WorldWideScience

Sample records for spoofing richard glassey

  1. Handbook of biometric anti-spoofing trusted biometrics under spoofing attacks

    CERN Document Server

    Marcel, Sébastien; Li, Stan Z

    2014-01-01

    As the plethora of approaches to biometrics and their deployment continues to grow, so too does the need to combat the techniques used to subvert the aim of such biometric systems. Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems, and in deriving countermeasures to these attacks. Across a range of common biometrics, including face, iris, fingerprint, speaker and gait, the book describes spoofing methods and examines the vulnerabilities of biometric systems to these attacks.

  2. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  3. Electronically controllable spoof localized surface plasmons

    Science.gov (United States)

    Zhou, Yong Jin; Zhang, Chao; Yang, Liu; Xun Xiao, Qian

    2017-10-01

    Electronically controllable multipolar spoof localized surface plasmons (LSPs) are experimentally demonstrated in the microwave frequencies. It has been shown that half integer order LSPs modes exist on the corrugated ring loaded with a slit, which actually arise from the Fabry-Perot-like resonances. By mounting active components across the slit in the corrugated rings, electronic switchability and tunability of spoof LSPs modes have been accomplished. Both simulated and measured results demonstrate efficient dynamic control of the spoof LSPs. These elements may form the basis of highly integrated programmable plasmonic circuits in microwave and terahertz regimes.

  4. Guaranteeing Spoof-Resilient Multi-Robot Networks

    Science.gov (United States)

    2016-02-12

    identity. The ad- versary advertised identities by modifying the Wi-Fi MAC field, a common technique for faking multiple identities [38]. Evaluation: We...server positions (white ×) to two legitimate clients ( ) and six spoofed clients ( ). We consider: (a) an insecure system where each spoofed client

  5. Possibility of spoof attack against robustness of multibiometric authentication systems

    Science.gov (United States)

    Hariri, Mahdi; Shokouhi, Shahriar Baradaran

    2011-07-01

    Multibiometric systems have been recently developed in order to overcome some weaknesses of single biometric authentication systems, but security of these systems against spoofing has not received enough attention. In this paper, we propose a novel practical method for simulation of possibilities of spoof attacks against a biometric authentication system. Using this method, we model matching scores from standard to completely spoofed genuine samples. Sum, product, and Bayes fusion rules are applied for score level combination. The security of multimodal authentication systems are examined and compared with the single systems against various spoof possibilities. However, vulnerability of fused systems is considerably increased against spoofing, but their robustness is generally higher than single matcher systems. In this paper we show that robustness of a combined system is not always higher than a single system against spoof attack. We propose empirical methods for upgrading the security of multibiometric systems, which contain how to organize and select biometric traits and matchers against various possibilities of spoof attack. These methods provide considerable robustness and present an appropriate reason for using combined systems against spoof attacks.

  6. Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming

    KAUST Repository

    Canepa, Edward S.

    2013-01-01

    Traffic sensing systems rely more and more on user generated (insecure) data, which can pose a security risk whenever the data is used for traffic flow control. In this article, we propose a new formulation for detecting malicious data injection in traffic flow monitoring systems by using the underlying traffic flow model. The state of traffic is modeled by the Lighthill-Whitham- Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for some decision variable. We use this fact to pose the problem of detecting spoofing cyber-attacks in probe-based traffic flow information systems as mixed integer linear feasibility problem. The resulting framework can be used to detect spoofing attacks in real time, or to evaluate the worst-case effects of an attack offline. A numerical implementation is performed on a cyber-attack scenario involving experimental data from the Mobile Century experiment and the Mobile Millennium system currently operational in Northern California. © 2013 IEEE.

  7. Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming

    KAUST Repository

    Canepa, Edward S.

    2013-09-01

    Traffic sensing systems rely more and more on user generated (insecure) data, which can pose a security risk whenever the data is used for traffic flow control. In this article, we propose a new formulation for detecting malicious data injection in traffic flow monitoring systems by using the underlying traffic flow model. The state of traffic is modeled by the Lighthill- Whitham-Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data generated by multiple sensors of different types, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for a specific decision variable. We use this fact to pose the problem of detecting spoofing cyber attacks in probe-based traffic flow information systems as mixed integer linear feasibility problem. The resulting framework can be used to detect spoofing attacks in real time, or to evaluate the worst-case effects of an attack offliine. A numerical implementation is performed on a cyber attack scenario involving experimental data from the Mobile Century experiment and the Mobile Millennium system currently operational in Northern California. © American Institute of Mathematical Sciences.

