). Therefore, those works are not entirely appropriate for sensor clouds, which in most cases comprises heterogeneous sensor nodes. In this paper, we propose ACxSIMv2, an approach to enhance the provisioning task by considering heterogeneous environments. Two main algorithms form ACxSIMv2. The first one, ACASIMv1, creates multi-dimensional clusters of sensor nodes, taking into account the measurements correlations instead of the physical distance between nodes like most works on literature. Then, the second algorithm, ACOSIMv2, based on an Ant Colony Optimization system, selects an optimal set of sensors nodes from to respond user's queries while attending all parameters and preserving the overall energy consumption. Results from initial experiments show that the approach reduces significantly the sensor cloud energy consumption compared to traditional works, providing a solution to be considered in sensor cloud scenarios.

  15. Non-traditional inheritance

    International Nuclear Information System (INIS)

    Hall, J.G.

    1992-01-01

    In the last few years, several non-traditional forms of inheritance have been recognized. These include mosaicism, cytoplasmic inheritance, uniparental disomy, imprinting, amplification/anticipation, and somatic recombination. Genomic imprinting (GI) is the dependence of the phenotype on the sex of the transmitting parent. GI in humans seems to involve growth, behaviour, and survival in utero. The detailed mechanism of genomic imprinting is not known, but it seems that some process is involved in turning a gene off; this probably involves two genes, one of which produces a product that turns a gene off, and the gene that is itself turned off. The process of imprinting (turning off) may be associated with methylation. Erasure of imprinting can occur, and seems to be associated with meiosis. 10 refs

  16. Exploiting Laboratory and Heliophysics Plasma Synergies

    Directory of Open Access Journals (Sweden)

    Jill Dahlburg

    2010-05-01

    Full Text Available Recent advances in space-based heliospheric observations, laboratory experimentation, and plasma simulation codes are creating an exciting new cross-disciplinary opportunity for understanding fast energy release and transport mechanisms in heliophysics and laboratory plasma dynamics, which had not been previously accessible. This article provides an overview of some new observational, experimental, and computational assets, and discusses current and near-term activities towards exploitation of synergies involving those assets. This overview does not claim to be comprehensive, but instead covers mainly activities closely associated with the authors’ interests and reearch. Heliospheric observations reviewed include the Sun Earth Connection Coronal and Heliospheric Investigation (SECCHI on the National Aeronautics and Space Administration (NASA Solar Terrestrial Relations Observatory (STEREO mission, the first instrument to provide remote sensing imagery observations with spatial continuity extending from the Sun to the Earth, and the Extreme-ultraviolet Imaging Spectrometer (EIS on the Japanese Hinode spacecraft that is measuring spectroscopically physical parameters of the solar atmosphere towards obtaining plasma temperatures, densities, and mass motions. The Solar Dynamics Observatory (SDO and the upcoming Solar Orbiter with the Heliospheric Imager (SoloHI on-board will also be discussed. Laboratory plasma experiments surveyed include the line-tied magnetic reconnection experiments at University of Wisconsin (relevant to coronal heating magnetic flux tube observations and simulations, and a dynamo facility under construction there; the Space Plasma Simulation Chamber at the Naval Research Laboratory that currently produces plasmas scalable to ionospheric and magnetospheric conditions and in the future also will be suited to study the physics of the solar corona; the Versatile Toroidal Facility at the Massachusetts Institute of Technology that

  17. Simulated population responses of common carp to commercial exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Weber, Michael J.; Hennen, Matthew J.; Brown, Michael L.

    2011-12-01

    Common carp Cyprinus carpio is a widespread invasive species that can become highly abundant and impose deleterious ecosystem effects. Thus, aquatic resource managers are interested in controlling common carp populations. Control of invasive common carp populations is difficult, due in part to the inherent uncertainty of how populations respond to exploitation. To understand how common carp populations respond to exploitation, we evaluated common carp population dynamics (recruitment, growth, and mortality) in three natural lakes in eastern South Dakota. Common carp exhibited similar population dynamics across these three systems that were characterized by consistent recruitment (ages 3 to 15 years present), fast growth (K = 0.37 to 0.59), and low mortality (A = 1 to 7%). We then modeled the effects of commercial exploitation on size structure, abundance, and egg production to determine its utility as a management tool to control populations. All three populations responded similarly to exploitation simulations with a 575-mm length restriction, representing commercial gear selectivity. Simulated common carp size structure modestly declined (9 to 37%) in all simulations. Abundance of common carp declined dramatically (28 to 56%) at low levels of exploitation (0 to 20%) but exploitation >40% had little additive effect and populations were only reduced by 49 to 79% despite high exploitation (>90%). Maximum lifetime egg production was reduced from 77 to 89% at a moderate level of exploitation (40%), indicating the potential for recruitment overfishing. Exploitation further reduced common carp size structure, abundance, and egg production when simulations were not size selective. Our results provide insights to how common carp populations may respond to exploitation. Although commercial exploitation may be able to partially control populations, an integrated removal approach that removes all sizes of common carp has a greater chance of controlling population abundance

  18. Detection of sensor failures in nuclear plants using analytic redundancy

    International Nuclear Information System (INIS)

    Kitamura, M.

    1980-01-01

    A method for on-line, nonperturbative detection and identification of sensor failures in nuclear power plants was studied to determine its feasibility. This method is called analytic redundancy, or functional redundancy. Sensor failure has traditionally been detected by comparing multiple signals from redundant sensors, such as in two-out-of-three logic. In analytic redundancy, with the help of an assumed model of the physical system, the signals from a set of sensors are processed to reproduce the signals from all system sensors

  19. Exploiting for medical and biological applications

    Science.gov (United States)

    Giano, Michael C.

    Biotherapeutics are an emerging class of drug composed of molecules ranging in sizes from peptides to large proteins. Due to their poor stability and mucosal membrane permeability, biotherapeutics are administered by a parenteral method (i.e., syringe, intravenous or intramuscular). Therapeutics delivered systemically often experience short half-lives. While, local administration may involve invasive surgical procedures and suffer from poor retention at the site of application. To compensate, the patient receives frequent doses of highly concentrated therapeutic. Unfortunately, the off-target side effects and discomfort associated with multiple injections results in poor patient compliance. Therefore, new delivery methods which can improve therapeutic retention, reduce the frequency of administration and may aid in decreasing the off-target side effects is a necessity. Hydrogels are a class of biomaterials that are gaining interests for tissue engineering and drug delivery applications. Hydrogel materials are defined as porous, 3-dimensional networks that are primarily composed of water. Generally, they are mechanically rigid, cytocompatible and easily chemically functionalized. Collectively, these properties make hydrogels fantastic candidates to perform as drug delivery depots. Current hydrogel delivery systems physically entrap the target therapeutic which is then subsequently released over time at the site of administration. The swelling and degradation of the material effect the diffusion of the therapy from the hydrogel, and therefore should be controlled. Although these strategies provide some regulation over therapeutic release, full control of the delivery is not achieved. Newer approaches are focused on designing hydrogels that exploit known interactions, covalently attach the therapy or respond to an external stimulus in an effort to gain improved control over the therapy's release. Unfortunately, the biotherapeutic is typically required to be chemically

  20. Toward Optical Sensors: Review and Applications

    International Nuclear Information System (INIS)

    Sabri, Naseer; Aljunid, S A; Ahmad, R B; Salim, M S; Kamaruddin, R

    2013-01-01

    Recent advances in fiber optics (FOs) and the numerous advantages of light over electronic systems have boosted the utility and demand for optical sensors in various military, industry and social fields. Environmental and atmospheric monitoring, earth and space sciences, industrial chemical processing and biotechnology, law enforcement, digital imaging, scanning, and printing are exemplars of them. The ubiquity of photonic technologies could drive down prices which reduced the cost of optical fibers and lasers. Fiber optic sensors (FOSs) offer a wide spectrum of advantages over traditional sensing systems, such as small size and longer lifetime. Immunity to electromagnetic interference, amenability to multiplexing, and high sensitivity make FOs the sensor technology of choice in several fields, including the healthcare and aerospace sectors. FOSs show reliable and rigid sensing tasks over conventional electrical and electronic sensors. This paper presents an executive review of optical fiber sensors and the most beneficial applications.

  1. Toward Optical Sensors: Review and Applications

    Science.gov (United States)

    Sabri, Naseer; Aljunid, S. A.; Salim, M. S.; Ahmad, R. B.; Kamaruddin, R.

    2013-04-01

    Recent advances in fiber optics (FOs) and the numerous advantages of light over electronic systems have boosted the utility and demand for optical sensors in various military, industry and social fields. Environmental and atmospheric monitoring, earth and space sciences, industrial chemical processing and biotechnology, law enforcement, digital imaging, scanning, and printing are exemplars of them. The ubiquity of photonic technologies could drive down prices which reduced the cost of optical fibers and lasers. Fiber optic sensors (FOSs) offer a wide spectrum of advantages over traditional sensing systems, such as small size and longer lifetime. Immunity to electromagnetic interference, amenability to multiplexing, and high sensitivity make FOs the sensor technology of choice in several fields, including the healthcare and aerospace sectors. FOSs show reliable and rigid sensing tasks over conventional electrical and electronic sensors. This paper presents an executive review of optical fiber sensors and the most beneficial applications.

  2. Data-driven sensor placement from coherent fluid structures

    Science.gov (United States)

    Manohar, Krithika; Kaiser, Eurika; Brunton, Bingni W.; Kutz, J. Nathan; Brunton, Steven L.

    2017-11-01

    Optimal sensor placement is a central challenge in the prediction, estimation and control of fluid flows. We reinterpret sensor placement as optimizing discrete samples of coherent fluid structures for full state reconstruction. This permits a drastic reduction in the number of sensors required for faithful reconstruction, since complex fluid interactions can often be described by a small number of coherent structures. Our work optimizes point sensors using the pivoted matrix QR factorization to sample coherent structures directly computed from flow data. We apply this sampling technique in conjunction with various data-driven modal identification methods, including the proper orthogonal decomposition (POD) and dynamic mode decomposition (DMD). In contrast to POD-based sensors, DMD demonstrably enables the optimization of sensors for prediction in systems exhibiting multiple scales of dynamics. Finally, reconstruction accuracy from pivot sensors is shown to be competitive with sensors obtained using traditional computationally prohibitive optimization methods.

  3. Enhanced chemical weapon warning via sensor fusion

    Science.gov (United States)

    Flaherty, Michael; Pritchett, Daniel; Cothren, Brian; Schwaiger, James

    2011-05-01

    Torch Technologies Inc., is actively involved in chemical sensor networking and data fusion via multi-year efforts with Dugway Proving Ground (DPG) and the Defense Threat Reduction Agency (DTRA). The objective of these efforts is to develop innovative concepts and advanced algorithms that enhance our national Chemical Warfare (CW) test and warning capabilities via the fusion of traditional and non-traditional CW sensor data. Under Phase I, II, and III Small Business Innovative Research (SBIR) contracts with DPG, Torch developed the Advanced Chemical Release Evaluation System (ACRES) software to support non real-time CW sensor data fusion. Under Phase I and II SBIRs with DTRA in conjunction with the Edgewood Chemical Biological Center (ECBC), Torch is using the DPG ACRES CW sensor data fuser as a framework from which to develop the Cloud state Estimation in a Networked Sensor Environment (CENSE) data fusion system. Torch is currently developing CENSE to implement and test innovative real-time sensor network based data fusion concepts using CW and non-CW ancillary sensor data to improve CW warning and detection in tactical scenarios.

  4. Exploiting big data for critical care research.

    Science.gov (United States)

    Docherty, Annemarie B; Lone, Nazir I

    2015-10-01

    Over recent years the digitalization, collection and storage of vast quantities of data, in combination with advances in data science, has opened up a new era of big data. In this review, we define big data, identify examples of critical care research using big data, discuss the limitations and ethical concerns of using these large datasets and finally consider scope for future research. Big data refers to datasets whose size, complexity and dynamic nature are beyond the scope of traditional data collection and analysis methods. The potential benefits to critical care are significant, with faster progress in improving health and better value for money. Although not replacing clinical trials, big data can improve their design and advance the field of precision medicine. However, there are limitations to analysing big data using observational methods. In addition, there are ethical concerns regarding maintaining confidentiality of patients who contribute to these datasets. Big data have the potential to improve medical care and reduce costs, both by individualizing medicine, and bringing together multiple sources of data about individual patients. As big data become increasingly mainstream, it will be important to maintain public confidence by safeguarding data security, governance and confidentiality.

  5. Early Sexual Exploitation as an Influence in Prostitution.

    Science.gov (United States)

    Silbert, Mimi H.; Pines, Ayala M.

    1983-01-01

    Surveyed 200 female street prostitutes to determine whether they were sexually exploited during childhood. Results showed 60 percent of the subjects were sexually exploited. The few girls who discussed their abuse with others were met with shame and most often inaction. Only 10 percent were abused by strangers. (JAC)

  6. A Descriptive Study on Sexually Exploited Children in Residential Treatment

    Science.gov (United States)

    Twill, Sarah E.; Green, Denise M.; Traylor, Amy

    2010-01-01

    Sexual exploitation and prostitution of children and adolescents is a multibillion dollar industry in the United States (Estes and Weiner in "Medical, legal & social science aspects of child sexual exploitation: A comprehensive review of pornography, prostitution, and internet crimes, vol I," G.W. Medical Publishing, Inc, St Louis,…

  7. Exploiting opportunities at all cost? Entrepreneurial intent and externalities

    NARCIS (Netherlands)

    Urbig, D.; Weitzel, G.U.; Rosenkranz, S.; van Witteloostuijn, A.

    2011-01-01

    they exploit welfare-enhancing opportunities as it is assumed in several normative models? Do we need to prevent potential entrepreneurs from being destructive or are there intrinsic limits to harm others? We experimentally investigate how people with different entrepreneurial intent exploit risky

  8. Exploitation program of ''Adamow'' quarry up to 2015

    International Nuclear Information System (INIS)

    Hadlaw, A.

    1994-01-01

    The brown coal deposits exploited by the quarry ''Adamow'' located in Central Poland are shortly described and the prognosis of their exploitation up to 2015 is given. The basis data on the perspective deposits in the quarry's area are also presented. All deposits are shown on the map. 3 ills, 2 tabs

  9. Panel discussion on exploitation of geothermal resources in thermal zones

    Energy Technology Data Exchange (ETDEWEB)

    Viramonte, J G; Mange, J; Stefani, G

    1978-03-01

    The topics discussed include the major known geothermal resources, varying ways of exploiting geothermal resources, technical and economic difficulties in the exploitation, the place of geothermal energy in the total energy policy of a given country, advanced exploration techniques, and indications of needed areas of study. The panelists represented most of the South American countries, Mexico, and Italy. (JSR)

  10. Influence of Fabricating Process on Gas Sensing Properties of ZnO Nanofiber-Based Sensors

    International Nuclear Information System (INIS)

    Xu Lei; Wang Rui; Liu Yong; Dong Liang

    2011-01-01

    ZnO nanofibers are synthesized by an electrospinning method and characterized by x-ray diffraction (XRD) and scanning electron microscopy (SEM). Two types of gas sensors are fabricated by loading these nanofibers as the sensing materials and their performances are investigated in detail. Compared with the sensors based on traditional ceramic tubes with Au electrodes (traditional sensors), the sensors fabricated by spinning ZnO nanofibers on ceramic planes with Ag-Pd electrodes (plane sensors) exhibit much higher sensing properties. The sensitivity for the plane sensors is about 30 to 100 ppm ethanol at 300°C, while the value is only 13 for the traditional sensors. The response and recovery times are about 2 and 3s for the plane sensors and are 3 and 6s for the traditional sensors, respectively. Lower minimum-detection-limit is also found for the plane sensors. These improvements are explained by considering the morphological damage in the fabricating process for traditional sensors. The results suggest that the plane sensors are more suitable to sensing investigation for higher veracity. (general)

  11. Ambient and smartphone sensor assisted ADL recognition in multi-inhabitant smart environments.

    Science.gov (United States)

    Roy, Nirmalya; Misra, Archan; Cook, Diane

    2016-02-01

    Activity recognition in smart environments is an evolving research problem due to the advancement and proliferation of sensing, monitoring and actuation technologies to make it possible for large scale and real deployment. While activities in smart home are interleaved, complex and volatile; the number of inhabitants in the environment is also dynamic. A key challenge in designing robust smart home activity recognition approaches is to exploit the users' spatiotemporal behavior and location, focus on the availability of multitude of devices capable of providing different dimensions of information and fulfill the underpinning needs for scaling the system beyond a single user or a home environment. In this paper, we propose a hybrid approach for recognizing complex activities of daily living (ADL), that lie in between the two extremes of intensive use of body-worn sensors and the use of ambient sensors. Our approach harnesses the power of simple ambient sensors (e.g., motion sensors) to provide additional 'hidden' context (e.g., room-level location) of an individual, and then combines this context with smartphone-based sensing of micro-level postural/locomotive states. The major novelty is our focus on multi-inhabitant environments, where we show how the use of spatiotemporal constraints along with multitude of data sources can be used to significantly improve the accuracy and computational overhead of traditional activity recognition based approaches such as coupled-hidden Markov models. Experimental results on two separate smart home datasets demonstrate that this approach improves the accuracy of complex ADL classification by over 30 %, compared to pure smartphone-based solutions.

  12. Ambient and smartphone sensor assisted ADL recognition in multi-inhabitant smart environments

    Science.gov (United States)

    Misra, Archan; Cook, Diane

    2016-01-01

    Activity recognition in smart environments is an evolving research problem due to the advancement and proliferation of sensing, monitoring and actuation technologies to make it possible for large scale and real deployment. While activities in smart home are interleaved, complex and volatile; the number of inhabitants in the environment is also dynamic. A key challenge in designing robust smart home activity recognition approaches is to exploit the users' spatiotemporal behavior and location, focus on the availability of multitude of devices capable of providing different dimensions of information and fulfill the underpinning needs for scaling the system beyond a single user or a home environment. In this paper, we propose a hybrid approach for recognizing complex activities of daily living (ADL), that lie in between the two extremes of intensive use of body-worn sensors and the use of ambient sensors. Our approach harnesses the power of simple ambient sensors (e.g., motion sensors) to provide additional ‘hidden’ context (e.g., room-level location) of an individual, and then combines this context with smartphone-based sensing of micro-level postural/locomotive states. The major novelty is our focus on multi-inhabitant environments, where we show how the use of spatiotemporal constraints along with multitude of data sources can be used to significantly improve the accuracy and computational overhead of traditional activity recognition based approaches such as coupled-hidden Markov models. Experimental results on two separate smart home datasets demonstrate that this approach improves the accuracy of complex ADL classification by over 30 %, compared to pure smartphone-based solutions. PMID:27042240

  13. Tobacco industry misappropriation of American Indian culture and traditional tobacco.

    Science.gov (United States)

    D'Silva, Joanne; O'Gara, Erin; Villaluz, Nicole T

    2018-02-19

    Describe the extent to which tobacco industry marketing tactics incorporated American Indian culture and traditional tobacco. A keyword search of industry documents was conducted using document archives from the Truth Tobacco Documents Library. Tobacco industry documents (n=76) were analysed for themes. Tobacco industry marketing tactics have incorporated American Indian culture and traditional tobacco since at least the 1930s, with these tactics prominently highlighted during the 1990s with Natural American Spirit cigarettes. Documents revealed the use of American Indian imagery such as traditional headdresses and other cultural symbols in product branding and the portrayal of harmful stereotypes of Native people in advertising. The historical and cultural significance of traditional tobacco was used to validate commercially available tobacco. The tobacco industry has misappropriated culture and traditional tobacco by misrepresenting American Indian traditions, values and beliefs to market and sell their products for profit. Findings underscore the need for ongoing monitoring of tobacco industry marketing tactics directed at exploiting Native culture and counter-marketing tactics that raise awareness about the distinction between commercial and traditional tobacco use. Such efforts should be embedded within a culturally sensitive framework to reduce the burden of commercial tobacco use. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  14. [Ecotourism exploitation model in Bita Lake Natural Reserve of Yunnan].

    Science.gov (United States)

    Yang, G; Wang, Y; Zhong, L

    2000-12-01

    Bita lake provincial natural reserve is located in Shangri-La region of North-western Yunnan, and was set as a demonstrating area for ecotourism exploitation in 1998. After a year's exploitation construction and half a year's operation as a branch of the 99' Kunming International Horticulture Exposition to accept tourists, it was proved that the ecotourism demonstrating area attained four integrated functions of ecotourism, i.e., tourism, protection, poverty clearing and environment education. Five exploitation and management models including function zoned exploitation model, featured tourism communication model signs system designing model, local Tibetan family reception model and environmental monitoring model, were also successful, which were demonstrated and spreaded to the whole province. Bita lake provincial natural reserve could be a good sample for the ecotourism exploitation natural reserves of the whole country.

  15. An Overview of a Class of Clock Synchronization Algorithms for Wireless Sensor Networks: A Statistical Signal Processing Perspective

    Directory of Open Access Journals (Sweden)

    Xu Wang

    2015-08-01

    Full Text Available Recently, wireless sensor networks (WSNs have drawn great interest due to their outstanding monitoring and management potential in medical, environmental and industrial applications. Most of the applications that employ WSNs demand all of the sensor nodes to run on a common time scale, a requirement that highlights the importance of clock synchronization. The clock synchronization problem in WSNs is inherently related to parameter estimation. The accuracy of clock synchronization algorithms depends essentially on the statistical properties of the parameter estimation algorithms. Recently, studies dedicated to the estimation of synchronization parameters, such as clock offset and skew, have begun to emerge in the literature. The aim of this article is to provide an overview of the state-of-the-art clock synchronization algorithms for WSNs from a statistical signal processing point of view. This article focuses on describing the key features of the class of clock synchronization algorithms that exploit the traditional two-way message (signal exchange mechanism. Upon introducing the two-way message exchange mechanism, the main clock offset estimation algorithms for pairwise synchronization of sensor nodes are first reviewed, and their performance is compared. The class of fully-distributed clock offset estimation algorithms for network-wide synchronization is then surveyed. The paper concludes with a list of open research problems pertaining to clock synchronization of WSNs.

  16. An energy-efficient adaptive sampling scheme for wireless sensor networks

    NARCIS (Netherlands)

    Masoum, Alireza; Meratnia, Nirvana; Havinga, Paul J.M.

    2013-01-01

    Wireless sensor networks are new monitoring platforms. To cope with their resource constraints, in terms of energy and bandwidth, spatial and temporal correlation in sensor data can be exploited to find an optimal sampling strategy to reduce number of sampling nodes and/or sampling frequencies while

  17. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  18. Hydrogen sensor

    Science.gov (United States)

    Duan, Yixiang; Jia, Quanxi; Cao, Wenqing

    2010-11-23

    A hydrogen sensor for detecting/quantitating hydrogen and hydrogen isotopes includes a sampling line and a microplasma generator that excites hydrogen from a gas sample and produces light emission from excited hydrogen. A power supply provides power to the microplasma generator, and a spectrometer generates an emission spectrum from the light emission. A programmable computer is adapted for determining whether or not the gas sample includes hydrogen, and for quantitating the amount of hydrogen and/or hydrogen isotopes are present in the gas sample.

  19. Typical horticultural products between tradition and innovation

    Directory of Open Access Journals (Sweden)

    Innocenza Chessa

    Full Text Available Recent EU and National policies for agriculture and rural development are mainly focused to foster the production of high quality products as a result of the increasing demand of food safety, typical foods and traditional processing methods. Another word very often used to describe foods in these days is “typicality” which pools together the concepts of “food connected with a specific place”, “historical memory and tradition” and “culture”. The importance for the EU and the National administrations of the above mentioned kind of food is demonstrated, among other things, by the high number of the PDO, PGI and TSG certificated products in Italy. In this period of global markets and economical crisis farmers are realizing how “typical products” can be an opportunity to maintain their market share and to improve the economy of local areas. At the same time, new tools and strategy are needed to reach these goals. A lack of knowledge has being recognized also on how new technologies and results coming from recent research can help in exploiting traditional product and in maintaining the biodiversity. Taking into account the great variety and richness of typical products, landscapes and biodiversity, this report will describe and analyze the relationships among typicality, innovation and research in horticulture. At the beginning “typicality” and “innovation” will be defined also through some statistical features, which ranks Italy at the first place in terms of number of typical labelled products, then will be highlighted how typical products of high quality and connected with the tradition and culture of specific production areas are in a strict relationship with the value of agro-biodiversity. Several different examples will be used to explain different successful methods and/or strategies used to exploit and foster typical Italian vegetables, fruits and flowers. Finally, as a conclusion, since it is thought that

  20. Fiber Sensor Technology Today

    Science.gov (United States)

    Hotate, Kazuo

    2006-08-01

    Fiber sensor technologies are overviewed. Since the early 1970s, this field has been developed, on the basis of the same devices and photonic principles as fiber communication technologies. Besides simple configurations, in which the fiber acts only as a data transmission line, sophisticated configurations have also been developed, in which the fiber is used as a device to realize unique sensing mechanisms. The fiber optic gyroscope (FOG) is a good example, and has been developed as an absolute rotation sensor used, for example, for navigation and/or attitude control applications. Compared with traditional spinning-mass gyroscopes, the FOG has advantages, such as a short warming-up time, a light weight, and easy handling. A Japanese satellite, which was launched in August 2005 with a mission to observe the aurora, is controlled with a FOG. The FOG has also been used in consumer applications, such as the camera stabilizer, radio-controlled (RC) helicopter navigation, and the control of humanoid robots. Recently, distributed and multiplexed sensing schemes, in particular, have been studied and developed, in which a long fiber acts like a “nerve” for feeling the strain and/or the temperature distribution along the fiber. Performances of artificial nerve systems have markedly improved within the last couple of years, in spatial resolution and measurement speed. By embedding the “fiber-optic nerve system” in aircraft wings, bridges and tall buildings, these materials and structures can sense damage to prevent disasters.

  1. Traditional Medicine in Developing Countries

    DEFF Research Database (Denmark)

    Thorsen, Rikke Stamp

    or spiritual healer and self-treatment with herbal medicine or medicinal plants. Reliance on traditional medicine varies between countries and rural and urban areas, but is reported to be as high as 80% in some developing countries. Increased realization of the continued importance of traditional medicine has......People use traditional medicine to meet their health care needs in developing countries and medical pluralism persists worldwide despite increased access to allopathic medicine. Traditional medicine includes a variety of treatment opportunities, among others, consultation with a traditional healer...... led to the formulation of policies on the integration of traditional medicine into public health care. Local level integration is already taking place as people use multiple treatments when experiencing illness. Research on local level use of traditional medicine for health care, in particular the use...

  2. Photonics for aerospace sensors

    Science.gov (United States)

    Pellegrino, John; Adler, Eric D.; Filipov, Andree N.; Harrison, Lorna J.; van der Gracht, Joseph; Smith, Dale J.; Tayag, Tristan J.; Viveiros, Edward A.

    1992-11-01

    The maturation in the state-of-the-art of optical components is enabling increased applications for the technology. Most notable is the ever-expanding market for fiber optic data and communications links, familiar in both commercial and military markets. The inherent properties of optics and photonics, however, have suggested that components and processors may be designed that offer advantages over more commonly considered digital approaches for a variety of airborne sensor and signal processing applications. Various academic, industrial, and governmental research groups have been actively investigating and exploiting these properties of high bandwidth, large degree of parallelism in computation (e.g., processing in parallel over a two-dimensional field), and interconnectivity, and have succeeded in advancing the technology to the stage of systems demonstration. Such advantages as computational throughput and low operating power consumption are highly attractive for many computationally intensive problems. This review covers the key devices necessary for optical signal and image processors, some of the system application demonstration programs currently in progress, and active research directions for the implementation of next-generation architectures.

  3. Industrial wireless sensor networks applications, protocols, and standards

    CERN Document Server

    Güngör, V Çagri

    2013-01-01

    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  4. New Type Multielectrode Capacitance Sensor for Liquid Level

    Energy Technology Data Exchange (ETDEWEB)

    Zhao, Y R [China University of Petroleum (Huadong), Qingdao (China); Shi, A P [Shandong University of Science and Technology, Qingdao (China); Chen, G Q [Shandong University of Science and Technology, Qingdao (China); Chang, Y Y [Shandong University of Science and Technology, Qingdao (China); Hang, Z [Shandong University of Science and Technology, Qingdao (China); Liu, B M [Binzhou University, Binzhou (China)

    2006-10-15

    This paper introduces the design of a new type multielectrode capacitance sensor for liquid level. The system regards electric field sensor MC33794 as the core and applies microcontroller MC9S12DJ128 to realize intelligent liquid level monitoring system, which overcomes the disadvantages of the traditional capacitance sensor, improves on the anti-jamming ability and the measurement precision and simplifies the system structure. Finally, the paper sums up the design of the system.

  5. Drift Reduction in Pedestrian Navigation System by Exploiting Motion Constraints and Magnetic Field

    Directory of Open Access Journals (Sweden)

    Muhammad Ilyas

    2016-09-01

    Full Text Available Pedestrian navigation systems (PNS using foot-mounted MEMS inertial sensors use zero-velocity updates (ZUPTs to reduce drift in navigation solutions and estimate inertial sensor errors. However, it is well known that ZUPTs cannot reduce all errors, especially as heading error is not observable. Hence, the position estimates tend to drift and even cyclic ZUPTs are applied in updated steps of the Extended Kalman Filter (EKF. This urges the use of other motion constraints for pedestrian gait and any other valuable heading reduction information that is available. In this paper, we exploit two more motion constraints scenarios of pedestrian gait: (1 walking along straight paths; (2 standing still for a long time. It is observed that these motion constraints (called “virtual sensor”, though considerably reducing drift in PNS, still need an absolute heading reference. One common absolute heading estimation sensor is the magnetometer, which senses the Earth’s magnetic field and, hence, the true heading angle can be calculated. However, magnetometers are susceptible to magnetic distortions, especially in indoor environments. In this work, an algorithm, called magnetic anomaly detection (MAD and compensation is designed by incorporating only healthy magnetometer data in the EKF updating step, to reduce drift in zero-velocity updated INS. Experiments are conducted in GPS-denied and magnetically distorted environments to validate the proposed algorithms.

  6. Let's Exploit Available Knowledge on Vegetation Fluorescence

    Science.gov (United States)

    Magnani, Federico; Raddi, Sabrina; Mohammed, Gina; Middleton, Elizabeth M.

    2014-01-01

    . 2).We know, however, that the ratio is not constant, but changes widely in response to light, CO2, stomatal limitations, and extreme stress (4, 5). What’s more, we can make sense of such changes, thus extracting valuable information from the very scatter that is apparent in their data. However, this process will require the availability of more tailored instruments, such as the one planned for the FLEX mission. As already stressed by Guanter et al. (2), the spatial resolution of the Global Ozone Monitoring Experiment-2 sensor (40 × 80 km) makes it difficult to compare meaningfully the fluorescence signal with ground measurements, when only 60–70% of the footprint consists of the desired land-cover type (table S1 in ref. 2), suggesting that this could be largely responsible for the low signals observed in European grasslands. Moreover, the overpass time of the MetOp-A satellite (9:30 AM) implies that fluorescence is generally measured under light-limiting conditions, when fluorescence is only marginally affected by stomatal closure even under stress conditions. This result could explain the seasonal mismatch with daily GPP observed in natural ecosystems in the absence of irrigation (figure 4 in ref. 2). We hope, therefore, that this welcome contribution to this fast-advancing field will help demonstrate the potential of the new technique, and pave the way for more refined studies under both a technological and scientific point of view.

  7. Malfunctions in radioactivity sensors' networks

    Science.gov (United States)

    Khalipova, Veronika; Damart, Guillaume; Beauzamy, Bernard; Bruna, Giovanni

    2018-01-01

    The capacity to promptly and efficiently detect any source of contamination of the environment (a radioactive cloud) at a local and a country scale is mandatory to a safe and secure exploitation of civil nuclear energy. It must rely upon a robust network of measurement devices, to be optimized vs. several parameters, including the overall reliability, the investment, the operation and maintenance costs. We show that a network can be arranged in different ways, but many of them are inadequate. Through simulations, we test the efficiency of several configurations of sensors, in the same domain. The denser arrangement turns out to be the more efficient, but the efficiency is increased when sensors are non-uniformly distributed over the country, with accumulation at the borders. In the case of France, as radioactive threats are most likely to come from the East, the best solution is densifying the sensors close to the eastern border. Our approach differs from previous work because it is "failure oriented": we determine the laws of probability for all types of failures and deduce in this respect the best organization of the network.

  8. Malfunctions in radioactivity sensors' networks

    Directory of Open Access Journals (Sweden)

    Khalipova Veronika

    2018-01-01

    Full Text Available The capacity to promptly and efficiently detect any source of contamination of the environment (a radioactive cloud at a local and a country scale is mandatory to a safe and secure exploitation of civil nuclear energy. It must rely upon a robust network of measurement devices, to be optimized vs. several parameters, including the overall reliability, the investment, the operation and maintenance costs. We show that a network can be arranged in different ways, but many of them are inadequate. Through simulations, we test the efficiency of several configurations of sensors, in the same domain. The denser arrangement turns out to be the more efficient, but the efficiency is increased when sensors are non-uniformly distributed over the country, with accumulation at the borders. In the case of France, as radioactive threats are most likely to come from the East, the best solution is densifying the sensors close to the eastern border. Our approach differs from previous work because it is "failure oriented": we determine the laws of probability for all types of failures and deduce in this respect the best organization of the network.

  9. Security challenges for energy-harvesting wireless sensor networks

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Papini, Davide; Dragoni, Nicola

    2012-01-01

    With the recent introduction of Energy-Harvesting nodes, security is gaining more and more importance in sensor networks. By exploiting the ability of scavenging energy from the surrounding environment, the lifespan of a node has drastically increased. This is one of the reason why security needs...

  10. Self-Propagating Worms in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Giannetsos, Thanassis; Dimitriou, Tassos; Prasad, Neeli R.

    2009-01-01

    Malicious code is defined as software designed to execute attacks on software systems. This work demonstrates the possibility of executing malware on wireless sensor nodes that are based on the von Neumann architecture. This is achieved by exploiting a buffer overflow vulnerability to smash the c...

  11. Cluster-based service discovery for heterogeneous wireless sensor networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2007-01-01

    We propose an energy-efficient service discovery protocol for heterogeneous wireless sensor networks. Our solution exploits a cluster overlay, where the clusterhead nodes form a distributed service registry. A service lookup results in visiting only the clusterhead nodes. We aim for minimizing the

  12. Distributed estimation based on observations prediction in wireless sensor networks

    KAUST Repository

    Bouchoucha, Taha

    2015-03-19

    We consider wireless sensor networks (WSNs) used for distributed estimation of unknown parameters. Due to the limited bandwidth, sensor nodes quantize their noisy observations before transmission to a fusion center (FC) for the estimation process. In this letter, the correlation between observations is exploited to reduce the mean-square error (MSE) of the distributed estimation. Specifically, sensor nodes generate local predictions of their observations and then transmit the quantized prediction errors (innovations) to the FC rather than the quantized observations. The analytic and numerical results show that transmitting the innovations rather than the observations mitigates the effect of quantization noise and hence reduces the MSE. © 2015 IEEE.

  13. Sensors for Entertainment.

    Science.gov (United States)

    Lamberti, Fabrizio; Sanna, Andrea; Rokne, Jon

    2016-07-15

    Sensors are becoming ubiquitous in all areas of science, technology, and society. In this Special Issue on "Sensors for Entertainment", developments in progress and the current state of application scenarios for sensors in the field of entertainment is explored.

  14. Sensors for Entertainment

    OpenAIRE

    Fabrizio Lamberti; Andrea Sanna; Jon Rokne

    2016-01-01

    Sensors are becoming ubiquitous in all areas of science, technology, and society. In this Special Issue on ?Sensors for Entertainment?, developments in progress and the current state of application scenarios for sensors in the field of entertainment is explored.

  15. On Roof Geometry for Urban Wind Energy Exploitation in High-Rise Buildings

    Directory of Open Access Journals (Sweden)

    Francisco Toja-Silva

    2015-06-01

    Full Text Available The European program HORIZON2020 aims to have 20% of electricity produced by renewable sources. The building sector represents 40% of the European Union energy consumption. Reducing energy consumption in buildings is therefore a priority for energy efficiency. The present investigation explores the most adequate roof shapes compatible with the placement of different types of small wind energy generators on high-rise buildings for urban wind energy exploitation. The wind flow around traditional state-of-the-art roof shapes is considered. In addition, the influence of the roof edge on the wind flow on high-rise buildings is analyzed. These geometries are investigated, both qualitatively and quantitatively, and the turbulence intensity threshold for horizontal axis wind turbines is considered. The most adequate shapes for wind energy exploitation are identified, studying vertical profiles of velocity, turbulent kinetic energy and turbulence intensity. Curved shapes are the most interesting building roof shapes from the wind energy exploitation point of view, leading to the highest speed-up and the lowest turbulence intensity.

  16. The Hausa Lexicographic Tradition

    Directory of Open Access Journals (Sweden)

    Roxana Ma Newman

    2011-10-01

    Full Text Available

    Abstract: Hausa, a major language of West Africa, is one of the most widely studied languagesof Sub-Saharan Africa. It has a rich lexicographic tradition dating back some two centuries. Sincethe first major vocabulary published in 1843 up to the present time, almost 60 lexicographic works— dictionaries, vocabularies, glossaries — have been published, in a range of metalanguages, fromEnglish to Hausa itself. This article traces the historical development of the major studies accordingto their type and function as general reference works, specialized works, pedagogical works, andterminological works. For each work, there is a general discussion of its size, accuracy of the phonological,lexical, and grammatical information, and the adequacy of its definitions and illustrativematerial. A complete list of the lexicographic works is included.

    Keywords: ARABIC, BILINGUAL LEXICOGRAPHY, DIALECTAL VARIANTS, DICTIONARIES,ENGLISH, ETYMOLOGIES, FRENCH, GERMAN, GLOSSARIES, GRAMMATICALCATEGORIES, HAUSA, LANGUAGE LEARNING, LOANWORDS, NEOLOGISMS, NIGER,NIGERIA, ORTHOGRAPHY, PHONETIC TRANSCRIPTION, PHONOLOGY, RUSSIAN, STANDARDDIALECT, STANDARDIZATION, TERMINOLOGY, VOCABULARIES, WEST AFRICA.

    Opsomming: Die leksikografiese tradisie in Hausa. Hausa, 'n belangrike taal vanWes-Afrika, is een van die tale van Afrika suid van die Sahara wat die wydste bestudeer word. Dithet 'n ryk leksikografiese tradisie wat ongeveer twee eeue oud is. Van die eerste groot woordeboekwat in 1843 gepubliseer is tot die hede is ongeveer 60 leksikografiese werke — woordeboeke,naamlyste, woordelyste — gepubliseer in 'n reeks metatale van Engels tot Hausa self. Hierdie artikelgaan die historiese ontwikkeling van die groter studies aan die hand van hulle tipe en funksieas algemene naslaanwerke, gespesialiseerde werke, opvoedkundige werke, en terminologiesewerke na. Vir elke werk is daar 'n algemene bespreking oor sy grootte, akkuraatheid van die fonologiese,leksikale en

  17. Rationalising predictors of child sexual exploitation and sex-trading.

    Science.gov (United States)

    Klatt, Thimna; Cavner, Della; Egan, Vincent

    2014-02-01

    Although there is evidence for specific risk factors leading to child sexual exploitation and prostitution, these influences overlap and have rarely been examined concurrently. The present study examined case files for 175 young persons who attended a voluntary organization in Leicester, United Kingdom, which supports people who are sexually exploited or at risk of sexual exploitation. Based on the case files, the presence or absence of known risk factors for becoming a sex worker was coded. Data were analyzed using t-test, logistic regression, and smallest space analysis. Users of the voluntary organization's services who had been sexually exploited exhibited a significantly greater number of risk factors than service users who had not been victims of sexual exploitation. The logistic regression produced a significant model fit. However, of the 14 potential predictors--many of which were associated with each other--only four variables significantly predicted actual sexual exploitation: running away, poverty, drug and/or alcohol use, and having friends or family members in prostitution. Surprisingly, running away was found to significantly decrease the odds of becoming involved in sexual exploitation. Smallest space analysis of the data revealed 5 clusters of risk factors. Two of the clusters, which reflected a desperation and need construct and immature or out-of-control lifestyles, were significantly associated with sexual exploitation. Our research suggests that some risk factors (e.g. physical and emotional abuse, early delinquency, and homelessness) for becoming involved in sexual exploitation are common but are part of the problematic milieu of the individuals affected and not directly associated with sex trading itself. Our results also indicate that it is important to engage with the families and associates of young persons at risk of becoming (or remaining) a sex worker if one wants to reduce the numbers of persons who engage in this activity. Copyright

  18. Color Changing Hydrogen Sensors

    Science.gov (United States)

    Roberson, Luke B.; Williams, Martha; Captain, Janine E.; Mohajeri, Nahid; Raissi, Ali

    2015-01-01

    During the Space Shuttle Program, one of the most hazardous operation that occurred was the loading of liquid hydrogen (LH2) during fueling operations of the spacecraft. Due to hydrogen's low explosive limit, any amount leaked could lead to catastrophic event. Hydrogen's chemical properties make it ideal as a rocket fuel; however, the fuel is deemed unsafe for most commercial use because of the inability to easily detect the gas leaking. The increased use of hydrogen over traditional fossil fuels would reduce greenhouse gases and America's dependency on foreign oil. Therefore a technology that would improve safety at NASA and in the commercial sector while creating a new economic sector would have a huge impact to NASA's mission. The Chemochromic Detector for sensing hydrogen gas leakage is a color-changing detector that is useful in any application where it is important to know not only the presence but also the location of the hydrogen gas leak. This technology utilizes a chemochromicpigment and polymer matrix that can be molded or spun into rigid or pliable shapes useable in variable temperature environments including atmospheres of inert gas, hydrogen gas, or mixtures of gases. A change in color of the detector material indicates where gaseous hydrogen leaks are occurring. The irreversible sensor has a dramatic color change from beige to dark grey and remains dark grey after exposure. A reversible pigment changes from white to blue in the presence of hydrogen and reverts back to white in the presence of oxygen. Both versions of the sensor's pigments were comprised of a mixture of a metal oxide substrate and a hydro-chromic compound (i.e., the compound that changed color in the presence of hydrogen) and immediately notified the operator of the presence of low levels of hydrogen. The detector can be used in a variety of formats including paint, tape, caulking, injection molded parts, textiles and fabrics, composites, and films. This technology brings numerous

  19. Constrained State Estimation for Individual Localization in Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoxue Feng

    2014-11-01

    Full Text Available Wireless body sensor networks based on ultra-wideband radio have recently received much research attention due to its wide applications in health-care, security, sports and entertainment. Accurate localization is a fundamental problem to realize the development of effective location-aware applications above. In this paper the problem of constrained state estimation for individual localization in wireless body sensor networks is addressed. Priori knowledge about geometry among the on-body nodes as additional constraint is incorporated into the traditional filtering system. The analytical expression of state estimation with linear constraint to exploit the additional information is derived. Furthermore, for nonlinear constraint, first-order and second-order linearizations via Taylor series expansion are proposed to transform the nonlinear constraint to the linear case. Examples between the first-order and second-order nonlinear constrained filters based on interacting multiple model extended kalman filter (IMM-EKF show that the second-order solution for higher order nonlinearity as present in this paper outperforms the first-order solution, and constrained IMM-EKF obtains superior estimation than IMM-EKF without constraint. Another brownian motion individual localization example also illustrates the effectiveness of constrained nonlinear iterative least square (NILS, which gets better filtering performance than NILS without constraint.