  8. Spoofing Detection Using GNSS/INS/Odometer Coupling for Vehicular Navigation.

    Science.gov (United States)

    Broumandan, Ali; Lachapelle, Gérard

    2018-04-24

    Location information is one of the most vital information required to achieve intelligent and context-aware capability for various applications such as driverless cars. However, related security and privacy threats are a major holdback. With increasing focus on using Global Navigation Satellite Systems (GNSS) for autonomous navigation and related applications, it is important to provide robust navigation solutions, yet signal spoofing for illegal or covert transportation and misleading receiver timing is increasing and now frequent. Hence, detection and mitigation of spoofing attacks has become an important topic. Several contributions on spoofing detection have been made, focusing on different layers of a GNSS receiver. This paper focuses on spoofing detection utilizing self-contained sensors, namely inertial measurement units (IMUs) and vehicle odometer outputs. A spoofing detection approach based on a consistency check between GNSS and IMU/odometer mechanization is proposed. To detect a spoofing attack, the method analyses GNSS and IMU/odometer measurements independently during a pre-selected observation window and cross checks the solutions provided by GNSS and inertial navigation solution (INS)/odometer mechanization. The performance of the proposed method is verified in real vehicular environments. Mean spoofing detection time and detection performance in terms of receiver operation characteristics (ROC) in sub-urban and dense urban environments are evaluated.

  9. Spoofing Detection Using GNSS/INS/Odometer Coupling for Vehicular Navigation

    Directory of Open Access Journals (Sweden)

    Ali Broumandan

    2018-04-01

    Full Text Available Location information is one of the most vital information required to achieve intelligent and context-aware capability for various applications such as driverless cars. However, related security and privacy threats are a major holdback. With increasing focus on using Global Navigation Satellite Systems (GNSS for autonomous navigation and related applications, it is important to provide robust navigation solutions, yet signal spoofing for illegal or covert transportation and misleading receiver timing is increasing and now frequent. Hence, detection and mitigation of spoofing attacks has become an important topic. Several contributions on spoofing detection have been made, focusing on different layers of a GNSS receiver. This paper focuses on spoofing detection utilizing self-contained sensors, namely inertial measurement units (IMUs and vehicle odometer outputs. A spoofing detection approach based on a consistency check between GNSS and IMU/odometer mechanization is proposed. To detect a spoofing attack, the method analyses GNSS and IMU/odometer measurements independently during a pre-selected observation window and cross checks the solutions provided by GNSS and inertial navigation solution (INS/odometer mechanization. The performance of the proposed method is verified in real vehicular environments. Mean spoofing detection time and detection performance in terms of receiver operation characteristics (ROC in sub-urban and dense urban environments are evaluated.

  10. Automated spoof-detection for fingerprints using optical coherence tomography

    CSIR Research Space (South Africa)

    Darlow, LN

    2016-05-01

    Full Text Available that they are highly separable, resulting in 100% accuracy regarding spoof-detection, with no false rejections of real fingers. This is the first attempt at fully automated spoof-detection using OCT....

  11. Pass-band reconfigurable spoof surface plasmon polaritons

    Science.gov (United States)

    Zhang, Hao Chi; He, Pei Hang; Gao, Xinxin; Tang, Wen Xuan; Cui, Tie Jun

    2018-04-01

    In this paper, we introduce a new scheme to construct the band-pass tunable filter based on the band-pass reconfigurable spoof surface plasmon polaritons (SPPs), whose cut-off frequencies at both sides of the passband can be tuned through changing the direct current (DC) bias of varactors. Compared to traditional technology (e.g. microstrip filters), the spoof SPP structure can provide more tight field confinement and more significant field enhancement, which is extremely valuable for many system applications. In order to achieve this scheme, we proposed a specially designed SPP filter integrated with varactors and DC bias feeding structure to support the spoof SPP passband reconfiguration. Furthermore, the full-wave simulated result verifies the outstanding performance on both efficiency and reconfiguration, which has the potential to be widely used in advanced intelligent systems.