  20. Constrained State Estimation for Individual Localization in Wireless Body Sensor Networks

    Science.gov (United States)

    Feng, Xiaoxue; Snoussi, Hichem; Liang, Yan; Jiao, Lianmeng

    2014-01-01

    Wireless body sensor networks based on ultra-wideband radio have recently received much research attention due to its wide applications in health-care, security, sports and entertainment. Accurate localization is a fundamental problem to realize the development of effective location-aware applications above. In this paper the problem of constrained state estimation for individual localization in wireless body sensor networks is addressed. Priori knowledge about geometry among the on-body nodes as additional constraint is incorporated into the traditional filtering system. The analytical expression of state estimation with linear constraint to exploit the additional information is derived. Furthermore, for nonlinear constraint, first-order and second-order linearizations via Taylor series expansion are proposed to transform the nonlinear constraint to the linear case. Examples between the first-order and second-order nonlinear constrained filters based on interacting multiple model extended kalman filter (IMM-EKF) show that the second-order solution for higher order nonlinearity as present in this paper outperforms the first-order solution, and constrained IMM-EKF obtains superior estimation than IMM-EKF without constraint. Another brownian motion individual localization example also illustrates the effectiveness of constrained nonlinear iterative least square (NILS), which gets better filtering performance than NILS without constraint. PMID:25390408

  1. Constrained state estimation for individual localization in wireless body sensor networks.

    Science.gov (United States)

    Feng, Xiaoxue; Snoussi, Hichem; Liang, Yan; Jiao, Lianmeng

    2014-11-10

    Wireless body sensor networks based on ultra-wideband radio have recently received much research attention due to its wide applications in health-care, security, sports and entertainment. Accurate localization is a fundamental problem to realize the development of effective location-aware applications above. In this paper the problem of constrained state estimation for individual localization in wireless body sensor networks is addressed. Priori knowledge about geometry among the on-body nodes as additional constraint is incorporated into the traditional filtering system. The analytical expression of state estimation with linear constraint to exploit the additional information is derived. Furthermore, for nonlinear constraint, first-order and second-order linearizations via Taylor series expansion are proposed to transform the nonlinear constraint to the linear case. Examples between the first-order and second-order nonlinear constrained filters based on interacting multiple model extended kalman filter (IMM-EKF) show that the second-order solution for higher order nonlinearity as present in this paper outperforms the first-order solution, and constrained IMM-EKF obtains superior estimation than IMM-EKF without constraint. Another brownian motion individual localization example also illustrates the effectiveness of constrained nonlinear iterative least square (NILS), which gets better filtering performance than NILS without constraint.

  2. Design and Tests of the Silicon Sensors for the ZEUS Micro Vertex Detector

    OpenAIRE

    Dannheim, D.; Koetz, U.; Coldewey, C.; Fretwurst, E.; Garfagnini, A.; Klanner, R.; Martens, J.; Koffeman, E.; Tiecke, H.; Carlin, R.

    2002-01-01

    To fully exploit the HERA-II upgrade,the ZEUS experiment has installed a Micro Vertex Detector (MVD) using n-type, single-sided, silicon micro-strip sensors with capacitive charge division. The sensors have a readout pitch of 120 micrometers, with five intermediate strips (20 micrometer strip pitch). The designs of the silicon sensors and of the test structures used to verify the technological parameters, are presented. Results on the electrical measurements are discussed. A total of 1123 sen...

  3. Exploitation of Semantic Building Model in Indoor Navigation Systems

    Science.gov (United States)

    Anjomshoaa, A.; Shayeganfar, F.; Tjoa, A. Min

    2009-04-01

    There are many types of indoor and outdoor navigation tools and methodologies available. A majority of these solutions are based on Global Positioning Systems (GPS) and instant video and image processing. These approaches are ideal for open world environments where very few information about the target location is available, but for large scale building environments such as hospitals, governmental offices, etc the end-user will need more detailed information about the surrounding context which is especially important in case of people with special needs. This paper presents a smart indoor navigation solution that is based on Semantic Web technologies and Building Information Model (BIM). The proposed solution is also aligned with Google Android's concepts to enlighten the realization of results. Keywords: IAI IFCXML, Building Information Model, Indoor Navigation, Semantic Web, Google Android, People with Special Needs 1 Introduction Built environment is a central factor in our daily life and a big portion of human life is spent inside buildings. Traditionally the buildings are documented using building maps and plans by utilization of IT tools such as computer-aided design (CAD) applications. Documenting the maps in an electronic way is already pervasive but CAD drawings do not suffice the requirements regarding effective building models that can be shared with other building-related applications such as indoor navigation systems. The navigation in built environment is not a new issue, however with the advances in emerging technologies like GPS, mobile and networked environments, and Semantic Web new solutions have been suggested to enrich the traditional building maps and convert them to smart information resources that can be reused in other applications and improve the interpretability with building inhabitants and building visitors. Other important issues that should be addressed in building navigation scenarios are location tagging and end-user communication

  4. Meaning, function and methods of the recultivation in mining exploitation

    OpenAIRE

    Dambov, Risto; Ljatifi, Ejup

    2015-01-01

    With the exploitation of mineral resources is performed degradation and deformation of the relief and the general part of surface of the Earth's crust. Depending on the type of open pit mine, this degradation can be expressed to a lesser or greater extent, and sometimes in several square kilometers. The exploitation of mineral resources is with unbreakable link with the environment. Very often it is said that mining is „enemy No. 1“ for environment. With exploitation comes to degradation of h...

  5. The possibilities of exploitation of Serbian thermomineral waters

    International Nuclear Information System (INIS)

    Jovanovic, L.

    2002-01-01

    Global ecological problem of petrol resources deficit caused an intensive search of alternative energy sources. Deficit of conventional energy fluids in Yugoslavia requires serious efforts to create a program of alternative energy sources exploitation. Geothermal energy represents an important energetic source for the countries with poor energy resources. Geothermal energy can become the basis for economic development. At present these geothermal resources are not being exploited in Yugoslavia. The possibilities of effective exploitation of thermal and thermomineral water resources in Yugoslavia are presented in this paper

  6. Imouraren mining exploitation : Complementary studies Synthetic report Volum B - Mines

    International Nuclear Information System (INIS)

    1980-01-01

    The object of the current study is to determine the main technical characteristics of the reference project of a mine that can supply the necessary ore quantity at a production of 3000 tonnes uranium per year, along 10 years. The project is one of the possible solutions for exploiting the mine. The current study permits to establish : investment and functioning cost estimation, overall project of the mining exploitation program, necessary strength estimation, average ore grades evaluation and variations of these grades, utilities needs, production vizing program, main exploitation methods and necessary materials. Reference project study of the mine serves as base to the economics studies and studies optimization [fr

  7. Sensors in Distributed Mixed Reality Environments

    Directory of Open Access Journals (Sweden)

    Felix Hamza-Lup

    2005-04-01

    Full Text Available A distributed mixed-reality (MR or virtual reality (VR environment implies the cooperative engagement of a set of software and hardware resources. With the advances in sensors and computer networks we have seen an increase in the number of potential MR/VR applications that require large amounts of information from the real world collected through sensors (e.g. position and orientation tracking sensors. These sensors collect data from the real environment in real-time at different locations and a distributed environment connecting them must assure data distribution among collaborative sites at interactive speeds. With the advances in sensor technology, we envision that in future systems a significant amount of data will be collected from sensors and devices attached to the participating nodes This paper proposes a new architecture for sensor based interactive distributed MR/VR environments that falls in-between the atomistic peer-to-peer model and the traditional client-server model. Each node is autonomous and fully manages its resources and connectivity. The dynamic behavior of the nodes is dictated by the human participants that manipulate the sensors attached to these nodes.

  8. Wireless sensor platform

    Science.gov (United States)

    Joshi, Pooran C.; Killough, Stephen M.; Kuruganti, Phani Teja

    2017-08-08

    A wireless sensor platform and methods of manufacture are provided. The platform involves providing a plurality of wireless sensors, where each of the sensors is fabricated on flexible substrates using printing techniques and low temperature curing. Each of the sensors can include planar sensor elements and planar antennas defined using the printing and curing. Further, each of the sensors can include a communications system configured to encode the data from the sensors into a spread spectrum code sequence that is transmitted to a central computer(s) for use in monitoring an area associated with the sensors.

  9. Collaborative communication protocols for wireless sensor networks

    NARCIS (Netherlands)

    Dulman, S.O.; van Hoesel, L.F.W.; Nieberg, T.; Havinga, Paul J.M.

    In this document, the design of communication within a wireless sensor network is discussed. The resource limitations of such a network, especially in terms of energy, require an integrated approach for all (traditional) layers of communication. We present such an integrated, collaborative approach

  10. Sherlockology and Galactica.tv: Fan sites as gifts or exploited labor?

    Directory of Open Access Journals (Sweden)

    Bertha Chin

    2014-03-01

    Full Text Available Current scholarship on fandom has been preoccupied with examining the changing relationship between media industry professionals and fans. Media producers, celebrities, and industry insiders are increasingly establishing contact with fans, bypassing traditional media entertainment outlets to provide them with information directly. This contact is facilitated by social media networks. Fans serve as grassroots campaigners, promoters, and sometimes even public relations officers, acting as liaisons between media producers, celebrities, or industry insiders and fandom in general. In doing so, they take on roles traditionally fulfilled by professional PR and marketing personnel, and they do it for free, resulting in accusations that they are being exploited for their labor. However, fans do not necessarily view themselves as being exploited. We need to consider the possibility that they may regard their contributions as a service—or gift—to fandom. In examining the roles played by two popular fan sites, Sherlockology and Galactica.tv, I propose to examine how fan labor may be considered an act of gift giving in fandom.

  11. Reception of the Istrian musical tradition(s

    Directory of Open Access Journals (Sweden)

    Marušić Dario

    2007-01-01

    Full Text Available The successive colonization of Istria with culturally differentiated populations, and peripheral position of the peninsula regarding both the Latin and Slav worlds, has conditioned interesting phenomena which defines the traditional life of the province. On the spiritual level it is primarily reflected in two cultural dimensions: the language and traditional music.

  12. Exploiting Data Sparsity In Covariance Matrix Computations on Heterogeneous Systems

    KAUST Repository

    Charara, Ali M.

    2018-05-24

    Covariance matrices are ubiquitous in computational sciences, typically describing the correlation of elements of large multivariate spatial data sets. For example, covari- ance matrices are employed in climate/weather modeling for the maximum likelihood estimation to improve prediction, as well as in computational ground-based astronomy to enhance the observed image quality by filtering out noise produced by the adap- tive optics instruments and atmospheric turbulence. The structure of these covariance matrices is dense, symmetric, positive-definite, and often data-sparse, therefore, hier- archically of low-rank. This thesis investigates the performance limit of dense matrix computations (e.g., Cholesky factorization) on covariance matrix problems as the number of unknowns grows, and in the context of the aforementioned applications. We employ recursive formulations of some of the basic linear algebra subroutines (BLAS) to accelerate the covariance matrix computation further, while reducing data traffic across the memory subsystems layers. However, dealing with large data sets (i.e., covariance matrices of billions in size) can rapidly become prohibitive in memory footprint and algorithmic complexity. Most importantly, this thesis investigates the tile low-rank data format (TLR), a new compressed data structure and layout, which is valuable in exploiting data sparsity by approximating the operator. The TLR com- pressed data structure allows approximating the original problem up to user-defined numerical accuracy. This comes at the expense of dealing with tasks with much lower arithmetic intensities than traditional dense computations. In fact, this thesis con- solidates the two trends of dense and data-sparse linear algebra for HPC. Not only does the thesis leverage recursive formulations for dense Cholesky-based matrix al- gorithms, but it also implements a novel TLR-Cholesky factorization using batched linear algebra operations to increase hardware occupancy and

  13. ATLAS Experiment Brochure - Chinese (Traditional)

    CERN Multimedia

    AUTHOR|(CDS)2081027

    2018-01-01

    ATLAS is one of the four major experiments at the Large Hadron Collider at CERN. It is a general-purpose particle physics experiment run by an international collaboration, and is designed to exploit the full discovery potential and the huge range of physics opportunities that the LHC provides.

  14. Conflicts Related to Natural Resources Exploitation: A Case Study of ...

    African Journals Online (AJOL)

    Conflicts Related to Natural Resources Exploitation: A Case Study of Oil Crisis in Nigeria's Niger Delta Region and its Socio-Political and Economic Implications. ... on the environment leading to pollution of land, rivers, creeks and waterways.

  15. Exploitation of unconventional protein sources in the feed of weaner ...

    African Journals Online (AJOL)

    Exploitation of unconventional protein sources in the feed of weaner rabbits ... as protein sources for feeding ruminants but rarely considered as feed for micro ... 26.88 g/100g DM in Centrosema pubescens and Moringa oleifera, respectively.

  16. Exploiting Formation Flying for Fuel Saving Supersonic Oblique Wing Aircraft

    Science.gov (United States)

    2007-07-01

    used and developed during recent wing / winglet / morphing design programmes (Refs.13-14). By exploiting this method, we have assessed the aerodynamics ...parameters, Propulsion Issues, Size Issues, Aero-elastic effects 15. SUBJECT TERMS EOARD, Control System, Aerodynamics 16...

  17. Human trafficking and exploitation: A global health concern.

    Science.gov (United States)

    Zimmerman, Cathy; Kiss, Ligia

    2017-11-01

    In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  18. Uncertainty avoidance and the exploration-exploitation trade-off

    NARCIS (Netherlands)

    Broekhuizen, Thijs; Giarratana, Marco S.; Torres, Anna

    2017-01-01

    Purpose - This study aims to investigate how a firm's uncertainty avoidance - as indicated by the headquarters' national culture - impacts firm performance by affecting exploratory (product innovation) and exploitative (brand trademark protection) activities. It aims to show that firms characterized

  19. Enhanced surrogate models for statistical design exploiting space mapping technology

    DEFF Research Database (Denmark)

    Koziel, Slawek; Bandler, John W.; Mohamed, Achmed S.

    2005-01-01

    We present advances in microwave and RF device modeling exploiting Space Mapping (SM) technology. We propose new SM modeling formulations utilizing input mappings, output mappings, frequency scaling and quadratic approximations. Our aim is to enhance circuit models for statistical analysis...

  20. Trajectories and cycles of sexual exploitation and trafficking for sexual exploitation of women in the Peruvian Amazon

    OpenAIRE

    Mujica, Jaris

    2015-01-01

    The commercial sexual exploitation is a constant activity in the Peruvian Amazon. Around the river port of Pucallpa in ucayali region, the practice appears systematically: teenage attend taverns around the port, and those dedicated to the work of cooking camps logging, are victims of constant exploitation and many also of trafficking. this article aims to reconstruct the path of life and reproductive cycle of the forms of exploitation in a sample of 20 women, and focuses on: (i) evidence of s...

  1. Optical Fiber Sensors Based on Nanoparticle-Embedded Coatings

    Directory of Open Access Journals (Sweden)

    Aitor Urrutia

    2015-01-01

    Full Text Available The use of nanoparticles (NPs in scientific applications has attracted the attention of many researchers in the last few years. The use of NPs can help researchers to tune the physical characteristics of the sensing coating (thickness, roughness, specific area, refractive index, etc. leading to enhanced sensors with response time or sensitivity better than traditional sensing coatings. Additionally, NPs also offer other special properties that depend on their nanometric size, and this is also a source of new sensing applications. This review focuses on the current status of research in the use of NPs within coatings in optical fiber sensing. Most used sensing principles in fiber optics are briefly described and classified into several groups: absorbance-based sensors, interferometric sensors, fluorescence-based sensors, fiber grating sensors, and resonance-based sensors, among others. For each sensor group, specific examples of the utilization of NP-embedded coatings in their sensing structure are reported.

  2. Escaping from the exploitation trap by shaping the digital future

    OpenAIRE

    Füzes, Péter; Gódor, Zoltán; Szabó, Zsolt Roland

    2017-01-01

    Even Fortune 500 firms can disappear quickly, because many of them falls into an exploitation trap. Examples show that certain organizations – that manifest ambidextrous features – can avoid the exploitation trap. But, how can they do it? Authors tracked the digital transformation of a Fortune 500 company in order to understand the strategic and organizational challenges and solutions to become resilient and prosperous. A cutting edge example is shown in the paper about how an industry leader...

  3. The concept of exploitation in international human trafficking law

    OpenAIRE

    von der Pütten, Tuija Kaarina

    2017-01-01

    Human trafficking is commonly known as a criminal practice that takes place in the framework of sex trade: women and children are trafficked within a state, or from one state to another, for the purpose of sexual exploitation. Similarly, the early 20th century international conventions aimed to tackle ‘white slave traffic’, trafficking of women and children for sexual exploitation. However, it is misleading to see trafficking only within this context. People are trafficked so that they can be...

  4. Passive (self-powered) fiber-optic sensors

    International Nuclear Information System (INIS)

    McElhaney, S.A.; Falter, D.D.; Todd, R.A.; Simpson, M.L.; Mihalczo, J.T.

    1992-01-01

    ORNL is developing new group of fiber-optic sensors for characterizing physical aspects such as ambient temperature. These sensors exploit the inherent property of thermographic materials that the lifetime and/or intensity of the emitted fluorescence decreases with increasing temperature. Unlike current fluorescent temperature sensors that use a light source for excitation, these sensors are totally passive (self-powered) and use either an embedded or external radiation source. A proof-of-principle temperature sensor was developed, based on this concept, using a well-known thermographic material, magnesium fluorogermanate. Experimental results showed that the radiation-induced fluorescence resulted in an intensity change but no significant decay rate change with increasing temperature

  5. Dual cameras acquisition and display system of retina-like sensor camera and rectangular sensor camera

    Science.gov (United States)

    Cao, Nan; Cao, Fengmei; Lin, Yabin; Bai, Tingzhu; Song, Shengyu

    2015-04-01

    For a new kind of retina-like senor camera and a traditional rectangular sensor camera, dual cameras acquisition and display system need to be built. We introduce the principle and the development of retina-like senor. Image coordinates transformation and interpolation based on sub-pixel interpolation need to be realized for our retina-like sensor's special pixels distribution. The hardware platform is composed of retina-like senor camera, rectangular sensor camera, image grabber and PC. Combined the MIL and OpenCV library, the software program is composed in VC++ on VS 2010. Experience results show that the system can realizes two cameras' acquisition and display.

  6. A modular optical sensor

    Science.gov (United States)

    Conklin, John Albert

    This dissertation presents the design of a modular, fiber-optic sensor and the results obtained from testing the modular sensor. The modular fiber-optic sensor is constructed in such manner that the sensor diaphragm can be replaced with different configurations to detect numerous physical phenomena. Additionally, different fiber-optic detection systems can be attached to the sensor. Initially, the modular sensor was developed to be used by university of students to investigate realistic optical sensors and detection systems to prepare for advance studies of micro-optical mechanical systems (MOMS). The design accomplishes this by doing two things. First, the design significantly lowers the costs associated with studying optical sensors by modularizing the sensor design. Second, the sensor broadens the number of physical phenomena that students can apply optical sensing techniques to in a fiber optics sensor course. The dissertation is divided into seven chapters covering the historical development of fiber-optic sensors, a theoretical overview of fiber-optic sensors, the design, fabrication, and the testing of the modular sensor developed in the course of this work. Chapter 1 discusses, in detail, how this dissertation is organized and states the purpose of the dissertation. Chapter 2 presents an historical overview of the development of optical fibers, optical pressure sensors, and fibers, optical pressure sensors, and optical microphones. Chapter 3 reviews the theory of multi-fiber optic detection systems, optical microphones, and pressure sensors. Chapter 4 presents the design details of the modular, optical sensor. Chapter 5 delves into how the modular sensor is fabricated and how the detection systems are constructed. Chapter 6 presents the data collected from the microphone and pressure sensor configurations of the modular sensor. Finally, Chapter 7 discusses the data collected and draws conclusions about the design based on the data collected. Chapter 7 also

  7. Micro packaged MEMS pressure sensor for intracranial pressure measurement

    International Nuclear Information System (INIS)

    Liu Xiong; Yao Yan; Ma Jiahao; Zhang Zhaohua; Zhang Yanhang; Wang Qian; Ren Tianling

    2015-01-01

    This paper presents a micro packaged MEMS pressure sensor for intracranial pressure measurement which belongs to BioMEMS. It can be used in lumbar puncture surgery to measure intracranial pressure. Miniaturization is key for lumbar puncture surgery because the sensor must be small enough to allow it be placed in the reagent chamber of the lumbar puncture needle. The size of the sensor is decided by the size of the sensor chip and package. Our sensor chip is based on silicon piezoresistive effect and the size is 400 × 400 μm 2 . It is much smaller than the reported polymer intracranial pressure sensors such as liquid crystal polymer sensors. In terms of package, the traditional dual in-line package obviously could not match the size need, the minimal size of recently reported MEMS-based intracranial pressure sensors after packaging is 10 × 10 mm 2 . In this work, we are the first to introduce a quad flat no-lead package as the package form of piezoresistive intracranial pressure sensors, the whole size of the sensor is minimized to only 3 × 3 mm 2 . Considering the liquid measurement environment, the sensor is gummed and waterproof performance is tested; the sensitivity of the sensor is 0.9 × 10 −2 mV/kPa. (paper)

  8. How 'Digital' is Traditional Crime?

    NARCIS (Netherlands)

    Montoya, L.; Junger, Marianne; Hartel, Pieter H.

    Measuring how much cybercrime exists is typically done by first defining cybercrime and then quantifying how many cases fit that definition. The drawback is that definitions vary across countries and many cybercrimes are recorded as traditional crimes. An alternative is to keep traditional

  9. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    OpenAIRE

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definit...

  10. Implementation of a compressive sampling scheme for wireless sensors to achieve energy efficiency in a structural health monitoring system

    Science.gov (United States)

    O'Connor, Sean M.; Lynch, Jerome P.; Gilbert, Anna C.

    2013-04-01

    Wireless sensors have emerged to offer low-cost sensors with impressive functionality (e.g., data acquisition, computing, and communication) and modular installations. Such advantages enable higher nodal densities than tethered systems resulting in increased spatial resolution of the monitoring system. However, high nodal density comes at a cost as huge amounts of data are generated, weighing heavy on power sources, transmission bandwidth, and data management requirements, often making data compression necessary. The traditional compression paradigm consists of high rate (>Nyquist) uniform sampling and storage of the entire target signal followed by some desired compression scheme prior to transmission. The recently proposed compressed sensing (CS) framework combines the acquisition and compression stage together, thus removing the need for storage and operation of the full target signal prior to transmission. The effectiveness of the CS approach hinges on the presence of a sparse representation of the target signal in a known basis, similarly exploited by several traditional compressive sensing applications today (e.g., imaging, MRI). Field implementations of CS schemes in wireless SHM systems have been challenging due to the lack of commercially available sensing units capable of sampling methods (e.g., random) consistent with the compressed sensing framework, often moving evaluation of CS techniques to simulation and post-processing. The research presented here describes implementation of a CS sampling scheme to the Narada wireless sensing node and the energy efficiencies observed in the deployed sensors. Of interest in this study is the compressibility of acceleration response signals collected from a multi-girder steel-concrete composite bridge. The study shows the benefit of CS in reducing data requirements while ensuring data analysis on compressed data remain accurate.

  11. Integrated cryogenic sensors

    International Nuclear Information System (INIS)

    Juanarena, D.B.; Rao, M.G.

    1991-01-01

    Integrated cryogenic pressure-temperature, level-temperature, and flow-temperature sensors have several advantages over the conventional single parameter sensors. Such integrated sensors were not available until recently. Pressure Systems, Inc. (PSI) of Hampton, Virginia, has introduced precalibrated precision cryogenic pressure sensors at the Los Angeles Cryogenic Engineering Conference in 1989. Recently, PSI has successfully completed the development of integrated pressure-temperature and level-temperature sensors for use in the temperature range 1.5-375K. In this paper, performance characteristics of these integrated sensors are presented. Further, the effects of irradiation and magnetic fields on these integrated sensors are also reviewed

  12. Rational Exploitation and Utilizing of Groundwater in Jiangsu Coastal Area

    Science.gov (United States)

    Kang, B.; Lin, X.

    2017-12-01

    Jiangsu coastal area is located in the southeast coast of China, where is a new industrial base and an important coastal and Land Resources Development Zone of China. In the areas with strong human exploitation activities, regional groundwater evolution is obviously affected by human activities. In order to solve the environmental geological problems caused by groundwater exploitation fundamentally, we must find out the forming conditions of regional groundwater hydrodynamic field, and the impact of human activities on groundwater hydrodynamic field evolution and hydrogeochemical evolition. Based on these results, scientific management and reasonable exploitation of the regional groundwater resources can be provided for the utilization. Taking the coastal area of Jiangsu as the research area, we investigate and analyze of the regional hydrogeological conditions. The numerical simulation model of groundwater flow was established according to the water power, chemical and isotopic methods, the conditions of water flow and the influence of hydrodynamic field on the water chemical field. We predict the evolution of regional groundwater dynamics under the influence of human activities and climate change and evaluate the influence of groundwater dynamic field evolution on the environmental geological problems caused by groundwater exploitation under various conditions. We get the following conclusions: Three groundwater exploitation optimal schemes were established. The groundwater salinization was taken as the primary control condition. The substitution model was proposed to model groundwater exploitation and water level changes by BP network method.Then genetic algorithm was used to solve the optimization solution. Three groundwater exploitation optimal schemes were submit to local water resource management. The first sheme was used to solve the groundwater salinization problem. The second sheme focused on dual water supply. The third sheme concerned on emergency water

  13. Comparison of Spatiotemporal Mapping Techniques for Enormous Etl and Exploitation Patterns

    Science.gov (United States)

    Deiotte, R.; La Valley, R.

    2017-10-01

    The need to extract, transform, and exploit enormous volumes of spatiotemporal data has exploded with the rise of social media, advanced military sensors, wearables, automotive tracking, etc. However, current methods of spatiotemporal encoding and exploitation simultaneously limit the use of that information and increase computing complexity. Current spatiotemporal encoding methods from Niemeyer and Usher rely on a Z-order space filling curve, a relative of Peano's 1890 space filling curve, for spatial hashing and interleaving temporal hashes to generate a spatiotemporal encoding. However, there exist other space-filling curves, and that provide different manifold coverings that could promote better hashing techniques for spatial data and have the potential to map spatiotemporal data without interleaving. The concatenation of Niemeyer's and Usher's techniques provide a highly efficient space-time index. However, other methods have advantages and disadvantages regarding computational cost, efficiency, and utility. This paper explores the several methods using a range of sizes of data sets from 1K to 10M observations and provides a comparison of the methods.

  14. Data Curation for the Exploitation of Large Earth Observation Products Databases - The MEA system

    Science.gov (United States)

    Mantovani, Simone; Natali, Stefano; Barboni, Damiano; Cavicchi, Mario; Della Vecchia, Andrea

    2014-05-01

    National Space Agencies under the umbrella of the European Space Agency are performing a strong activity to handle and provide solutions to Big Data and related knowledge (metadata, software tools and services) management and exploitation. The continuously increasing amount of long-term and of historic data in EO facilities in the form of online datasets and archives, the incoming satellite observation platforms that will generate an impressive amount of new data and the new EU approach on the data distribution policy make necessary to address technologies for the long-term management of these data sets, including their consolidation, preservation, distribution, continuation and curation across multiple missions. The management of long EO data time series of continuing or historic missions - with more than 20 years of data available already today - requires technical solutions and technologies which differ considerably from the ones exploited by existing systems. Several tools, both open source and commercial, are already providing technologies to handle data and metadata preparation, access and visualization via OGC standard interfaces. This study aims at describing the Multi-sensor Evolution Analysis (MEA) system and the Data Curation concept as approached and implemented within the ASIM and EarthServer projects, funded by the European Space Agency and the European Commission, respectively.

  15. COMPARISON OF SPATIOTEMPORAL MAPPING TECHNIQUES FOR ENORMOUS ETL AND EXPLOITATION PATTERNS

    Directory of Open Access Journals (Sweden)

    R. Deiotte

    2017-10-01

    Full Text Available The need to extract, transform, and exploit enormous volumes of spatiotemporal data has exploded with the rise of social media, advanced military sensors, wearables, automotive tracking, etc. However, current methods of spatiotemporal encoding and exploitation simultaneously limit the use of that information and increase computing complexity. Current spatiotemporal encoding methods from Niemeyer and Usher rely on a Z-order space filling curve, a relative of Peano’s 1890 space filling curve, for spatial hashing and interleaving temporal hashes to generate a spatiotemporal encoding. However, there exist other space-filling curves, and that provide different manifold coverings that could promote better hashing techniques for spatial data and have the potential to map spatiotemporal data without interleaving. The concatenation of Niemeyer’s and Usher’s techniques provide a highly efficient space-time index. However, other methods have advantages and disadvantages regarding computational cost, efficiency, and utility. This paper explores the several methods using a range of sizes of data sets from 1K to 10M observations and provides a comparison of the methods.

  16. Traditional access and forest management arrangements for beekeeping: the case of Southwest Ethiopia forest region

    NARCIS (Netherlands)

    Endalamaw, T.B.; Wiersum, K.F.

    2009-01-01

    Forest beekeeping is an ancient form of forest exploitation in south west Ethiopia. The practice has continued to the present with a gradual evolution in beekeeping technology and resource access and management arrangements. The aim of the present study is to study traditional forest management

  17. pH sensor based on boron nitride nanotubes.

    Science.gov (United States)

    Huang, Q; Bando, Y; Zhao, L; Zhi, C Y; Golberg, D

    2009-10-14

    A submicrometer-sized pH sensor based on biotin-fluorescein-functionalized multiwalled BN nanotubes with anchored Ag nanoparticles is designed. Intrinsic pH-dependent photoluminescence and Raman signals in attached fluorescein molecules enhanced by Ag nanoparticles allow this novel nanohybrid to perform as a practical pH sensor. It is able to work in a submicrometer-sized space. For example, the sensor may determine the environmental pH of sub-units in living cells where a traditional optical fiber sensor fails because of spatial limitations.

  18. pH sensor based on boron nitride nanotubes

    International Nuclear Information System (INIS)

    Huang, Q; Bando, Y; Zhao, L; Zhi, C Y; Golberg, D

    2009-01-01

    A submicrometer-sized pH sensor based on biotin-fluorescein-functionalized multiwalled BN nanotubes with anchored Ag nanoparticles is designed. Intrinsic pH-dependent photoluminescence and Raman signals in attached fluorescein molecules enhanced by Ag nanoparticles allow this novel nanohybrid to perform as a practical pH sensor. It is able to work in a submicrometer-sized space. For example, the sensor may determine the environmental pH of sub-units in living cells where a traditional optical fiber sensor fails because of spatial limitations.

  19. Investigation of the Performance of an Inductive Seawater Conductivity Sensor

    Directory of Open Access Journals (Sweden)

    WU Sheng

    2015-03-01

    Full Text Available As one of the factors in marine hydrographic survey, seawater salinity plays an important role in marine scientific research, marine exploitation and military defense. In practical measurement, the salinity is always presented indirectly by seawater conductivity value. Compared with the electrode conductivity sensors, inductive conductivity sensors have an advantage of anti-biofouling, and that is very interested in long term ocean observation device. From the principle point of view, this paper discus the different methods to improve inductive sensor output signal, which is confirmed by the relative experimental results. The basic working system of inductive sensor is described here as well as a calibration in standard seawater. From a wide range of temperature, measurement absolute error and stability are close to those of actual electrode conductivity sensors. Furthermore, in the 1000 meters deep sea experiment, our inductive sensor presents a perfect similarity of conductivity profile like sea- bird sensor, even for some small variations. The performance of our inductive sensor can compete with that of commercially available electrode conductivity sensors.

  20. Robust Forecasting for Energy Efficiency of Wireless Multimedia Sensor Networks.

    Science.gov (United States)

    Wang, Xue; Ma, Jun-Jie; Ding, Liang; Bi, Dao-Wei

    2007-11-15

    An important criterion of wireless sensor network is the energy efficiency inspecified applications. In this wireless multimedia sensor network, the observations arederived from acoustic sensors. Focused on the energy problem of target tracking, this paperproposes a robust forecasting method to enhance the energy efficiency of wirelessmultimedia sensor networks. Target motion information is acquired by acoustic sensornodes while a distributed network with honeycomb configuration is constructed. Thereby,target localization is performed by multiple sensor nodes collaboratively through acousticsignal processing. A novel method, combining autoregressive moving average (ARMA)model and radial basis function networks (RBFNs), is exploited to perform robust targetposition forecasting during target tracking. Then sensor nodes around the target areawakened according to the forecasted target position. With committee decision of sensornodes, target localization is performed in a distributed manner and the uncertainty ofdetection is reduced. Moreover, a sensor-to-observer routing approach of the honeycombmesh network is investigated to solve the data reporting considering the residual energy ofsensor nodes. Target localization and forecasting are implemented in experiments.Meanwhile, sensor node awakening and dynamic routing are evaluated. Experimentalresults verify that energy efficiency of wireless multimedia sensor network is enhanced bythe proposed target tracking method.

  1. Wearable sensors for human health monitoring

    Science.gov (United States)

    Asada, H. Harry; Reisner, Andrew

    2006-03-01

    Wearable sensors for continuous monitoring of vital signs for extended periods of weeks or months are expected to revolutionize healthcare services in the home and workplace as well as in hospitals and nursing homes. This invited paper describes recent research progress in wearable health monitoring technology and its clinical applications, with emphasis on blood pressure and circulatory monitoring. First, a finger ring-type wearable blood pressure sensor based on photo plethysmogram is presented. Technical issues, including motion artifact reduction, power saving, and wearability enhancement, will be addressed. Second, sensor fusion and sensor networking for integrating multiple sensors with diverse modalities will be discussed for comprehensive monitoring and diagnosis of health status. Unlike traditional snap-shot measurements, continuous monitoring with wearable sensors opens up the possibility to treat the physiological system as a dynamical process. This allows us to apply powerful system dynamics and control methodologies, such as adaptive filtering, single- and multi-channel system identification, active noise cancellation, and adaptive control, to the monitoring and treatment of highly complex physiological systems. A few clinical trials illustrate the potentials of the wearable sensor technology for future heath care services.

  2. Toward CMOS image sensor based glucose monitoring.

    Science.gov (United States)

    Devadhasan, Jasmine Pramila; Kim, Sanghyo

    2012-09-07

    Complementary metal oxide semiconductor (CMOS) image sensor is a powerful tool for biosensing applications. In this present study, CMOS image sensor has been exploited for detecting glucose levels by simple photon count variation with high sensitivity. Various concentrations of glucose (100 mg dL(-1) to 1000 mg dL(-1)) were added onto a simple poly-dimethylsiloxane (PDMS) chip and the oxidation of glucose was catalyzed with the aid of an enzymatic reaction. Oxidized glucose produces a brown color with the help of chromogen during enzymatic reaction and the color density varies with the glucose concentration. Photons pass through the PDMS chip with varying color density and hit the sensor surface. Photon count was recognized by CMOS image sensor depending on the color density with respect to the glucose concentration and it was converted into digital form. By correlating the obtained digital results with glucose concentration it is possible to measure a wide range of blood glucose levels with great linearity based on CMOS image sensor and therefore this technique will promote a convenient point-of-care diagnosis.

  3. Unveiling Cebuano Traditional Healing Practices

    Directory of Open Access Journals (Sweden)

    ZachiaRaiza Joy S. Berdon

    2016-02-01

    Full Text Available This study aims to identify the features of Cebuano’s traditional healing practices. Specifically, it also answers the following objectives: analyze traditional healing in Cebuano’s perspectives, explain the traditional healing process practiced in terms of the traditional healers’ belief, and extrapolate perceptions of medical practitioners toward traditional healing. This study made use of qualitative approach, among five traditional healers who performed healing for not less than ten years, in the mountain barangays of Cebu City. These healers served as the primary informants who were selected because of their popularity in healing. The use of open-ended interview in local dialect and naturalistic observation provided a free listing of their verbatim accounts were noted and as primary narratives. Participation in the study was voluntary and participants were interviewed privately after obtaining their consent. The Cebuano traditional healing practices or “panambal” comprise the use of “himolso” (pulse-checking, “palakaw” (petition, “pasubay” (determining what causes the sickness and its possible means of healing, “pangalap” (searching of medicinal plants for “palina” (fumigation, “tayhop” (gentle-blowing, “tutho” (saliva-blowing,“tuob” (boiling, “orasyon” (mystical prayers, “hilot” (massage, and “barang” (sorcery. Though traditional with medical science disapproval, it contributes to a mystical identity of Cebuano healers, as a manifestation of folk Catholicism belief, in order to do a good legacy to the community that needs help. For further study, researchers may conduct further the studies on the: curative effects of medicinal plants in Cebu, psychological effect pulsechecking healed persons by the mananambal, and unmasking the other features of traditional healing.

  4. Aurorae in Australian Aboriginal Traditions

    Science.gov (United States)

    Hamacher, Duane W.

    2013-07-01

    Transient celestial phenomena feature prominently in the astronomical knowledge and traditions of Aboriginal Australians. In this paper, I collect accounts of the Aurora Australis from the literature regarding Aboriginal culture. Using previous studies of meteors, eclipses, and comets in Aboriginal traditions, I anticipate that the physical properties of aurora, such as their generally red colour as seen from southern Australia, will be associated with fire, death, blood, and evil spirits. The survey reveals this to be the case and also explores historical auroral events in Aboriginal cultures, aurorae in rock art, and briefly compares Aboriginal auroral traditions with other global indigenous groups, including the Maori of New Zealand.

  5. Exploitation and Utilization of Oilfield Geothermal Resources in China

    Directory of Open Access Journals (Sweden)

    Shejiao Wang

    2016-09-01

    Full Text Available Geothermal energy is a clean, green renewable resource, which can be utilized for power generation, heating, cooling, and could effectively replace oil, gas, and coal. In recent years, oil companies have put more efforts into exploiting and utilizing geothermal energy with advanced technologies for heat-tracing oil gathering and transportation, central heating, etc., which has not only reduced resource waste, but also improved large-scale and industrial resource utilization levels, and has achieved remarkable economic and social benefits. Based on the analysis of oilfield geothermal energy development status, resource potential, and exploitation and utilization modes, the advantages and disadvantages of harnessing oilfield geothermal resource have been discussed. Oilfield geothermal energy exploitation and utilization have advantages in resources, technical personnel, technology, and a large number of abandoned wells that could be reconstructed and utilized. Due to the high heat demand in oilfields, geothermal energy exploitation and utilization can effectively replace oil, gas, coal, and other fossil fuels, and has bright prospects. The key factors limiting oilfield geothermal energy exploitation and utilization are also pointed out in this paper, including immature technologies, lack of overall planning, lack of standards in resource assessment, and economic assessment, lack of incentive policies, etc.

  6. Traditional birth attendants in Malawi

    Directory of Open Access Journals (Sweden)

    J. J. M. Smit

    1994-03-01

    Full Text Available Traditional Birth Attendants (TBAs and traditional healers form an important link in the chain of health personnel providing primary health care in Malawi. In spite of the establishment of hospitals and health centres, it is to these traditional healers and TBAs that the majority of people turn in times of sickness and child-birth. Approximately 60 percent of all deliveries in Malawi occur in the villages. It is therefore important that due regard be paid to the activities of these traditional practitioners in order to ensure the achievement of the goal - "Health for all by the year 2000". The training of TBAs is seen as part of the Maternal and Child Health Services in the country.