  12. Spoofing detection on facial images recognition using LBP and GLCM combination

    Science.gov (United States)

    Sthevanie, F.; Ramadhani, K. N.

    2018-03-01

    The challenge for the facial based security system is how to detect facial image falsification such as facial image spoofing. Spoofing occurs when someone try to pretend as a registered user to obtain illegal access and gain advantage from the protected system. This research implements facial image spoofing detection method by analyzing image texture. The proposed method for texture analysis combines the Local Binary Pattern (LBP) and Gray Level Co-occurrence Matrix (GLCM) method. The experimental results show that spoofing detection using LBP and GLCM combination achieves high detection rate compared to that of using only LBP feature or GLCM feature.

  13. Combining two strategies to optimize biometric decisions against spoofing attacks

    Science.gov (United States)

    Li, Weifeng; Poh, Norman; Zhou, Yicong

    2014-09-01

    Spoof attack by replicating biometric traits represents a real threat to an automatic biometric verification/ authentication system. This is because the system, originally designed to distinguish between genuine users from impostors, simply cannot distinguish between a replicated biometric sample (replica) from a live sample. An effective solution is to obtain some measures that can indicate whether or not a biometric trait has been tempered with, e.g., liveness detection measures. These measures are referred to as evidence of spoofing or anti-spoofing measures. In order to make the final accept/rejection decision, a straightforward solution to define two thresholds: one for the anti-spoofing measure, and another for the verification score. We compared two variants of a method that relies on applying two thresholds - one to the verification (matching) score and another to the anti-spoofing measure. Our experiments carried out using a signature database as well as by simulation show that both the brute-force and its probabilistic variant turn out to be optimal under different operating conditions.

  14. Spoof surface plasmon polaritons based notch filter for ultra-wideband microwave waveguide

    DEFF Research Database (Denmark)

    Xiao, Binggang; Li, Sheng-Hua; Xiao, Sanshui

    2016-01-01

    Spoof surface plasmon polaritons based notch filter for ultra-wideband microwave waveguide is proposed. Owing to subwavelength confinement, such a filter has advantage in the structure size without sacrificing the performance. The spoof SPP based notch is introduced to suppress the WLAN and satel......Spoof surface plasmon polaritons based notch filter for ultra-wideband microwave waveguide is proposed. Owing to subwavelength confinement, such a filter has advantage in the structure size without sacrificing the performance. The spoof SPP based notch is introduced to suppress the WLAN...

  15. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS FOR MOBILE WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R. Maivizhi

    2015-06-01

    Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.

  16. Terahertz particle-in-liquid sensing with spoof surface plasmon polariton waveguides

    Directory of Open Access Journals (Sweden)

    Zhijie Ma

    2017-11-01

    Full Text Available We present a highly sensitive microfluidic sensing technique for the terahertz (THz region of the electromagnetic spectrum based on spoof surface plasmon polaritons (SPPs. By integrating a microfluidic channel in a spoof SPP waveguide, we take advantage of these highly confined electromagnetic modes to create a platform for dielectric sensing of liquids. Our design consists of a domino waveguide, that is, a series of periodically arranged rectangular metal blocks on top of a metal surface that supports the propagation of spoof SPPs. Through numerical simulations, we demonstrate that the transmission of spoof SPPs along the waveguide is extremely sensitive to the refractive index of a liquid flowing through a microfluidic channel crossing the waveguide to give an interaction volume on the nanoliter scale. Furthermore, by taking advantage of the insensitivity of the domino waveguide’s fundamental spoof SPP mode to the lateral width of the metal blocks, we design a tapered waveguide able to achieve further confinement of the electromagnetic field. Using this approach, we demonstrate the highly sensitive detection of individual subwavelength micro-particles flowing in the liquid. These results are promising for the creation of spoof SPP based THz lab-on-a-chip microfluidic devices that are suitable for the analysis of biological liquids such as proteins and circulating tumour cells in buffer solution.

  17. Societal and ethical implications of anti-spoofing technologies in biometrics.

    Science.gov (United States)

    Rebera, Andrew P; Bonfanti, Matteo E; Venier, Silvia

    2014-03-01

    Biometric identification is thought to be less vulnerable to fraud and forgery than are traditional forms of identification. However biometric identification is not without vulnerabilities. In a 'spoofing attack' an artificial replica of an individual's biometric trait is used to induce a system to falsely infer that individual's presence. Techniques such as liveness-detection and multi-modality, as well as the development of new and emerging modalities, are intended to secure biometric identification systems against such threats. Unlike biometrics in general, the societal and ethical issues raised by spoofing and anti-spoofing techniques have not received much attention. This paper examines these issues.

  18. Detection of Spoofed MAC Addresses in 802.11 Wireless Networks

    Science.gov (United States)

    Tao, Kai; Li, Jing; Sampalli, Srinivas

    Medium Access Control (MAC) address spoofing is considered as an important first step in a hacker's attempt to launch a variety of attacks on 802.11 wireless networks. Unfortunately, MAC address spoofing is hard to detect. Most current spoofing detection systems mainly use the sequence number (SN) tracking technique, which has drawbacks. Firstly, it may lead to an increase in the number of false positives. Secondly, such techniques cannot be used in systems with wireless cards that do not follow standard 802.11 sequence number patterns. Thirdly, attackers can forge sequence numbers, thereby causing the attacks to go undetected. We present a new architecture called WISE GUARD (Wireless Security Guard) for detection of MAC address spoofing on 802.11 wireless LANs. It integrates three detection techniques - SN tracking, Operating System (OS) fingerprinting & tracking and Received Signal Strength (RSS) fingerprinting & tracking. It also includes the fingerprinting of Access Point (AP) parameters as an extension to the OS fingerprinting for detection of AP address spoofing. We have implemented WISE GUARD on a test bed using off-the-shelf wireless devices and open source drivers. Experimental results show that the new design enhances the detection effectiveness and reduces the number of false positives in comparison with current approaches.

  19. Spoof surface plasmon polaritons based notch filter for ultra-wideband microwave waveguide

    DEFF Research Database (Denmark)

    Xiao, Binggang; Li, Sheng-Hua; Xiao, Sanshui

    2016-01-01

    Spoof surface plasmon polaritons based notch filter for ultra-wideband microwave waveguide is proposed. Owing to subwavelength confinement, such a filter has advantage in the structure size without sacrificing the performance. The spoof SPP based notch is introduced to suppress the WLAN and satel...... and satellite communication signals. Due to planar structures proposed here, it is easy to integrate in the microwave integrated systems, which can play an important role in the microwave communication circuit and system.......Spoof surface plasmon polaritons based notch filter for ultra-wideband microwave waveguide is proposed. Owing to subwavelength confinement, such a filter has advantage in the structure size without sacrificing the performance. The spoof SPP based notch is introduced to suppress the WLAN...

  20. Feature Set Fusion for Spoof Iris Detection

    Directory of Open Access Journals (Sweden)

    P. V. L. Suvarchala

    2018-04-01

    Full Text Available Iris recognition is considered as one of the most promising noninvasive biometric systems providing automated human identification. Numerous programs, like unique ID program in India - Aadhar, include iris biometric to provide distinctive identity identification to citizens. The active area is usually captured under non ideal imaging conditions. It usually suffers from poor brightness, low contrast, blur due to camera or subject's relative movement and eyelid eyelash occlusions. Besides the technical challenges, iris recognition started facing sophisticated threats like spoof attacks. Therefore it is vital that the integrity of such large scale iris deployments must be preserved. This paper presents the development of a new spoof resistant approach which exploits the statistical dependencies of both general eye and localized iris regions in textural domain using spatial gray level dependence matrix (SGLDM, gray level run length matrix (GLRLM and contourlets in transform domain. We did experiments on publicly available fake and lens iris image databases. Correct classification rate obtained with ATVS-FIr iris database is 100% while it is 95.63% and 88.83% with IITD spoof iris databases respectively.