  7. Traditional birth attendants in Malawi

    Directory of Open Access Journals (Sweden)

    J. J. M. Smit

    1994-05-01

    Full Text Available Traditional Birth Attendants (TBAs and traditional healers form an important link in the chain of health personnel providing primary health care in Malawi. In spite of the establishment of hospitals and health centres, it is to these traditional healers and TBAs that the majority of people turn in times of sickness and child-birth. Approximately 60 percent of all deliveries in Malawi occur in the villages. It is therefore important that due regard be paid to the activities of these traditional practitioners in order to ensure the achievement of the goal - "Health for all by the year 2000". The training of TBAs is seen as part of the Maternal and Child Health Services in the country.

  8. [Common household traditional Chinese medicines].

    Science.gov (United States)

    Zhang, Shu-Yuan; Li, Mei; Fu, Dan; Liu, Yang; Wang, Hui; Tan, Wei

    2016-02-01

    With the enhancement in the awareness of self-diagnosis among residents, it's very common for each family to prepare common medicines for unexpected needs. Meanwhile, with the popularization of the traditional Chinese medicine knowledge, the proportion of common traditional Chinese medicines prepared at residents' families is increasingly higher than western medicines year by year. To make it clear, both pre-research and closed questionnaire research were adopted for residents in Chaoyang District, Beijing, excluding residents with a medical background. Based on the results of data, a analysis was made to define the role and influence on the quality of life of residents and give suggestions for relevant departments to improve the traditional Chinese medicine popularization and promote the traditional Chinese medicine market. Copyright© by the Chinese Pharmaceutical Association.

  9. Traditional Chinese Medicine: An Introduction

    Science.gov (United States)

    ... Resources CME/CEU and Online Lectures Online Continuing Education Series Distinguished Lecture Series Integrated Medicine Research Lecture ... TCM, it is important to separate questions about traditional theories and ... of modern science-based medicine and health promotion practices. The ...

  10. The Zulu traditional birth attendant

    African Journals Online (AJOL)

    Some of the important practices of Zulu traditional birth attendants ... the people as regards pregnancy and labour. This article docu- .... into account previous perinatal deaths. ... They were either widows or married to husbands unable to work.

  11. Sexual exploitation and labor during adolescence: A case study

    Directory of Open Access Journals (Sweden)

    Luciana Dutra-Thomé

    2011-09-01

    Full Text Available The present article focused on the perception of sexual exploitation as a job, using a single case study design. The aim of the study was to investigate the case of a 14 year-old girl, involved in commercial sexual exploitation, who considered this situation as her labor activity. A content analysis showed protective and risk factors as categories, especially related to her labor activities. The girl perceived the sexual exploitation activity as a job that provided autonomy, subsistence, and survival. The study revealed that the negative effects of working during adolescence may bring consequences to health and development. Youth work may be defined as a risk factor, especially when the labour conditions are not adequate and protected.

  12. Information source exploitation/exploration and NPD decision-making

    DEFF Research Database (Denmark)

    Jespersen, Kristina Risom

    different Scandinavian companies. Data was analyzed using hierarchical regression models across decision criteria dimensions and NPD stages as well as analyzing the combination of selected information sources. Rather than forwarding one optimal search behavior for the entire NPD process, we find optimal...... information search behavior at either end of the exploitation/exploration continuum. Additionally, we find that overexploitation and overexploration is caused by managerial bias. This creates managerial misbehavior at gate decision-points of the NPD process.......The purpose of this study is to examine how the exploration/exploitation continuum is applied by decision-makers in new product gate decision-making. Specifically, we analyze at gate decision-points how the evaluation of a new product project is affected by the information source exploitation...

  13. The ALARA project of the EDF nuclear park exploitation

    International Nuclear Information System (INIS)

    Potoczek, J.

    1998-01-01

    To bring the exploitation of the nuclear park of EDF at the level of the best exploiters in the world in matter of collective and individual dosimetry, the ALARA principle coordinates numerous actions: to associate the temporary societies, to define common language, methods and tools for the whole park to organize a level effect in this area, to optimize the maintenance that is expansive in radiation doses, to make the different levels of management responsible on dosimetric stakes, to reduce the singular sources of exposure, to assure the organisation and exploitation of the experience back in this field and adapt consequently the system of information. The results are cheerful and the objectives for 2000 are: less than 1.2 h.Sv by year and by reactor, no intervener whom annual radiation dose is upper than 20 mSv (out of exceptional case). (N.C.)

  14. The exploitation of swamp plants for dewatering liquid sewage sludge

    Directory of Open Access Journals (Sweden)

    Jiří Šálek

    2006-01-01

    Full Text Available The operators of little rural wastewater treatment plants have been interested in economic exploitation of sewage sludge in local conditions. The chance is searching simply and natural ways of processing and exploitation stabilized sewage sludge in agriculture. Manure substrate have been obtained by composting waterless sewage sludge including rest plant biomass after closing 6–8 years period of filling liquid sewage sludge to the basin. Main attention was focused on exploitation of swamp plants for dewatering liquid sewage sludge and determination of influence sewage sludge on plants, intensity and course of evapotranspiration and design and setting of drying beds. On the base of determined ability of swamp plants evapotranspiration were edited suggestion solutions of design and operation sludge bed facilities in the conditions of small rural wastewater treatment plant.

  15. Cultural Work as a Site of Struggle: Freelancers and Exploitation

    Directory of Open Access Journals (Sweden)

    Nicole S. Cohen

    2012-05-01

    Full Text Available This paper argues that Marxist political economy is a useful framework for understanding contemporary conditions of cultural work. Drawing on Karl Marx’s foundational concepts, labour process theory, and a case study of freelance writers, I argue that the debate over autonomy and control in cultural work ignores exploitation in labour-capital relationships, which is a crucial process shaping cultural work. To demonstrate the benefits of this approach, I discuss two methods media firms use to extract surplus value from freelance writers: exploitation of unpaid labour time and exploitation of intellectual property through aggressive copyright regimes. I argue that a Marxist perspective can uncover the dynamics that are transforming cultural industries and workers’ experiences. From this perspective, cultural work is understood as a site of struggle.

  16. Application Of FA Sensor 2

    International Nuclear Information System (INIS)

    Park, Seon Ho

    1993-03-01

    This book introduces FA sensor from basic to making system, which includes light sensor like photo diode and photo transistor, photo electricity sensor, CCD type image sensor, MOS type image sensor, color sensor, cds cell, and optical fiber scope. It also deals with direct election position sensor such as proximity switch, differential motion, linear scale of photo electricity type, and magnet scale, rotary sensor with summary of rotary encoder, rotary encoder types and applications, flow sensor, and sensing technology.

  17. Little Eyolf and dramatic tradition

    Directory of Open Access Journals (Sweden)

    Roland Lysell

    2015-02-01

    Full Text Available The article criticises an Ibsen tradition who has seen the last scene of Little Eyolf as a reconciliation. Instead, the article discusses the improbability of a happy marriage characterised by social engagement. The play is open but it is hardly probable that Rita, with her erotic desire, and Allmers, whose desire has turned into metaphysics, can be happy together. The arguments refer to inner criteria and the constantly present dramatic tradition.

  18. TRADITIONAL PHYSICAL CULTURE OF BELARUSIANS

    OpenAIRE

    Shamak, Ales

    2017-01-01

    Relevance. The study of the history of physical culture makes it possible to reveal the laws of its development, the relationship with socio-political and economic factors. The aim of the research is to substantiate the essence, types and structure of the traditional physical culture of Belarusians. Results of the Research. Traditional physical culture has been the main type of physical culture of the Belarusian people for about a thousand years. It is regarded as the activity of the society ...

  19. Was the Monetarist Tradition Invented?

    OpenAIRE

    George S. Tavlas

    1998-01-01

    In 1969, Harry Johnson charged that Milton Friedman 'invented' a Chicago oral quantity theory tradition, the idea being that in order to launch a monetarist counter-revolution, Friedman needed to establish a linkage with pre-Keynesian orthodoxy. This paper shows that there was a distinct pre-Keynesian Chicago quantity-theory tradition that advocated increased government expenditure during the Great Depression in order to put money directly into circulation. This policy stance distinguished th...

  20. Electronic commerce versus traditional commerce

    OpenAIRE

    Dorin Vicentiu Popescu; Manoela Popescu

    2007-01-01

    The internet represents new opportunities for the traditional companies, including the diversification of the given services and also the promotion of the new ones, which are personalized and attractive and they are possible thanks to the information and communication technologies. According to this, the Internet impact, which has allowed the development of a new form of commerce- the commerce via Internet (which is a component of the electronic commerce), against the traditional global comme...

  1. Chapter 1. Traditional marketing revisited

    OpenAIRE

    Lambin, Jean-Jacques

    2013-01-01

    The objective of this chapter is to review the traditional marketing concept and to analyse its main ambiguities as presented in popular textbooks. The traditional marketing management model placing heavy emphasis of the marketing mix is in fact a supply-driven approach of the market, using the understanding of consumers’ needs to mould demand to the requirements of supply, instead of adapting supply to the expectations of demand. To clarify the true role of marketing, a distinction is made b...

  2. Sensors an introductory course

    CERN Document Server

    Kalantar-zadeh, Kourosh

    2013-01-01

    Sensors: An Introductory Course provides an essential reference on the fundamentals of sensors. The book is designed to help readers in developing skills and the understanding required in order to implement a wide range of sensors that are commonly used in our daily lives. This book covers the basic concepts in the sensors field, including definitions and terminologies. The physical sensing effects are described, and devices which utilize these effects are presented. The most frequently used organic and inorganic sensors are introduced and the techniques for implementing them are discussed. This book: Provides a comprehensive representation of the most common sensors and can be used as a reference in relevant fields Presents learning materials in a concise and easy to understand manner Includes examples of how sensors are incorporated in real life measurements Contains detailed figures and schematics to assist in understanding the sensor performance Sensors: An Introductory Course is ideal for university stu...

  3. Coupled wave sensor technology

    International Nuclear Information System (INIS)

    Maki, M.C.

    1988-01-01

    Buried line guided radar sensors have been used successfully for a number of years to provide perimeter security for high value resources. This paper introduces a new complementary sensor advancement at Computing Devices termed 'coupled wave device technology' (CWD). It provides many of the inherent advantages of leakey cable sensors, such as terrain-following and the ability to discriminate between humans and small animals. It also is able to provide a high or wide detection zone, and allows the sensor to be mounted aerially and adjacent to a wall or fence. Several alternative sensors have been developed which include a single-line sensor, a dual-line hybrid sensor that combines the elements of ported coax and CWD technology, and a rapid-deployment portable sensor for temporary or mobile applications. A description of the technology, the sensors, and their characteristics is provided

  4. Microtubules as mechanical force sensors.

    Science.gov (United States)

    Karafyllidis, Ioannis G; Lagoudas, Dimitris C

    2007-03-01

    Microtubules are polymers of tubulin subunits (dimers) arranged on a hexagonal lattice. Each tubulin dimer comprises two monomers, the alpha-tubulin and beta-tubulin, and can be found in two states. In the first state a mobile negative charge is located into the alpha-tubulin monomer and in the second into the beta-tubulin monomer. Each tubulin dimer is modeled as an electrical dipole coupled to its neighbors by electrostatic forces. The location of the mobile charge in each dimer depends on the location of the charges in the dimer's neighborhood. Mechanical forces that act on the microtubule affect the distances between the dimers and alter the electrostatic potential. Changes in this potential affect the mobile negative charge location in each dimer and the charge distribution in the microtubule. The net effect is that mechanical forces affect the charge distribution in microtubules. We propose to exploit this effect and use microtubules as mechanical force sensors. We model each dimer as a two-state quantum system and, following the quantum computation paradigm, we use discrete quantum random walk on the hexagonal microtubule lattice to determine the charge distribution. Different forces applied on the microtubule are modeled as different coin biases leading to different probability distributions of the quantum walker location, which are directly connected to different charge distributions. Simulation results show that there is a strong indication that microtubules can be used as mechanical force sensors and that they can also detect the force directions and magnitudes.

  5. [Establishment of prescription research technology system in Chinese medicine secondary exploitation based on "component structure" theory].

    Science.gov (United States)

    Cheng, Xu-Dong; Feng, Liang; Gu, Jun-Fei; Zhang, Ming-Hua; Jia, Xiao-Bin

    2014-11-01

    Chinese medicine prescriptions are the wisdom outcomes of traditional Chinese medicine (TCM) clinical treatment determinations which based on differentiation of symptoms and signs. Chinese medicine prescriptions are also the basis of secondary exploitation of TCM. The study on prescription helps to understand the material basis of its efficacy, pharmacological mechanism, which is an important guarantee for the modernization of traditional Chinese medicine. Currently, there is not yet dissertation n the method and technology system of basic research on the prescription of Chinese medicine. This paper focuses on how to build an effective system of prescription research technology. Based on "component structure" theory, a technology system contained four-step method that "prescription analysis, the material basis screening, the material basis of analysis and optimization and verify" was proposed. The technology system analyzes the material basis of the three levels such as Chinese medicine pieces, constituents and the compounds which could respect the overall efficacy of Chinese medicine. Ideas of prescription optimization, remodeling are introduced into the system. The technology system is the combination of the existing research and associates with new techniques and methods, which used for explore the research thought suitable for material basis research and prescription remodeling. The system provides a reference for the secondary development of traditional Chinese medicine, and industrial upgrading.

  6. The Living Indian Critical Tradition

    Directory of Open Access Journals (Sweden)

    Vivek Kumar Dwivedi

    2010-11-01

    Full Text Available This paper attempts to establish the identity of something that is often considered to be missing – a living Indian critical tradition. I refer to the tradition that arises out of the work of those Indians who write in English. The chief architects of this tradition are Sri Aurobindo, C.D. Narasimhaiah, Gayatri Chakravorty Spivak and Homi K. Bhabha. It is possible to believe that Indian literary theories derive almost solely from ancient Sanskrit poetics. Or, alternatively, one can be concerned about the sad state of affairs regarding Indian literary theories or criticism in English. There have been scholars who have raised the question of the pathetic state of Indian scholarship in English and have even come up with some positive suggestions. But these scholars are those who are ignorant about the living Indian critical tradition. The significance of the Indian critical tradition lies in the fact that it provides the real focus to the Indian critical scene. Without an awareness of this tradition Indian literary scholarship (which is quite a different thing from Indian literary criticism and theory as it does not have the same impact as the latter two do can easily fail to see who the real Indian literary critics and theorists are.

  7. Smart Optoelectronic Sensors and Intelligent Sensor Systems

    Directory of Open Access Journals (Sweden)

    Sergey Y. YURISH

    2012-03-01

    Full Text Available Light-to-frequency converters are widely used in various optoelectronic sensor systems. However, a further frequency-to-digital conversion is a bottleneck in such systems due to a broad frequency range of light-to-frequency converters’ outputs. This paper describes an effective OEM design approach, which can be used for smart and intelligent sensor systems design. The design is based on novel, multifunctional integrated circuit of Universal Sensors & Transducers Interface especially designed for such sensor applications. Experimental results have confirmed an efficiency of this approach and high metrological performances.

  8. Traditional African economies in conflict with western capitalism

    Directory of Open Access Journals (Sweden)

    C.M. Pauw

    1996-04-01

    Full Text Available Traditional Mrican economies� in conflict with western capitalism Some of� the fundamental differences between two� economic systems which, by� and large,� have� come� into� conflict with� one another� in Africa south� of the� Sahara� are� analised,� i e� traditional African� economies� and western, capitalist oriented� economies.� The� dire� economic� conditions prevailing� in Africa are the result,� to a� large extent,� of� a� long history of� exploitation and economic� disempowerment particularly� by� western� powers.� Not� all� the strategies and programs to� counter this poverty are equally appropriate or acceptable.� In� the� meantime� a� unique� coping� mechanism� is� developing, particularly within African Independent Churches which may provide some answers.

  9. Exploiting Thread Parallelism for Ocean Modeling on Cray XC Supercomputers

    Energy Technology Data Exchange (ETDEWEB)

    Sarje, Abhinav [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jacobsen, Douglas W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Williams, Samuel W. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ringler, Todd [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Oliker, Leonid [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-05-01

    The incorporation of increasing core counts in modern processors used to build state-of-the-art supercomputers is driving application development towards exploitation of thread parallelism, in addition to distributed memory parallelism, with the goal of delivering efficient high-performance codes. In this work we describe the exploitation of threading and our experiences with it with respect to a real-world ocean modeling application code, MPAS-Ocean. We present detailed performance analysis and comparisons of various approaches and configurations for threading on the Cray XC series supercomputers.

  10. Influence of Machine Exploitation Effectiveness on Furniture Production Quality Level

    Directory of Open Access Journals (Sweden)

    Stasiak-Betlejewska Renata

    2015-12-01

    Full Text Available One of the most important factors determining the company‘s capacity to produce high quality products is the level of machinery operation effectiveness. Companies having modern machinery are characterized by high productivity. To obtain a high quality product, the equipment should be properly used, without any failure, which contributes significantly to the exploitation level increase. The modernity level and the exploitation effectiveness level for chosen machine producing furniture components in relation to the product quality level were analysed in the paper. As a result of the research findings analysis, proposals for corrective actions with regard to machinery maintenance and production processes were presented.

  11. On species preservation and Non-Cooperative Exploiters

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Lindroos, Marko

    cases where several non-cooperative exploiters are involved in mixed fisheries. This paper is targeting biodiversity preservation by setting up a two species model with the aim of ensuring both species survive harvesting of exploiters adapting a non-cooperative behaviour. The model starts out as a multi......-species model without biological dependency and is then modified to include also biological dependency. We contribute to the literature by analytically finding the limits on the number of players preserving both species including the conditions to be satisfied. For visual purposes we simulate a two species...

  12. Final Report, “Exploiting Global View for Resilience”

    Energy Technology Data Exchange (ETDEWEB)

    Chien, Andrew [Univ. of Chicago, IL (United States)

    2017-03-29

    Final technical report for the "Exploiting Global View for Resilience" project. The GVR project aims to create a new approach to portable, resilient applications. The GVR approach builds on a global view data model,, adding versioning (multi-version), user control of timing and rate (multi-stream), and flexible cross layer error signalling and recovery. With a versioned array as a portable abstraction, GVR enables application programmers to exploit deep scientific and application code insights to manage resilience (and its overhead) in a flexible, portable fashion.

  13. Fishery Development and Exploitation in South East Australia

    Directory of Open Access Journals (Sweden)

    Camilla Novaglio

    2018-04-01

    Full Text Available Understanding the full extent of past ecological changes in human-influenced marine systems is needed to inform present management policies, but is often hampered by the scarcity of information about exploitation practices and population status over the entire history of fishing. The history of commercial fishing in South East Australia is relatively recent and thus easier to document. Our aim is to reconstruct such history and to use this information to understand general patterns and consequences of fishing exploitation. Intense exploitation of marine resources arrived in South East Australia with European colonization in the early 1800s, and unregulated sealing, whaling and oyster dredging resulted in the first documented significant impact on local marine populations. Exploitation extended to demersal resources in 1915 when the trawl fishery developed. Between the early 1800s and the 1980s, some of the exploited stocks collapsed, but fishing moved further offshore and in deeper waters as technology improved and new resources became available or were discovered. This phase of fisheries expansion masked the unsustainable nature of some fishing industries, such as trawling and whaling, and postponed the need for management regulations. From the 1990s onward, an increasing awareness of the depleted nature of some fisheries led to the establishment of management strategies aiming at a more sustainable exploitation of target stocks and, from the mid-2000s onwards, management strategies were revised and improved to better address the effect of fishing on multiple components of marine ecosystems. This led to the recovery of some depleted populations and to increased habitat protection. The relatively short history of fishing exploitation and the small scale of the fishing industry in South East Australia played a significant role in limiting the magnitude of fishing impacts on local populations and helped to achieve recoveries when fisheries

  14. Development of Ayurveda - Tradition to trend.

    Science.gov (United States)

    Mukherjee, Pulok K; Harwansh, Ranjit K; Bahadur, Shiv; Banerjee, Subhadip; Kar, Amit; Chanda, Joydeb; Biswas, Sayan; Ahmmed, Sk Milan; Katiyar, C K

    2017-02-02

    Ayurveda entails a scientific tradition of harmonious living and its origin can be traced from ancient knowledge in Rigveda and Atharvaveda. Ayurveda is a traditional healthcare system of Indian medicine since ancient times. Several Ayurvedic medicines have been exploiting for treatment and management of various diseases in human beings. The several drugs have been developed and practiced from Ayurveda since ancient time to modern practice as 'tradition to trend'. The potential of Ayurvedic medicine needs to be explored further with modern scientific validation approaches for better therapeutic leads. The present study was aimed to explore the various aspects of Ayurveda and inspired drug discovery approaches for its promotion and development. We have reviewed all the literature related to the history and application of Ayurvedic herbs. Various aspects for the quality control, standardization, chemo-profiling, and metabolite fingerprinting for quality evaluation of Ayurvedic drugs. The development of Ayurvedic drugs is gaining momentum with the perspectives of safety, efficacy and quality for promotion and management of human health. Scientific documentation, process validation and several others significant parameters are key points, which can ensure the quality, safety and effectiveness of Ayurvedic drugs. The present review highlights on the major goal of Ayurveda and their significant role in healthcare system. Ayurveda deals with several classical formulations including arka, asavas, aristas, churna, taila, vati, gutika, bhasma etc. There are several lead molecules that have been developed from the Ayurvedic herbs, which have various significant therapeutic activities. Chemo-profiling of Ayurvedic drug is essential in order to assess the quality of products. It deals with bioactive compound quantification, spurious and allied drug determination, chromatographic fingerprinting, standardization, stability and quality consistency of Ayurvedic products. Scientific

  15. Towards Sensor Database Systems

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gehrke, Johannes; Seshadri, Praveen

    2001-01-01

    . These systems lack flexibility because data is extracted in a predefined way; also, they do not scale to a large number of devices because large volumes of raw data are transferred regardless of the queries that are submitted. In our new concept of sensor database system, queries dictate which data is extracted...... from the sensors. In this paper, we define the concept of sensor databases mixing stored data represented as relations and sensor data represented as time series. Each long-running query formulated over a sensor database defines a persistent view, which is maintained during a given time interval. We...... also describe the design and implementation of the COUGAR sensor database system....