  1. Face Spoof Attack Recognition Using Discriminative Image Patches

    Directory of Open Access Journals (Sweden)

    Zahid Akhtar

    2016-01-01

    Full Text Available Face recognition systems are now being used in many applications such as border crossings, banks, and mobile payments. The wide scale deployment of facial recognition systems has attracted intensive attention to the reliability of face biometrics against spoof attacks, where a photo, a video, or a 3D mask of a genuine user’s face can be used to gain illegitimate access to facilities or services. Though several face antispoofing or liveness detection methods (which determine at the time of capture whether a face is live or spoof have been proposed, the issue is still unsolved due to difficulty in finding discriminative and computationally inexpensive features and methods for spoof attacks. In addition, existing techniques use whole face image or complete video for liveness detection. However, often certain face regions (video frames are redundant or correspond to the clutter in the image (video, thus leading generally to low performances. Therefore, we propose seven novel methods to find discriminative image patches, which we define as regions that are salient, instrumental, and class-specific. Four well-known classifiers, namely, support vector machine (SVM, Naive-Bayes, Quadratic Discriminant Analysis (QDA, and Ensemble, are then used to distinguish between genuine and spoof faces using a voting based scheme. Experimental analysis on two publicly available databases (Idiap REPLAY-ATTACK and CASIA-FASD shows promising results compared to existing works.

  2. Minimal model for spoof acoustoelastic surface states

    Directory of Open Access Journals (Sweden)

    J. Christensen

    2014-12-01

    Full Text Available Similar to textured perfect electric conductors for electromagnetic waves sustaining artificial or spoof surface plasmons we present an equivalent phenomena for the case of sound. Aided by a minimal model that is able to capture the complex wave interaction of elastic cavity modes and airborne sound radiation in perfect rigid panels, we construct designer acoustoelastic surface waves that are entirely controlled by the geometrical environment. Comparisons to results obtained by full-wave simulations confirm the feasibility of the model and we demonstrate illustrative examples such as resonant transmissions and waveguiding to show a few examples of many where spoof elastic surface waves are useful.

  3. Effect of Multi-condition Training and Speech Enhancement Methods on Spoofing Detection

    DEFF Research Database (Denmark)

    Yu, Hong; Sarkar, Achintya Kumar; Thomsen, Dennis Alexander Lehmann

    2016-01-01

    enhancement methods on a state of-the-art spoofing detection system based on the dynamic linear frequency cepstral coefficients (LFCC) feature and a Gaussian mixture model maximum-likelihood (GMM-ML) classifier. In the experiment part we consider three additive noise types, Cantine, Babble and white Gaussian......Many researchers have demonstrated the good performance of spoofing detection systems under clean training and testing conditions. However, it is well known that the performance of speaker and speech recognition systems significantly degrades in noisy conditions. Therefore, it is of great interest...... to investigate the effect of noise on the performance of spoofing detection systems. In this paper, we investigate a multi-conditional training method where spoofing detection models are trained with a mix of clean and noisy data. In addition, we study the effect of different noise types as well as speech...

  4. Investigasi Forensik Pada E-Mail Spoofing Menggunakan Metode Header Analysis

    OpenAIRE

    Hoiriyah, Hoiriyah; Sugiantoro, Bambang; Prayudi, Yudi

    2016-01-01

    Email merupakan salah satu fasilitas internet yang banyak digunakan untuk komunikasi dan bertukar informasi. Hal ini memungkinkan pihak ketiga menyalahgunakan email untuk mendapatkan informasi secara ilegal dengan mengubah identitas pengirim email dan menjadikannya seperti email yang berasal dari email yang sah (legitimate email), aktivitas tersebut biasa dikenal dengan istilah email spoofing. Untuk dapat mendeteksi adanya email spoofing, maka perlu adanya investigasi forensik email terhadap ...

  5. A Smart Spoofing Face Detector by Display Features Analysis

    Directory of Open Access Journals (Sweden)

    ChinLun Lai

    2016-07-01

    Full Text Available In this paper, a smart face liveness detector is proposed to prevent the biometric system from being “deceived” by the video or picture of a valid user that the counterfeiter took with a high definition handheld device (e.g., iPad with retina display. By analyzing the characteristics of the display platform and using an expert decision-making core, we can effectively detect whether a spoofing action comes from a fake face displayed in the high definition display by verifying the chromaticity regions in the captured face. That is, a live or spoof face can be distinguished precisely by the designed optical image sensor. To sum up, by the proposed method/system, a normal optical image sensor can be upgraded to a powerful version to detect the spoofing actions. The experimental results prove that the proposed detection system can achieve very high detection rate compared to the existing methods and thus be practical to implement directly in the authentication systems.