  16. A Review on the Electrochemical Sensors and Biosensors Composed of Nanowires as Sensing Material

    Directory of Open Access Journals (Sweden)

    Shen-Ming Chen

    2008-01-01

    Full Text Available The development and application of nanowires for electrochemical sensors and biosensors are reviewed in this article. Next generation sensor platforms will require significant improvements in sensitivity, specificity and parallelism in order to meet the future needs in variety of fields. Sensors made of nanowires exploit some fundamental nanoscopic effect in order to meet these requirements. Nanowires are new materials, which have the characteristic of low weight with extraordinary mechanical, electrical, thermal and multifunctional properties. The advantages such as size scale, aspect ratio and other properties of nanowires are especially apparent in the use of electrical sensors such as electrochemical sensors and in the use of field-effect transistors. The preparation methods of nanowires and their properties are discussed along with their advantages towards electrochemical sensors and biosensors. Some key results from each article are summarized, relating the concept and mechanism behind each sensor, with experimental conditions as well as their behavior at different conditions.

  17. Human movement activity classification approaches that use wearable sensors and mobile devices

    Science.gov (United States)

    Kaghyan, Sahak; Sarukhanyan, Hakob; Akopian, David

    2013-03-01

    Cell phones and other mobile devices become part of human culture and change activity and lifestyle patterns. Mobile phone technology continuously evolves and incorporates more and more sensors for enabling advanced applications. Latest generations of smart phones incorporate GPS and WLAN location finding modules, vision cameras, microphones, accelerometers, temperature sensors etc. The availability of these sensors in mass-market communication devices creates exciting new opportunities for data mining applications. Particularly healthcare applications exploiting build-in sensors are very promising. This paper reviews different approaches of human activity recognition.

  18. Single Photon Counting Performance and Noise Analysis of CMOS SPAD-Based Image Sensors

    Science.gov (United States)

    Dutton, Neale A. W.; Gyongy, Istvan; Parmesan, Luca; Henderson, Robert K.

    2016-01-01

    SPAD-based solid state CMOS image sensors utilising analogue integrators have attained deep sub-electron read noise (DSERN) permitting single photon counting (SPC) imaging. A new method is proposed to determine the read noise in DSERN image sensors by evaluating the peak separation and width (PSW) of single photon peaks in a photon counting histogram (PCH). The technique is used to identify and analyse cumulative noise in analogue integrating SPC SPAD-based pixels. The DSERN of our SPAD image sensor is exploited to confirm recent multi-photon threshold quanta image sensor (QIS) theory. Finally, various single and multiple photon spatio-temporal oversampling techniques are reviewed. PMID:27447643

  19. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls.

    Science.gov (United States)

    Gerassi, Lara

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels.

  20. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    Science.gov (United States)

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels. PMID:26726289

  1. Sensory exploitation and cultural transmission: the late emergence of iconic representations in human evolution.

    Science.gov (United States)

    Verpooten, Jan; Nelissen, Mark

    2010-09-01

    Iconic representations (i.e., figurative imagery and realistic art) only started to appear consistently some 45,000 years ago, although humans have been anatomically modern since 200,000-160,000 years ago. What explains this? Some authors have suggested a neurocognitive change took place, leading to a creative explosion, although this has been contested. Here, we examine the hypothesis that demographic changes caused cultural "cumulative adaptive evolution" and as such the emergence of modern symbolic behavior. This approach usefully explains the evolution of utilitarian skills and tools, and the creation of symbols to identify groups. However, it does not equally effectively explain the evolution of behaviors that may not be directly adaptive, such as the production of iconic representations like figurines and rock art. In order to shed light on their emergence, we propose to combine the above-mentioned cultural hypothesis with the concept of sensory exploitation. The concept essentially states that behavioral traits (in this case iconic art production) which exploit pre-existing sensory sensitivities will evolve if not hindered by costs (i.e., natural selection). In this view, iconic art traditions are evolved by piggy-backing on cumulative adaptive evolution. Since it is to date uncertain whether art has served any adaptive function in human evolution, parsimony demands paying more attention to the primary and a functional mechanism of sensory exploitation as opposed to mechanisms of models based exclusively on secondary benefits (such as Miller's, for instance, in which art is proposed to evolve as a sexual display of fitness).

  2. Tobacco Industry Promotional Strategies Targeting American Indians/Alaska Natives and Exploiting Tribal Sovereignty.

    Science.gov (United States)

    Lempert, Lauren K; Glantz, Stanton A

    2018-03-12

    American Indians/Alaska Natives have the highest commercial tobacco use in the United States, resulting in higher tobacco-caused deaths and diseases than the general population. Some American Indians/Alaska Natives use commercial tobacco for ceremonial as well as recreational uses. Because federally-recognized Tribal lands are sovereign, they are not subject to state cigarette taxes and smokefree laws. This study analyzes tobacco industry promotional efforts specifically targeting American Indians/Alaska Natives and exploiting Tribal lands to understand appropriate policy responses in light of American Indians'/Alaska Natives' unique sovereign status and culture. We analyzed previously secret tobacco industry documents available at the Truth Tobacco Documents Library (https://industrydocuments.library.ucsf.edu/tobacco/). Tobacco companies used promotional strategies targeting American Indians/Alaska Natives and exploiting Tribal lands that leveraged the federally-recognized Tribes' unique sovereign status exempting them from state cigarette taxes and smokefree laws, and exploited some Tribes' existing traditional uses of ceremonial tobacco and poverty. Tactics included price reductions, coupons, giveaways, gaming promotions, charitable contributions and sponsorships. Additionally, tobacco companies built alliances with Tribal leaders to help improve their corporate image, advance ineffective "youth smoking prevention" programs, and defeat tobacco control policies. The industry's promotional tactics likely contribute to disparities in smoking prevalence and smoking-related diseases among American Indians//Alaska Natives. Proven policy interventions to address these disparities including tobacco price increases, cigarette taxes, comprehensive smokefree laws, and industry denormalization campaigns to reduce smoking prevalence and smoking-related disease could be considered by Tribal communities. The sovereign status of federally-recognized Tribes does not prevent them

  3. Collaborative real-time motion video analysis by human observer and image exploitation algorithms

    Science.gov (United States)

    Hild, Jutta; Krüger, Wolfgang; Brüstle, Stefan; Trantelle, Patrick; Unmüßig, Gabriel; Heinze, Norbert; Peinsipp-Byma, Elisabeth; Beyerer, Jürgen

    2015-05-01

    Motion video analysis is a challenging task, especially in real-time applications. In most safety and security critical applications, a human observer is an obligatory part of the overall analysis system. Over the last years, substantial progress has been made in the development of automated image exploitation algorithms. Hence, we investigate how the benefits of automated video analysis can be integrated suitably into the current video exploitation systems. In this paper, a system design is introduced which strives to combine both the qualities of the human observer's perception and the automated algorithms, thus aiming to improve the overall performance of a real-time video analysis system. The system design builds on prior work where we showed the benefits for the human observer by means of a user interface which utilizes the human visual focus of attention revealed by the eye gaze direction for interaction with the image exploitation system; eye tracker-based interaction allows much faster, more convenient, and equally precise moving target acquisition in video images than traditional computer mouse selection. The system design also builds on prior work we did on automated target detection, segmentation, and tracking algorithms. Beside the system design, a first pilot study is presented, where we investigated how the participants (all non-experts in video analysis) performed in initializing an object tracking subsystem by selecting a target for tracking. Preliminary results show that the gaze + key press technique is an effective, efficient, and easy to use interaction technique when performing selection operations on moving targets in videos in order to initialize an object tracking function.

  4. A Hybrid DV-Hop Algorithm Using RSSI for Localization in Large-Scale Wireless Sensor Networks.

    Science.gov (United States)

    Cheikhrouhou, Omar; M Bhatti, Ghulam; Alroobaea, Roobaea

    2018-05-08

    With the increasing realization of the Internet-of-Things (IoT) and rapid proliferation of wireless sensor networks (WSN), estimating the location of wireless sensor nodes is emerging as an important issue. Traditional ranging based localization algorithms use triangulation for estimating the physical location of only those wireless nodes that are within one-hop distance from the anchor nodes. Multi-hop localization algorithms, on the other hand, aim at localizing the wireless nodes that can physically be residing at multiple hops away from anchor nodes. These latter algorithms have attracted a growing interest from research community due to the smaller number of required anchor nodes. One such algorithm, known as DV-Hop (Distance Vector Hop), has gained popularity due to its simplicity and lower cost. However, DV-Hop suffers from reduced accuracy due to the fact that it exploits only the network topology (i.e., number of hops to anchors) rather than the distances between pairs of nodes. In this paper, we propose an enhanced DV-Hop localization algorithm that also uses the RSSI values associated with links between one-hop neighbors. Moreover, we exploit already localized nodes by promoting them to become additional anchor nodes. Our simulations have shown that the proposed algorithm significantly outperforms the original DV-Hop localization algorithm and two of its recently published variants, namely RSSI Auxiliary Ranging and the Selective 3-Anchor DV-hop algorithm. More precisely, in some scenarios, the proposed algorithm improves the localization accuracy by almost 95%, 90% and 70% as compared to the basic DV-Hop, Selective 3-Anchor, and RSSI DV-Hop algorithms, respectively.

  5. Embedded sensing: integrating sensors in 3-D printed structures

    Directory of Open Access Journals (Sweden)

    A. Dijkshoorn

    2018-03-01

    Full Text Available Current additive manufacturing allows for the implementation of electrically interrogated 3-D printed sensors. In this contribution various technologies, sensing principles and applications are discussed. We will give both an overview of some of the sensors presented in literature as well as some of our own recent work on 3-D printed sensors. The 3-D printing methods discussed include fused deposition modelling (FDM, using multi-material printing and poly-jetting. Materials discussed are mainly thermoplastics and include thermoplastic polyurethane (TPU, both un-doped as well as doped with carbon black, polylactic acid (PLA and conductive inks. The sensors discussed are based on biopotential sensing, capacitive sensing and resistive sensing with applications in surface electromyography (sEMG and mechanical and tactile sensing. As these sensors are based on plastics they are in general flexible and therefore open new possibilities for sensing in soft structures, e.g. as used in soft robotics. At the same time they show many of the characteristics of plastics like hysteresis, drift and non-linearity. We will argue that 3-D printing of embedded sensors opens up exciting new possibilities but also that these sensors require us to rethink how to exploit non-ideal sensors.

  6. Galvanic Cell Type Sensor for Soil Moisture Analysis.

    Science.gov (United States)

    Gaikwad, Pramod; Devendrachari, Mruthyunjayachari Chattanahalli; Thimmappa, Ravikumar; Paswan, Bhuneshwar; Raja Kottaichamy, Alagar; Makri Nimbegondi Kotresh, Harish; Thotiyl, Musthafa Ottakam

    2015-07-21

    Here we report the first potentiometric sensor for soil moisture analysis by bringing in the concept of Galvanic cells wherein the redox energies of Al and conducting polyaniline are exploited to design a battery type sensor. The sensor consists of only simple architectural components, and as such they are inexpensive and lightweight, making it suitable for on-site analysis. The sensing mechanism is proved to be identical to a battery type discharge reaction wherein polyaniline redox energy changes from the conducting to the nonconducting state with a resulting voltage shift in the presence of soil moisture. Unlike the state of the art soil moisture sensors, a signal derived from the proposed moisture sensor is probe size independent, as it is potentiometric in nature and, hence, can be fabricated in any shape or size and can provide a consistent output signal under the strong aberration conditions often encountered in soil moisture analysis. The sensor is regenerable by treating with 1 M HCl and can be used for multiple analysis with little read out hysteresis. Further, a portable sensor is fabricated which can provide warning signals to the end user when the moisture levels in the soil go below critically low levels, thereby functioning as a smart device. As the sensor is inexpensive, portable, and potentiometric, it opens up avenues for developing effective and energy efficient irrigation strategies, understanding the heat and water transfer at the atmosphere-land interface, understanding soil mechanics, forecasting the risk of natural calamities, and so on.

  7. Dielectric Sensors Based on Electromagnetic Energy Tunneling

    Science.gov (United States)

    Siddiqui, Omar; Kashanianfard, Mani; Ramahi, Omar

    2015-01-01

    We show that metallic wires embedded in narrow waveguide bends and channels demonstrate resonance behavior at specific frequencies. The electromagnetic energy at these resonances tunnels through the narrow waveguide channels with almost no propagation losses. Under the tunneling behavior, high-intensity electromagnetic fields are produced in the vicinity of the metallic wires. These intense field resonances can be exploited to build highly sensitive dielectric sensors. The sensor operation is explained with the help of full-wave simulations. A practical setup consisting of a 3D waveguide bend is presented to experimentally observe the tunneling phenomenon. The tunneling frequency is predicted by determining the input impedance minima through a variational formula based on the Green function of a probe-excited parallel plate waveguide. PMID:25835188

  8. Biophotonics sensor acclimatization to stem cells environment

    Science.gov (United States)

    Mohamad Shahimin, Mukhzeer

    2017-11-01

    The ability to discriminate, characterise and purify biological cells from heterogeneous population of cells is fundamental to numerous prognosis and diagnosis applications; often forming the basis for current and emerging clinical protocols in stem cell therapy. Current sorting approaches exploit differences in cell density, specific immunologic targets, or receptor-ligand interactions to isolate particular cells. Identification of novel properties by which different cell types may be discerned and of new ways for their selective manipulation are clearly fundamental components for improving sorting methodologies. Biophotonics sensor developed by our team are potentially capable of discriminating cells according to their refractive index (which is highly dependable on the organelles inside the cell), size (indicator to cell stage) and shape (in certain cases as an indicator to cell type). The sensor, which already discriminate particles efficiently, is modified to acclimatize into biological environment, especially for stem cell applications.

  9. Dielectric Sensors Based on Electromagnetic Energy Tunneling

    Directory of Open Access Journals (Sweden)

    Omar Siddiqui

    2015-03-01

    Full Text Available We show that metallic wires embedded in narrow waveguide bends and channels demonstrate resonance behavior at specific frequencies. The electromagnetic energy at these resonances tunnels through the narrow waveguide channels with almost no propagation losses. Under the tunneling behavior, high-intensity electromagnetic fields are produced in the vicinity of the metallic wires. These intense field resonances can be exploited to build highly sensitive dielectric sensors. The sensor operation is explained with the help of full-wave simulations. A practical setup consisting of a 3D waveguide bend is presented to experimentally observe the tunneling phenomenon. The tunneling frequency is predicted by determining the input impedance minima through a variational formula based on the Green function of a probe-excited parallel plate waveguide.

  10. Modeling of information on the impact of mining exploitation on bridge objects in BIM

    Science.gov (United States)

    Bętkowski, Piotr

    2018-04-01

    The article discusses the advantages of BIM (Building Information Modeling) technology in the management of bridge infrastructure on mining areas. The article shows the problems with information flow in the case of bridge objects located on mining areas and the advantages of proper information management, e.g. the possibility of automatic monitoring of structures, improvement of safety, optimization of maintenance activities, cost reduction of damage removal and preventive actions, improvement of atmosphere for mining exploitation, improvement of the relationship between the manager of the bridge and the mine. Traditional model of managing bridge objects on mining areas has many disadvantages, which are discussed in this article. These disadvantages include among others: duplication of information about the object, lack of correlation in investments due to lack of information flow between bridge manager and mine, limited assessment possibilities of damage propagation on technical condition and construction resistance to mining influences.

  11. Traditional botanical medicine: an introduction.

    Science.gov (United States)

    Rosenbloom, Richard A; Chaudhary, Jayesh; Castro-Eschenbach, Diane

    2011-01-01

    The role of traditional medicine in the well-being of mankind has certainly journeyed a long way. From an ancient era, in which knowledge was limited to a few traditional healers and dominated by the use of whole plants or crude drugs, the science has gradually evolved into a complete healthcare system with global recognition. Technologic advancements have facilitated traditional science to deliver numerous breakthrough botanicals with potency equivalent to those of conventional drugs. The renewed interest in traditional medicine is mainly attributed to its ability to prevent disease, promote health, and improve quality of life. Despite the support received from public bodies and research organizations, development of botanical medicines continues to be a challenging process. The present article gives a summarized description of the various difficulties encountered in the development and evaluation of botanical drugs, including isolation of active compounds and standardization of plant ingredients. It indicates a future direction of traditional medicine toward evidence-based evaluation of health claims through well-controlled safety and efficacy studies.

  12. Human trafficking for labour exploitation: Interpreting the crime

    NARCIS (Netherlands)

    Coster van Voorhout, J.E.B.

    2007-01-01

    The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation

  13. Efficient Depth Map Compression Exploiting Segmented Color Data

    DEFF Research Database (Denmark)

    Milani, Simone; Zanuttigh, Pietro; Zamarin, Marco

    2011-01-01

    performances is still an open research issue. This paper presents a novel compression scheme that exploits a segmentation of the color data to predict the shape of the different surfaces in the depth map. Then each segment is approximated with a parameterized plane. In case the approximation is sufficiently...

  14. Bats track and exploit changes in insect pest populations

    Science.gov (United States)

    The role of bats or any generalist predator in suppressing prey populations depends on the predator’s ability to exploit available prey in space and time. Using a qPCR faecal DNA assay, we document significant association between numbers of Brazilian free-tailed bats (Tadarida brasiliensis) consumin...

  15. Describing Data Format Exploits Using Bitstream Segment Graphs

    NARCIS (Netherlands)

    Hartle, Michael; Schumann, Daniel; Botchak, Arsene; Tews, Erik; Mühlhäuser, Max

    2008-01-01

    Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and

  16. Exploiting Patient Labour at Kew Cottages, Australia, 1887-1950

    Science.gov (United States)

    Monk, Lee-Ann

    2010-01-01

    This article examines the exploitation of patient labour at Kew Cottages, Australia's first purpose-built state institution for people with learning disabilities. Analysing historical evidence for the period 1887-1950 shows that unpaid patient labour contributed significantly to the economy of the Cottages and so to the government department of…

  17. Exploiting serological data to understand the epidemiology of foot ...

    African Journals Online (AJOL)

    Exploiting serological data to understand the epidemiology of foot-and-mouth disease virus serotypes circulating in Libya. Ibrahim Eldaghayes, Abdunaser Dayhum, Abdulwahab Kammon, Monier Sharif, Giancarlo Ferrari, Christianus Bartels, Keith Sumption, Donald P. King, Santina Grazioli, Emiliana Brocchi ...

  18. Open pit coal exploitation viability. Margarita mine. Case of study

    International Nuclear Information System (INIS)

    Veloza, Julia; Molina, Jorge; Mejia, Humberto

    2006-01-01

    This paper provides an analysis of financial viability, planning and design for the new coal open pit exploitation for La Margarita mine, with coal-resources estimated on 440.139,7 ton. Dimension, design and economic evaluation were possible by three exploitation methods: (multiple bench, open cast contour, and terraces). Net present values (NVP) were calculated: $c 817,5; $c 518,5 and $c 645,2 respectively for each method (given in million current Colombian pesos $. $c 2380 are equivalent to $us 1) and rate of return (ROR) 78,33%; 34,0% and 38,62% respectively for each method. These indicators served as a parameter to choose the multiple bench method, which should be recalculated because it was necessary to work jointly with two pits and making feasible the project. in addition a general environmental evaluation was done, which is vital for the exploitation. Important impacts on the flower, animals, air, water were found, and measures of control, prevention and mitigation were stated. it is expected that this paper can be useful as a technical-economical support for the development of the open pit exploitation in the margarita mine

  19. Exploiting wild relatives of S. lycopersicum for quality traits

    NARCIS (Netherlands)

    Víquez Zamora, A.M.

    2015-01-01

    Exploiting wild relatives of S. lycopersicum for quality traits Ana Marcela Víquez Zamora Tomatoes are consumed worldwide and became a model for crop plant research. A part of the research aims at expanding genetic diversity in tomato; this can be done by incorporating

  20. Geographical aspects of exploitation of nuclear energy in Europe

    International Nuclear Information System (INIS)

    Kurucova, S.

    2007-05-01

    The topic of exploitation of nuclear energy is becoming increasingly actual in the present time in connection with frequently discussed question of 'renaissance of nuclear energetics'. The work is aimed at research of geographical aspects of exploitation of nuclear energy for military and civil purposes on the territory of Europe. The base of work represents the analysis of theoretical aspects of research of energy, mainly of nuclear energy. The work examines the historical development of exploitation of nuclear energy since its discovery, through development of military nuclear industry in Europe, big attention is paid to spreading of nuclear energetics on the territory of Europe from its beginnings up to the present time. The main part of the work represents the analysis of the present situation of exploitation of nuclear energy for civil purposes in Europe. The attention is paid to so-called nuclear fuel cycle as complex chain of several reciprocally interconnected operations of nuclear fuel treatment. The monitoring of spatial relations among individual countries within their nuclear fuel cycles is emphasised. The analysis of historical development and of the present state of nuclear energetics finished up in the outline of the perspectives of its further development in Europe. The analysis of the tendencies of evolution of world energetic economy mentions on the trend of growth of energy consumption in the world and Europe, as well as on the important position of nuclear energy in the structure of energy sources. Summary in English language is included. (author)

  1. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  2. Exploitation of commercial remote sensing images: reality ignored?

    Science.gov (United States)

    Allen, Paul C.

    1999-12-01

    The remote sensing market is on the verge of being awash in commercial high-resolution images. Market estimates are based on the growing numbers of planned commercial remote sensing electro-optical, radar, and hyperspectral satellites and aircraft. EarthWatch, Space Imaging, SPOT, and RDL among others are all working towards launch and service of one to five meter panchromatic or radar-imaging satellites. Additionally, new advances in digital air surveillance and reconnaissance systems, both manned and unmanned, are also expected to expand the geospatial customer base. Regardless of platform, image type, or location, each system promises images with some combination of increased resolution, greater spectral coverage, reduced turn-around time (request-to- delivery), and/or reduced image cost. For the most part, however, market estimates for these new sources focus on the raw digital images (from collection to the ground station) while ignoring the requirements for a processing and exploitation infrastructure comprised of exploitation tools, exploitation training, library systems, and image management systems. From this it would appear the commercial imaging community has failed to learn the hard lessons of national government experience choosing instead to ignore reality and replicate the bias of collection over processing and exploitation. While this trend may be not impact the small quantity users that exist today it will certainly adversely affect the mid- to large-sized users of the future.

  3. Human trafficking and exploitation: A global health concern.

    Directory of Open Access Journals (Sweden)

    Cathy Zimmerman

    2017-11-01

    Full Text Available In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  4. Six scenarios of exploiting an ontology based, mobilized learning environment

    NARCIS (Netherlands)

    Kismihók, G.; Szabó, I.; Vas, R.

    2012-01-01

    In this article, six different exploitation possibilities of an educational ontology based, mobilized learning management system are presented. The focal point of this system is the educational ontology model. The first version of this educational ontology model serves as a foundation for curriculum

  5. Indicators of Nuclear safety and exploitation in ANAV

    International Nuclear Information System (INIS)

    Quintana Prieto, M.; Jorda Alcove, M.

    2013-01-01

    The use of indicators by ANAV plants, aims to be a tool to facilitate the assessment of the behaviour of the plants nuclear over a specific time period. The following are and are they explain those related to Nuclear safety and exploitation.

  6. Desiring TESOL and International Education: Market Abuse and Exploitation

    Science.gov (United States)

    Chowdhury, Raqib; Ha, Phan Le

    2014-01-01

    This book addresses how Western universities have constructed themselves as global providers of education, and are driven to be globally competitive. It examines how the term "international" has been exploited by the market in the form of government educational policies and agencies, host institutions, academia and the mass media. The…

  7. Exploiting Elementary Landscapes for TSP, Vehicle Routing and Scheduling

    Science.gov (United States)

    2015-09-03

    similar mathematical foundation to enable gradient descent methods for discrete combinatorial optimization problems. We are also generalizing our prior...research has exploited statistical and mathematical properties of elementary landscapes to develop new gradient methods for combinatorial optimization... mathematically methods to more automatically identify elementary landscapes. If a combinatorial optimization problem is a superposition of elemen

  8. 77 FR 36491 - Request for Information Regarding Senior Financial Exploitation

    Science.gov (United States)

    2012-06-19

    ... BUREAU OF CONSUMER FINANCIAL PROTECTION [Docket CFPB-2012-0018] Request for Information Regarding Senior Financial Exploitation AGENCY: Bureau of Consumer Financial Protection. ACTION: Request for Information. SUMMARY: Section 1013(g)(1) of the Dodd-Frank Wall Street Reform and Consumer Protection Act of...

  9. Features for Exploiting Black-Box Optimization Problem Structure

    DEFF Research Database (Denmark)

    Tierney, Kevin; Malitsky, Yuri; Abell, Tinus

    2013-01-01

    landscape of BBO problems and show how an algorithm portfolio approach can exploit these general, problem indepen- dent features and outperform the utilization of any single minimization search strategy. We test our methodology on data from the GECCO Workshop on BBO Benchmarking 2012, which contains 21...

  10. Assisting children born of sexual exploitation and abuse

    Directory of Open Access Journals (Sweden)

    Lauren Rumble

    2007-01-01

    Full Text Available The UN Secretary-General has issued a strategy tosupport victims of sexual exploitation and abuse by UNstaff. It includes a controversial proposal to introduceDNA sampling for all UN staff. Unless this suggestionis adopted, an important opportunity to implementa truly survivor-centred approach may be lost.

  11. Beyond the Bravado: Sex Roles and the Exploitive Male.

    Science.gov (United States)

    Taubman, Stan

    1986-01-01

    Examines the tendency of men to engage in domestic violence and sexual exploitation and presents male sex-role acquisition as a process of psychosocial violence against young boys, which creates a sense of shame, powerlessness, self-alienation, isolation from others, and retaliatory rage and inhibits capacities for intimacy and mutuality.…

  12. Grooming Cybervictims: The Psychosocial Effects of Online Exploitation for Youth.

    Science.gov (United States)

    Berson, Ilene R.

    2003-01-01

    Presents an overview of the benefits and risks of Web-based interactions for youth. Discusses, as an illustrative example, the psychosocial effects of online "grooming" practices that are designed to lure and exploit children by enticing them, typically in a nonsexual way, toward a sexual encounter. Suggests constructive solutions and a…

  13. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation

    Science.gov (United States)

    Yoshioka, Katsunari; Inoue, Daisuke; Eto, Masashi; Hoshizawa, Yuji; Nogawa, Hiroki; Nakao, Koji

    Exploiting vulnerabilities of remote systems is one of the fundamental behaviors of malware that determines their potential hazards. Understanding what kind of propagation tactics each malware uses is essential in incident response because such information directly links with countermeasures such as writing a signature for IDS. Although recently malware sandbox analysis has been studied intensively, little work is done on securely observing the vulnerability exploitation by malware. In this paper, we propose a novel sandbox analysis method for securely observing malware's vulnerability exploitation in a totally isolated environment. In our sandbox, we prepare two victim hosts. We first execute the sample malware on one of these hosts and then let it attack the other host which is running multiple vulnerable services. As a simple realization of the proposed method, we have implemented a sandbox using Nepenthes, a low-interaction honeypot, as the second victim. Because Nepenthes can emulate a variety of vulnerable services, we can efficiently observe the propagation of sample malware. In the experiments, among 382 samples whose scan capabilities are confirmed, 381 samples successfully started exploiting vulnerabilities of the second victim. This indicates the certain level of feasibility of the proposed method.

  14. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Science.gov (United States)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  15. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Directory of Open Access Journals (Sweden)

    Dimitrios Hatzinakos

    2008-03-01

    Full Text Available As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN, which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1 a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2 a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  16. Information-guided transmission in decode-and-forward relaying systems: Spatial exploitation and throughput enhancement

    KAUST Repository

    Yang, Yuli

    2011-07-01

    In addressing the issue of achieving high throughput in half-duplex relay channels, we exploit a concept of information-guided transmission for the network consisting of a source node, a destination node, and multiple half-duplex relay nodes. For further benefiting from multiple relay nodes, the relay-selection patterns are defined as the arbitrary combinations of given relay nodes. By exploiting the difference among the spatial channels states, in each relay-help transmission additional information to be forwarded is mapped onto the index of the active relay-selection pattern besides the basic information mapped onto the traditional constellation, which is forwarded by the relay node(s) in the active relay-selection pattern, so as to enhance the relay throughtput. With iterative decoding, the destination node can achieve a robust detection by decoupling the signals forwarded in different ways. We investigate the proposed scheme considering "decode-and-forward" protocol and establish its achievable transmission rate. The analytical results on capacity behaviors prove the efficiency of the proposed scheme by showing that it achieves better capacity performance than the conventional scheme. © 2011 IEEE.

  17. Assessment of Sub-Micron Particles by Exploiting Charge Differences with Dielectrophoresis

    Directory of Open Access Journals (Sweden)

    Maria F. Romero-Creel

    2017-08-01

    Full Text Available The analysis, separation, and enrichment of submicron particles are critical steps in many applications, ranging from bio-sensing to disease diagnostics. Microfluidic electrokinetic techniques, such as dielectrophoresis (DEP have proved to be excellent platforms for assessment of submicron particles. DEP is the motion of polarizable particles under the presence of a non-uniform electric field. In this work, the polarization and dielectrophoretic behavior of polystyrene particles with diameters ranging for 100 nm to 1 μm were studied employing microchannels for insulator based DEP (iDEP and low frequency (<1000 Hz AC and DC electric potentials. In particular, the effects of particle surface charge, in terms of magnitude and type of functionalization, were examined. It was found that the magnitude of particle surface charge has a significant impact on the polarization and dielectrophoretic response of the particles, allowing for successful particle assessment. Traditionally, charge differences are exploited employing electrophoretic techniques and particle separation is achieved by differential migration. The present study demonstrates that differences in the particle’s surface charge can also be exploited by means of iDEP; and that distinct types of nanoparticles can be identified by their polarization and dielectrophoretic behavior. These findings open the possibility for iDEP to be employed as a technique for the analysis of submicron biological particles, where subtle differences in surface charge could allow for rapid particle identification and separation.

  18. Active and Non-Active Volumetric Information Spaces to Supplement Traditional Rehabilitation

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2013-01-01

    The purpose of this paper is to inform on findings from a mature body of research titled SoundScapes. The goal was to define, create and question sensor-based ICT systems, techniques and methods to supplement traditional rehabilitation. Following initial biofeedback/sensorimotor tests, a noninvas......The purpose of this paper is to inform on findings from a mature body of research titled SoundScapes. The goal was to define, create and question sensor-based ICT systems, techniques and methods to supplement traditional rehabilitation. Following initial biofeedback/sensorimotor tests...

  19. Flexible magnetoimpedance sensor

    KAUST Repository

    Li, Bodong; Kavaldzhiev, Mincho; Kosel, Jü rgen

    2015-01-01

    Flexible magnetoimpedance (MI) sensors fabricated using a NiFe/Cu/NiFe tri-layer on Kapton substrate have been studied. A customized flexible microstrip transmission line was employed to investigate the MI sensors's magnetic field and frequency

  20. Air Sensor Toolbox

    Science.gov (United States)

    Air Sensor Toolbox provides information to citizen scientists, researchers and developers interested in learning more about new lower-cost compact air sensor technologies and tools for measuring air quality.

  1. Invisible magnetic sensors

    Science.gov (United States)

    Mach-Batlle, Rosa; Navau, Carles; Sanchez, Alvaro

    2018-04-01

    Sensing magnetic fields is essential in many applications in biomedicine, transportation, or smart cities. The distortion magnetic sensors create in response to the field they are detecting may hinder their use, for example, in applications requiring dense packaging of sensors or accurately shaped field distributions. For sensing electromagnetic waves, cloaking shells that reduce the scattering of sensors have been introduced. However, the problem of making a magnetic sensor undetectable remains unsolved. Here, we present a general strategy on how to make a sensor magnetically invisible while keeping its ability to sense. The sensor is rendered undetectable by surrounding it with a spherical shell having a tailored magnetic permeability. Our method can be applied to arbitrary shaped magnetic sensors in arbitrary magnetic fields. The invisibility can be made exact when the sensor is spherical and the probed field is uniform. A metasurface composed of superconducting pieces is presented as a practical realization of the ideal invisibility shell.

  2. Embedded sensor systems

    CERN Document Server

    Agrawal, Dharma Prakash

    2017-01-01

    This inspiring textbook provides an introduction to wireless technologies for sensors, explores potential use of sensors for numerous applications, and utilizes probability theory and mathematical methods as a means of embedding sensors in system design. It discusses the need for synchronization and underlying limitations, inter-relation between given coverage and connectivity to number of sensors needed, and the use of geometrical distance to determine location of the base station for data collection and explore use of anchor nodes for relative position determination of sensors. The book explores energy conservation, communication using TCP, the need for clustering and data aggregation, and residual energy determination and energy harvesting. It covers key topics of sensor communication like mobile base stations and relay nodes, delay-tolerant sensor networks, and remote sensing and possible applications. The book defines routing methods and do performance evaluation for random and regular sensor topology an...

  3. Sensor Substrate Development

    Data.gov (United States)

    National Aeronautics and Space Administration — Novel substrates, such as aerogels and porous, low density ceramics may increase the sensitivities of chemical reaction-based sensors for toxic vapors. These sensors...

  4. A simple, tunable, and highly sensitive radio-frequency sensor.

    Science.gov (United States)

    Cui, Yan; Sun, Jiwei; He, Yuxi; Wang, Zheng; Wang, Pingshan

    2013-08-05

    We report a radio frequency (RF) sensor that exploits tunable attenuators and phase shifters to achieve high-sensitivity and broad band frequency tunability. Three frequency bands are combined to enable sensor operations from ∼20 MHz to ∼38 GHz. The effective quality factor ( Q eff ) of the sensor is as high as ∼3.8 × 10 6 with 200  μ l of water samples. We also demonstrate the measurement of 2-proponal-water-solution permittivity at 0.01 mole concentration level from ∼1 GHz to ∼10 GHz. Methanol-water solution and de-ionized water are used to calibrate the RF sensor for the quantitative measurements.

  5. Flexible temperature and flow sensor from laser-induced graphene

    KAUST Repository

    Marengo, Marco

    2017-12-25

    Herein we present a flexible temperature sensor and a flow speed sensor based on laser-induced graphene. The main benefits arise from peculiar electrical, thermal and mechanical performances of the material thus obtained, along with a cheap and simple fabrication process. The temperature sensor is a negative temperature coefficient thermistor with non-linear response typical of semi-metals. The thermistor shows a 4% decrease of the resistance in a temperature range of 20–60 °C. The flow sensor exploits the piezoresistive properties of laser-induced graphene and can be used both in gaseous and liquid media thanks to a protective polydimethylsiloxane coating. Main characteristics are ultra-fast response and versatility in design offered by the laser technology.

  6. NATO Advanced Study Institute on Nanotechnological Basis for Advanced Sensors

    CERN Document Server

    Reithmaier, Johann Peter; Kulisch, Wilhelm; Popov, Cyril; Petkov, Plamen

    2011-01-01

    Bringing together experts from 15 countries, this book is based on the lectures and contributions of the NATO Advanced Study Institute on “Nanotechnological Basis for Advanced Sensors” held in Sozopol, Bulgaria, 30 May - 11 June, 2010. It gives a broad overview on this topic, and includes articles on: techniques for preparation and characterization of sensor materials; different types of nanoscaled materials for sensor applications, addressing both their structure (nanoparticles, nanocomposites, nanostructured films, etc.) and chemical nature (carbon-based, oxides, glasses, etc.); and on advanced sensors that exploit nanoscience and nanotechnology. In addition, the volume represents an interdisciplinary approach with authors coming from diverse fields such as physics, chemistry, engineering, materials science and biology. A particular strength of the book is its combination of longer papers, introducing the basic knowledge on a certain topic, and brief contributions highlighting special types of sensors a...

  7. Corroles-Porphyrins: A Teamwork for Gas Sensor Arrays

    Directory of Open Access Journals (Sweden)

    Rosamaria Capuano

    2015-04-01

    Full Text Available Porphyrins provide an excellent material for chemical sensors, and they have been used for sensing species both in air and solution. In the gas phase, the broad selectivity of porphyrins is largely dependant on molecular features, such as the metal ion complexed at the core of the aromatic ring and the peripheral substituents. Although these features have been largely exploited to design gas sensor arrays, so far, little attention has been devoted to modify the sensing properties of these macrocycles by variation of the molecular aromatic ring. In this paper, the gas sensing properties of a porphyrin analog, the corrole, are studied in comparison with those of the parent porphyrin. Results show that changes in the aromatic ring have important consequences on the sensitivity and selectivity of the sensors and that porphyrins and corroles can positively cooperate to enhance the performance of sensor arrays.

  8. A triboelectric motion sensor in wearable body sensor network for human activity recognition.

    Science.gov (United States)

    Hui Huang; Xian Li; Ye Sun

    2016-08-01

    The goal of this study is to design a novel triboelectric motion sensor in wearable body sensor network for human activity recognition. Physical activity recognition is widely used in well-being management, medical diagnosis and rehabilitation. Other than traditional accelerometers, we design a novel wearable sensor system based on triboelectrification. The triboelectric motion sensor can be easily attached to human body and collect motion signals caused by physical activities. The experiments are conducted to collect five common activity data: sitting and standing, walking, climbing upstairs, downstairs, and running. The k-Nearest Neighbor (kNN) clustering algorithm is adopted to recognize these activities and validate the feasibility of this new approach. The results show that our system can perform physical activity recognition with a successful rate over 80% for walking, sitting and standing. The triboelectric structure can also be used as an energy harvester for motion harvesting due to its high output voltage in random low-frequency motion.

  9. TERMITES ENDANGERED TRADITIONAL MEDICAL PLANTS

    Directory of Open Access Journals (Sweden)

    Syaukani Syaukani

    2014-04-01

    Full Text Available Surveys on traditional medical plants affected by termites have been conducted since June to August 2010 at Ketambe, northern Aceh. Traditional medical plants and their natural habitats were obtained through interviewing local people. Termites were collected by adopted a Standardized Sampling Protocol and final. taxonomic confirmation was done with the help of Termite Research Group (the Natural History Museum, London. About 20 species of medical plants were attacked by termites with various levels. Nine genera and 20 species were collected from various habitats throughout Ketambe, Simpur as well as Gunung Setan villages. Coffe (Coffea arabica, hazelnut (Aleurites moluccana , and areca (Area catechu were among the worse of traditional medical  plant that had been attached by the termites.

  10. Digital Sensor Technology

    Energy Technology Data Exchange (ETDEWEB)

    Ted Quinn; Jerry Mauck; Richard Bockhorst; Ken Thomas

    2013-07-01

    The nuclear industry has been slow to incorporate digital sensor technology into nuclear plant designs due to concerns with digital qualification issues. However, the benefits of digital sensor technology for nuclear plant instrumentation are substantial in terms of accuracy, reliability, availability, and maintainability. This report demonstrates these benefits in direct comparisons of digital and analog sensor applications. It also addresses the qualification issues that must be addressed in the application of digital sensor technology.

  11. Distributed Similarity based Clustering and Compressed Forwarding for wireless sensor networks.

    Science.gov (United States)

    Arunraja, Muruganantham; Malathi, Veluchamy; Sakthivel, Erulappan

    2015-11-01

    Wireless sensor networks are engaged in various data gathering applications. The major bottleneck in wireless data gathering systems is the finite energy of sensor nodes. By conserving the on board energy, the life span of wireless sensor network can be well extended. Data communication being the dominant energy consuming activity of wireless sensor network, data reduction can serve better in conserving the nodal energy. Spatial and temporal correlation among the sensor data is exploited to reduce the data communications. Data similar cluster formation is an effective way to exploit spatial correlation among the neighboring sensors. By sending only a subset of data and estimate the rest using this subset is the contemporary way of exploiting temporal correlation. In Distributed Similarity based Clustering and Compressed Forwarding for wireless sensor networks, we construct data similar iso-clusters with minimal communication overhead. The intra-cluster communication is reduced using adaptive-normalized least mean squares based dual prediction framework. The cluster head reduces the inter-cluster data payload using a lossless compressive forwarding technique. The proposed work achieves significant data reduction in both the intra-cluster and the inter-cluster communications, with the optimal data accuracy of collected data. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  12. The use of handwriting examinations beyond the traditional court purpose.