  6. A Smart Spoofing Face Detector by Display Features Analysis.

    Science.gov (United States)

    Lai, ChinLun; Tai, ChiuYuan

    2016-07-21

    In this paper, a smart face liveness detector is proposed to prevent the biometric system from being "deceived" by the video or picture of a valid user that the counterfeiter took with a high definition handheld device (e.g., iPad with retina display). By analyzing the characteristics of the display platform and using an expert decision-making core, we can effectively detect whether a spoofing action comes from a fake face displayed in the high definition display by verifying the chromaticity regions in the captured face. That is, a live or spoof face can be distinguished precisely by the designed optical image sensor. To sum up, by the proposed method/system, a normal optical image sensor can be upgraded to a powerful version to detect the spoofing actions. The experimental results prove that the proposed detection system can achieve very high detection rate compared to the existing methods and thus be practical to implement directly in the authentication systems.

  7. YouTube and the spoof culture on the internet VIDEOTRASH: o YouTube e a cultura do "spoof" na internet

    Directory of Open Access Journals (Sweden)

    Erick Felinto

    2009-06-01

    Full Text Available The exponential expansion of the Internet as a databank has favored the preservation and diffusion of information traditionally considered expendable or of little cultural value. Private videos, independent productions, photo albums or schoolwork represent just a few examples of the type of material that is multiplying through cyberspace. according to david Shenk (1997, this excess of "unimportant" information cre- ates a kind of "datasmog" that is difficult to analyze and unheard of in the history of mankind, heretofore characterized essentially by a paucity of information. What stands out within this growing production of content is a practice known as "spoofing", i.e., virtually infinite parodic variations of widely known media products such as TV commercials and television series. The goal of this work is to outline a possible theory of "digital trash", based on the observation of the characteristics of spoofs on websites such as YouTube. Spoofing is also analyzed here in the context of the various poetics that pertain to the contemporary culture of technology. a expansão exponencial da internet como banco de dados tem favorecido a preservação e difusão de informação tradicionalmente considerada como descartável ou de pouco valor cultural. Vídeos pessoais, produções independentes, álbuns de fotografias ou trabalhos co- legiais constituem apenas alguns exemplos do tipo de material que começa a multiplicar-se no espaço da rede. Esse excesso de informação "sem importância" cria, nas palavras de david Shenk (1997, uma espécie de "datasmog", ou "nuvem de dados", difícil de analisar e inédita na história da humanidade, antes caracterizada essencialmente pela escassez de informação. dentre essa produção crescente, destaca-se a prática que vem sendo denominada como "spoof", ou seja, as virtualmente infinitas variações paródicas em torno de produtos midiáticos de grande circulação, como comerciais e

  8. Spoof surface plasmons propagating along a periodically corrugated coaxial waveguide

    International Nuclear Information System (INIS)

    Talebi, Nahid; Shahabadi, Mahmoud

    2010-01-01

    Using the rigorous mode-matching technique, we have investigated a periodically corrugated perfectly conducting coaxial waveguide for the possibility of propagation of localized spoof surface plasmons. To verify our results, the computed band diagram of the structure has been compared with the one obtained using the body-of-revolution finite-difference time-domain method. The obtained spoof surface plasmon modes have been shown to be highly localized and slowly propagating. Variations of the obtained modal frequencies and mode profiles as a function of the depth and width of the grooves have also been investigated.

  9. Spoof surface plasmons propagating along a periodically corrugated coaxial waveguide

    Energy Technology Data Exchange (ETDEWEB)

    Talebi, Nahid; Shahabadi, Mahmoud, E-mail: n.talebi@ece.ut.ac.i [Photonics Research Laboratory, Center of Excellence for Applied Electromagnetic Systems, School of Electrical and Computer Engineering, University of Tehran, North Kargar Ave., Tehran (Iran, Islamic Republic of)

    2010-04-07

    Using the rigorous mode-matching technique, we have investigated a periodically corrugated perfectly conducting coaxial waveguide for the possibility of propagation of localized spoof surface plasmons. To verify our results, the computed band diagram of the structure has been compared with the one obtained using the body-of-revolution finite-difference time-domain method. The obtained spoof surface plasmon modes have been shown to be highly localized and slowly propagating. Variations of the obtained modal frequencies and mode profiles as a function of the depth and width of the grooves have also been investigated.

  10. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  11. DNN Filter Bank Cepstral Coefficients for Spoofing Detection

    DEFF Research Database (Denmark)

    Yu, Hong; Tan, Zheng-Hua; Zhang, Yiming

    2017-01-01

    With the development of speech synthesis techniques, automatic speaker verification systems face the serious challenge of spoofing attack. In order to improve the reliability of speaker verification systems, we develop a new filter bank-based cepstral feature, deep neural network (DNN) filter bank...... cepstral coefficients, to distinguish between natural and spoofed speech. The DNN filter bank is automatically generated by training a filter bank neural network (FBNN) using natural and synthetic speech. By adding restrictions on the training rules, the learned weight matrix of FBNN is band limited...... and sorted by frequency, similar to the normal filter bank. Unlike the manually designed filter bank, the learned filter bank has different filter shapes in different channels, which can capture the differences between natural and synthetic speech more effectively. The experimental results on the ASVspoof...

  12. Terahertz spoof surface-plasmon-polariton subwavelength waveguide

    KAUST Repository

    Zhang, Ying; Xu, Yuehong; Tian, Chunxiu; Xu, Quan; Zhang, Xueqian; Li, Yanfeng; Zhang, Xixiang; Han, Jiaguang; Zhang, Weili

    2017-01-01

    Surface plasmon polaritons (SPPs) with the features of subwavelength confinement and strong enhancements have sparked enormous interest. However, in the terahertz regime, due to the perfect conductivities of most metals, it is hard to realize the strong confinement of SPPs, even though the propagation loss could be sufficiently low. One main approach to circumvent this problem is to exploit spoof SPPs, which are expected to exhibit useful subwavelength confinement and relative low propagation loss at terahertz frequencies. Here we report the design, fabrication, and characterization of terahertz spoof SPP waveguides based on corrugated metal surfaces. The various waveguide components, including a straight waveguide, an S-bend waveguide, a Y-splitter, and a directional coupler, were experimentally demonstrated using scanning near-field terahertz microscopy. The proposed waveguide indeed enables propagation, bending, splitting, and coupling of terahertz SPPs and thus paves a new way for the development of flexible and compact plasmonic circuits operating at terahertz frequencies. (C) 2017 Chinese Laser Press

  13. Terahertz spoof surface-plasmon-polariton subwavelength waveguide

    KAUST Repository

    Zhang, Ying

    2017-12-11

    Surface plasmon polaritons (SPPs) with the features of subwavelength confinement and strong enhancements have sparked enormous interest. However, in the terahertz regime, due to the perfect conductivities of most metals, it is hard to realize the strong confinement of SPPs, even though the propagation loss could be sufficiently low. One main approach to circumvent this problem is to exploit spoof SPPs, which are expected to exhibit useful subwavelength confinement and relative low propagation loss at terahertz frequencies. Here we report the design, fabrication, and characterization of terahertz spoof SPP waveguides based on corrugated metal surfaces. The various waveguide components, including a straight waveguide, an S-bend waveguide, a Y-splitter, and a directional coupler, were experimentally demonstrated using scanning near-field terahertz microscopy. The proposed waveguide indeed enables propagation, bending, splitting, and coupling of terahertz SPPs and thus paves a new way for the development of flexible and compact plasmonic circuits operating at terahertz frequencies. (C) 2017 Chinese Laser Press

  14. Anti-spoofing for display and print attacks on palmprint verification systems

    Science.gov (United States)

    Kanhangad, Vivek; Bhilare, Shruti; Garg, Pragalbh; Singh, Pranjalya; Chaudhari, Narendra