    Science.gov (United States)

    Agius, Anna; Jones, Kylie; Epple, Rochelle; Morelato, Marie; Moret, Sébastien; Chadwick, Scott; Roux, Claude

    2017-09-01

    Traditionally, forensic science has predominantly focused its resources and objectives on addressing court related questions. However, this view restricts the contribution of forensic science to one function and results in lost opportunities as investigative and intelligence roles are often overlooked. A change of perspective and expansion of the contributions of forensic science is required to take advantage of the benefits of abductive and inductive thought processes throughout the investigative and intelligence functions. One forensic discipline that has the potential to broaden its traditional focus is handwriting examination. Typically used in investigations that are focused on both criminal and civil cases, the examination procedure and outcome are time consuming and subjective, requiring a detailed study of the features of the handwriting in question. Traditionally, the major handwriting features exploited are characteristics that are often considered individual (or at least highly polymorphic) and habitual. However, handwriting can be considered as an information vector in an intelligence framework. One such example is the recognition of key elements related to the author's native language. This paper discusses the traditional method generally used around the world and proposes a theoretical approach to expand the application of handwriting examination towards gaining additional information for intelligence purposes. This concept will be designed and tested in a future research project. Copyright © 2017 The Chartered Society of Forensic Sciences. All rights reserved.

  13. Analysis of Traditional Historical Clothing

    DEFF Research Database (Denmark)

    Jensen, Karsten; Schmidt, A. L.; Petersen, A. H.

    2013-01-01

    for establishing a three-dimensional model and the corresponding two-dimensional pattern for items of skin clothing that are not flat. The new method is non-destructive, and also accurate and fast. Furthermore, this paper presents an overview of the more traditional methods of pattern documentation and measurement......A recurrent problem for scholars who investigate traditional and historical clothing is the measuring of items of clothing and subsequent pattern construction. The challenge is to produce exact data without damaging the item. The main focus of this paper is to present a new procedure...

  14. Focus on image sensors

    NARCIS (Netherlands)

    Jos Gunsing; Daniël Telgen; Johan van Althuis; Jaap van de Loosdrecht; Mark Stappers; Peter Klijn

    2013-01-01

    Robots need sensors to operate properly. Using a single image sensor, various aspects of a robot operating in its environment can be measured or monitored. Over the past few years, image sensors have improved a lot: frame rate and resolution have increased, while prices have fallen. As a result,

  15. Multi-Sensor Architectures

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar; Ahmed, Zaki; Khan, M. Z.

    2012-01-01

    The use of multiple sensors typically requires the fusion of data from different type of sensors. The combined use of such a data has the potential to give an efficient, high quality and reliable estimation. Input data from different sensors allows the introduction of target attributes (target ty...

  16. Thermal flow micro sensors

    NARCIS (Netherlands)

    Elwenspoek, Michael Curt

    1999-01-01

    A review is given on sensors fabricated by silicon micromachining technology using the thermal domain for the measurement of fluid flow. Attention is paid especially to performance and geometry of the sensors. Three basic types of thermal flow sensors are discussed: anemometers, calorimetric flow

  17. Sensors for Entertainment

    Directory of Open Access Journals (Sweden)

    Fabrizio Lamberti

    2016-07-01

    Full Text Available Sensors are becoming ubiquitous in all areas of science, technology, and society. In this Special Issue on “Sensors for Entertainment”, developments in progress and the current state of application scenarios for sensors in the field of entertainment is explored.

  18. Electric field sensor studies

    International Nuclear Information System (INIS)

    Griffith, R.D.; Parks, S.

    1977-01-01

    Above-ground intrusion sensors are reviewed briefly. Buried wire sensors are next considered; feasibility studies were conducted. A triangular system of an overhead transmitter wire exciting two buried sensor wires was developed and tested. It failed sometimes to detect a man making a broad jump. A differential receiver was developed to solve this problem

  19. Staying alive! Sensors used for monitoring cell health in bioreactors.

    Science.gov (United States)

    O'Mara, P; Farrell, A; Bones, J; Twomey, K

    2018-01-01

    Current and next generation sensors such as pH, dissolved oxygen (dO) and temperature sensors that will help drive the use of single-use bioreactors in industry are reviewed. The current trend in bioreactor use is shifting from the traditional fixed bioreactors to the use of single-use bioreactors (SUBs). However as the shift in paradigm occurs there is now a greater need for sensor technology to play 'catch up' with the innovation of bioreactor technology. Many of the sensors still in use today rely on technology created in the 1960's such as the Clark-type dissolved oxygen sensor or glass pH electrodes. This is due to the strict requirements of sensors to monitor bioprocesses resulting in the use of traditional well understood methods, making it difficult to incorporate new sensor technology into industry. A number of advances in sensor technology have been achieved in recent years, a few of these advances and future research will also be discussed in this review. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Fiber Optic Strain Sensor for Planetary Gear Diagnostics

    Science.gov (United States)

    Kiddy, Jason S.; Lewicki, David G.; LaBerge, Kelsen E.; Ehinger, Ryan T.; Fetty, Jason

    2011-01-01

    This paper presents a new sensing approach for helicopter damage detection in the planetary stage of a helicopter transmission based on a fiber optic strain sensor array. Complete helicopter transmission damage detection has proven itself a difficult task due to the complex geometry of the planetary reduction stage. The crowded and complex nature of the gearbox interior does not allow for attachment of sensors within the rotating frame. Hence, traditional vibration-based diagnostics are instead based on measurements from externally mounted sensors, typically accelerometers, fixed to the gearbox exterior. However, this type of sensor is susceptible to a number of external disturbances that can corrupt the data, leading to false positives or missed detection of potentially catastrophic faults. Fiber optic strain sensors represent an appealing alternative to the accelerometer. Their small size and multiplexibility allows for potentially greater sensing resolution and accuracy, as well as redundancy, when employed as an array of sensors. The work presented in this paper is focused on the detection of gear damage in the planetary stage of a helicopter transmission using a fiber optic strain sensor band. The sensor band includes an array of 13 strain sensors, and is mounted on the ring gear of a Bell Helicopter OH-58C transmission. Data collected from the sensor array is compared to accelerometer data, and the damage detection results are presented

  1. Distributed adaptive diagnosis of sensor faults using structural response data

    Science.gov (United States)

    Dragos, Kosmas; Smarsly, Kay

    2016-10-01

    The reliability and consistency of wireless structural health monitoring (SHM) systems can be compromised by sensor faults, leading to miscalibrations, corrupted data, or even data loss. Several research approaches towards fault diagnosis, referred to as ‘analytical redundancy’, have been proposed that analyze the correlations between different sensor outputs. In wireless SHM, most analytical redundancy approaches require centralized data storage on a server for data analysis, while other approaches exploit the on-board computing capabilities of wireless sensor nodes, analyzing the raw sensor data directly on board. However, using raw sensor data poses an operational constraint due to the limited power resources of wireless sensor nodes. In this paper, a new distributed autonomous approach towards sensor fault diagnosis based on processed structural response data is presented. The inherent correlations among Fourier amplitudes of acceleration response data, at peaks corresponding to the eigenfrequencies of the structure, are used for diagnosis of abnormal sensor outputs at a given structural condition. Representing an entirely data-driven analytical redundancy approach that does not require any a priori knowledge of the monitored structure or of the SHM system, artificial neural networks (ANN) are embedded into the sensor nodes enabling cooperative fault diagnosis in a fully decentralized manner. The distributed analytical redundancy approach is implemented into a wireless SHM system and validated in laboratory experiments, demonstrating the ability of wireless sensor nodes to self-diagnose sensor faults accurately and efficiently with minimal data traffic. Besides enabling distributed autonomous fault diagnosis, the embedded ANNs are able to adapt to the actual condition of the structure, thus ensuring accurate and efficient fault diagnosis even in case of structural changes.

  2. Size of silicon strip sensor from 6 inch wafer (right) compared to that from a 4 inch wafer (left).

    CERN Multimedia

    Honma, Alan

    1999-01-01

    Silicon strip sensors made from 6 inch wafers will allow for much larger surface area coverage at a reduced cost per unit surface area. A prototype sensor of size 8cm x 11cm made by Hamamatsu from a 6 inch wafer is shown next to a traditional 6cm x 6cm sensor from a 4 inch wafer.

  3. Progress in triboluminescence-based smart optical sensor system

    International Nuclear Information System (INIS)

    Olawale, David O.; Dickens, Tarik; Sullivan, William G.; Okoli, Okenwa I.; Sobanjo, John O.; Wang, Ben

    2011-01-01

    Extensive research work has been done in recent times to apply the triboluminescence (TL) phenomenon for damage detection in engineering structures. Of particular note are the various attempts to apply it in the detection of impact damages in composites and aerospace structures. This is because TL-based sensor systems have a great potential for wireless, in-situ and distributed (WID) structural health monitoring when fully developed. This review article highlights development and the current state-of-the-art in the application of TL-based sensor systems. The underlying mechanisms believed to be responsible for triboluminescence, particularly in zinc sulfide manganese, a highly triboluminescent material, are discussed. The challenges militating against the full exploitation and field application of TL sensor systems are also identified. Finally, viable solutions and approaches to address these challenges are enumerated. - Highlights: → The underlying mechanisms believed to be responsible for triboluminescence. → State-of-the-art in the development and application of TL-based sensor systems. → The challenges militating against the full exploitation and field application of TL sensor systems are identified. → Viable solutions and approaches to address these challenges are enumerated.

  4. An Environmental Monitoring System for Managing Spatiotemporal Sensor Data over Sensor Networks

    Directory of Open Access Journals (Sweden)

    Keun Ho Ryu

    2012-03-01

    Full Text Available In a wireless sensor network, sensors collect data about natural phenomena and transmit them to a server in real-time. Many studies have been conducted focusing on the processing of continuous queries in an approximate form. However, this approach is difficult to apply to environmental applications which require the correct data to be stored. In this paper, we propose a weather monitoring system for handling and storing the sensor data stream in real-time in order to support continuous spatial and/or temporal queries. In our system, we exploit two time-based insertion methods to store the sensor data stream and reduce the number of managed tuples, without losing any of the raw data which are useful for queries, by using the sensors’ temporal attributes. In addition, we offer a method for reducing the cost of the join operations used in processing spatiotemporal queries by filtering out a list of irrelevant sensors from query range before making a join operation. In the results of the performance evaluation, the number of tuples obtained from the data stream is reduced by about 30% in comparison to a naïve approach, thereby decreasing the query execution time.

  5. Appraisal of traditional technologies i

    African Journals Online (AJOL)

    Jobo

    A survey on the production practices and mode of utilization of mumu – a traditional, ready-to-eat Nigerian cereal-based food product - was conducted to be able to provide information that would be used to improve on the processing, nutritional quality and acceptability of the product. 83 % of respondents indicated the use ...

  6. Active Learning versus Traditional Teaching

    Directory of Open Access Journals (Sweden)

    L.A. Azzalis

    2009-05-01

    Full Text Available In traditional teaching most of the class time is spent with the professor lecturing and the students watching and listening. The students work individually, and cooperation is discouraged. On the other hand,  active learning  changes the focus of activity from the teacher to the learners, in which students solve problems, answer questions, formulate questions of their own, discuss, explain, debate during class;  moreover, students work in teams on problems and projects under conditions that assure positive interdependence and individual accountability. Although student-centered methods have repeatedly been shown to be superior to the traditional teacher-centered approach to instruction, the literature regarding the efficacy of various teaching methods is inconclusive. The purpose of this study was to compare the student perceptions of course and instructor effectiveness, course difficulty, and amount learned between the active learning and lecture sections  in Health Sciences´ courses by statistical data from Anhembi Morumbi University. Results indicated significant  difference between active  learning and traditional  teaching. Our conclusions were that strategies promoting  active  learning to  traditional lectures could increase knowledge and understanding.

  7. Individualizing in Traditional Classroom Settings.

    Science.gov (United States)

    Thornell, John G.

    1980-01-01

    Effective individualized instruction depends primarily on the teacher possessing the skills to implement it. Individualization is therefore quite compatible with the traditional self-contained elementary classroom model, but not with its alternative, departmentalization, which allows teachers neither the time flexibility nor the familiarity with…

  8. Waldorf Education: An Innovative Tradition.

    Science.gov (United States)

    Harrington, Sheila

    1993-01-01

    Waldorf Schools represent the largest nonsectarian school movement in the world, shunning fads and technology and relying on the creative gifts of teachers and students. Studies include eurythmy, woodworking, weaving, and traditional academic subjects, and no commercial textbooks are used. Despite teacher/funding shortages, the system continues to…

  9. Traditional Knowledge and Patent Protection

    African Journals Online (AJOL)

    Adam

    intellectual property rights laws. 5 into traditional knowledge areas, in turn, has ... range of innovations in industrial, agricultural, environment and health ... Ministry for the Environment, Nature Conservation and Nuclear Safety 2008 ..... Ghosh 2003 Colum J Asian L 106. 80 ..... Management'" 1998 Mich Law Rev 462-556.

  10. Does Scottish Education Need Traditions?

    Science.gov (United States)

    Paterson, Lindsay

    2009-01-01

    Scottish education was, until quite recently, the conscious product of liberal tradition, of the belief by influential elites that the nation's educational history was strong, coherent, and progressive, a source of economic flexibility, of modernising ideas, and of liberal opportunity. In recent decades, however, it has become fashionable to decry…

  11. Japan between tradition and renewal

    DEFF Research Database (Denmark)

    Greve, Anni

    what is still visible in the cityscapes. Furthermore, according to Greve’s publication “Learning from Tokyo urbanism: The urban sanctuaries”, they will figure out how traditions frame interactions between strangers. Thereby, the tea ceremony serves as an example for spaces in-between public and private...

  12. Traditional Chinese Masks Reveal Customs

    Institute of Scientific and Technical Information of China (English)

    1996-01-01

    CHINESE masks are undoubtedly an important component in the worldwide mask culture. Minority nationality masks are a major component of China’s mask culture. Traditional Chinese masks, or nuo, represent a cultural component which originated from religious rites in prehistoric times. Various types of nuo are highly valuable for studies of Chinese customs.

  13. Traditional Literacy and Critical Thinking

    Science.gov (United States)

    Dando, Priscille

    2016-01-01

    How school librarians focus on activating critical thinking through traditional literacy development can proactively set the stage for the deep thinking that occurs in all literacy development. The critical-thinking skills students build while becoming accomplished readers and writers provide the foundation for learning in a variety of…

  14. Goddess Traditions in Tantric Hinduism

    DEFF Research Database (Denmark)

    Hinduism cannot be understood without the Great Goddess and the goddess-orientated Śākta traditions. The Goddess pervades Hinduism at all levels, from aniconic village deities to high-caste pan-Hindu goddesses to esoteric, tantric goddesses. Nevertheless, the highly influential tantric forms...

  15. Energy optimization in mobile sensor networks

    Science.gov (United States)

    Yu, Shengwei

    Mobile sensor networks are considered to consist of a network of mobile robots, each of which has computation, communication and sensing capabilities. Energy efficiency is a critical issue in mobile sensor networks, especially when mobility (i.e., locomotion control), routing (i.e., communications) and sensing are unique characteristics of mobile robots for energy optimization. This thesis focuses on the problem of energy optimization of mobile robotic sensor networks, and the research results can be extended to energy optimization of a network of mobile robots that monitors the environment, or a team of mobile robots that transports materials from stations to stations in a manufacturing environment. On the energy optimization of mobile robotic sensor networks, our research focuses on the investigation and development of distributed optimization algorithms to exploit the mobility of robotic sensor nodes for network lifetime maximization. In particular, the thesis studies these five problems: 1. Network-lifetime maximization by controlling positions of networked mobile sensor robots based on local information with distributed optimization algorithms; 2. Lifetime maximization of mobile sensor networks with energy harvesting modules; 3. Lifetime maximization using joint design of mobility and routing; 4. Optimal control for network energy minimization; 5. Network lifetime maximization in mobile visual sensor networks. In addressing the first problem, we consider only the mobility strategies of the robotic relay nodes in a mobile sensor network in order to maximize its network lifetime. By using variable substitutions, the original problem is converted into a convex problem, and a variant of the sub-gradient method for saddle-point computation is developed for solving this problem. An optimal solution is obtained by the method. Computer simulations show that mobility of robotic sensors can significantly prolong the lifetime of the whole robotic sensor network while

  16. Challenges in authorization of exploration and exploitation of radioactive minerals in Slovakia

    International Nuclear Information System (INIS)

    Janova, V.; Turner, M.

    2014-01-01

    Slovakia has a long tradition in the peaceful use of nuclear energy which dates back to the 1950s of last century. In parallel with the development of nuclear power uranium exploitation has started. Whereas the development of nuclear power has continued without interruption the uranium exploitation has been suspended during the political and economic restructuralization until 2005. There is also a difference in the acceptance of nuclear power by the local authorities in comparison with uranium exploration and exploitation. Permitting process of exploration activities in the Slovak Republic is regulated by geological law and falls within the competence of the Ministry of Environment. Radioactive minerals are considered as exclusive minerals and their survey is allowed to the applicant only in exploration territory. The exploration area is determined for four years and then extended for additional periods. The opinions of the affected municipalities and self governing regions (which reflect the compliance of the geological project with the objectives and priorities of the economic and social development programs and with the land-use planning documentation) have to be submitted with the application. Meanwhile, the affected municipality and the self governing region are the parties of administrative procedure of designation, change or cancellation of exploration area for radioactive minerals and they have a right of veto. In case, that affected municipality or autonomous region disagree with proposal, the Ministry of the Environment recommends a modification of proposed exploration area. Extraction of minerals is regulated by the mining act that falls under the competency of the Ministry of Economy. The right to mine exclusive deposits has the organization which has got mining license and which a mining area has been determined to. Preferential right for mining area determination has the company, that exploration area was determined and the research was carried out at

  17. Hydrostatic force sensor

    International Nuclear Information System (INIS)

    Evans, M.S.; Stoughton, R.S.; Kazerooni, H.

    1994-08-01

    This paper presents a theoretical and experimental investigation of a new kind of force sensor which detects forces by measuring an induced pressure change in a material of large Poisson's ratio. In this investigation we develop mathematical expressions for the sensor's sensitivity and bandwidth, and show that its sensitivity can be much larger and its bandwidth is usually smaller than those of existing strain-gage-type sensors. This force sensor is well-suited for measuring large but slowly varying forces. It can be installed in a space smaller than that required by existing sensors

  18. Multifuctional integrated sensors (MFISES).

    Energy Technology Data Exchange (ETDEWEB)

    Homeijer, Brian D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Roozeboom, Clifton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    Many emerging IoT applications require sensing of multiple physical and environmental parameters for: completeness of information, measurement validation, unexpected demands, improved performance. For example, a typical outdoor weather station measures temperature, humidity, barometric pressure, light intensity, rainfall, wind speed and direction. Existing sensor technologies do not directly address the demand for cost, size, and power reduction in multi-paramater sensing applications. Industry sensor manufacturers have developed integrated sensor systems for inertial measurements that combine accelerometers, gyroscopes, and magnetometers, but do not address environmental sensing functionality. In existing research literature, a technology gap exists between the functionality of MEMS sensors and the real world applications of the sensors systems.

  19. Evaluation of Virtual Refrigerant Mass Flow Sensors

    OpenAIRE

    Kim, Woohyun; Braun, James E.

    2012-01-01

    Refrigerant mass flow rate is an important measurement for monitoring equipment performance and enabling fault detection and diagnostics. However, a traditional mass flow meter is expensive to purchase and install. A virtual refrigerant mass flow sensor (VRMF) uses a mathematical model to estimate flow rate using low-cost measurements and can potentially be implemented at low cost. This study evaluates three VRMFs for estimating refrigerant mass flow rate. The first model uses a compressor ma...

  20. Sensor mount assemblies and sensor assemblies

    Science.gov (United States)

    Miller, David H [Redondo Beach, CA

    2012-04-10

    Sensor mount assemblies and sensor assemblies are provided. In an embodiment, by way of example only, a sensor mount assembly includes a busbar, a main body, a backing surface, and a first finger. The busbar has a first end and a second end. The main body is overmolded onto the busbar. The backing surface extends radially outwardly relative to the main body. The first finger extends axially from the backing surface, and the first finger has a first end, a second end, and a tooth. The first end of the first finger is disposed on the backing surface, and the tooth is formed on the second end of the first finger.