    2015-05-01

    A number of approaches for personal authentication using palmprint features have been proposed in the literature, majority of which focus on improving the matching performance. However, of late, preventing potential attacks on biometric systems has become a major concern as more and more biometric systems get deployed for wide range of applications. Among various types of attacks, sensor level attack, commonly known as spoof attack, has emerged as the most common attack due to simplicity in its execution. In this paper, we present an approach for detection of display and print based spoof attacks on palmprint verifcation systems. The approach is based on the analysis of acquired hand images for estimating surface re ectance. First and higher order statistical features computed from the distributions of pixel intensities and sub-band wavelet coeefficients form the feature set. A trained binary classifier utilizes the discriminating information to determine if the acquired image is of real hand or a fake one. Experiments are performed on a publicly available hand image dataset, containing 1300 images corresponding to 230 subjects. Experimental results show that the real hand biometrics samples can be substituted by the fake digital or print copies with an alarming spoof acceptance rate as high as 79.8%. Experimental results also show that the proposed spoof detection approach is very effective for discriminating between real and fake palmprint images. The proposed approach consistently achieves over 99% average 10-fold cross validation classification accuracy in our experiments.

  15. Guiding spoof surface plasmon polaritons by infinitely thin grooved metal strip

    Directory of Open Access Journals (Sweden)

    Xiang Wan

    2014-04-01

    Full Text Available In this paper, the propagation characteristics of spoof surface plasmon polaritons (SPPs on infinitely thin corrugated metal strips are theoretically analyzed. Compared with the situations of infinitely thick lateral thickness, the infinitely thin lateral thickness leads to lower plasma frequency according to the analyses. The propagation lengths and the binding capacity of the spoof SPPs are evaluated based on the derived dispersion equation. The effects of different lateral thicknesses are also investigated. At the end, a surface wave splitter is presented using infinitely thin corrugated metal strip. Other functional planar or flexible devices can also be designed using these metal strips in microwave or terahertz regimes.

  16. A corrugated perfect magnetic conductor surface supporting spoof surface magnon polaritons.

    Science.gov (United States)

    Liu, Liang-liang; Li, Zhuo; Gu, Chang-qing; Ning, Ping-ping; Xu, Bing-zheng; Niu, Zhen-yi; Zhao, Yong-jiu

    2014-05-05

    In this paper, we demonstrate that spoof surface magnon polaritons (SSMPs) can propagate along a corrugated perfect magnetic conductor (PMC) surface. From duality theorem, the existence of surface electromagnetic modes on corrugated PMC surfaces are manifest to be transverse electric (TE) mode compared with the transverse magnetic (TM) mode of spoof surface plasmon plaritons (SSPPs) excited on corrugated perfect electric conductor surfaces. Theoretical deduction through modal expansion method and simulation results clearly verify that SSMPs share the same dispersion relationship with the SSPPs. It is worth noting that this metamaterial will have more similar properties and potential applications as the SSPPs in large number of areas.

  17. Bending and splitting of spoof surface acoustic waves through structured rigid surface

    Directory of Open Access Journals (Sweden)

    Sujun Xie

    2018-03-01

    Full Text Available In this paper, we demonstrated that a 90°-bended imaging of spoof surface acoustic waves with subwavelength resolution of 0.316λ can be realized by a 45° prism-shaped surface phononic crystal (SPC, which is composed of borehole arrays with square lattice in a rigid plate. Furthermore, by combining two identical prism-shaped phononic crystal to form an interface (to form a line-defect, the excited spoof surface acoustic waves can be split into bended and transmitted parts. The power ratio between the bended and transmitted surface waves can be tuned arbitrarily by adjusting the defect size. This acoustic system is believed to have potential applications in various multifunctional acoustic solutions integrated by different acoustical devices.

  18. Richard III

    DEFF Research Database (Denmark)

    Lauridsen, Palle Schantz

    2017-01-01

    Kort analyse af Shakespeares Richard III med fokus på, hvordan denne skurk fremstilles, så tilskuere (og læsere) langt henad vejen kan føle sympati med ham. Med paralleller til Netflix-serien "House of Cards"......Kort analyse af Shakespeares Richard III med fokus på, hvordan denne skurk fremstilles, så tilskuere (og læsere) langt henad vejen kan føle sympati med ham. Med paralleller til Netflix-serien "House of Cards"...

  19. A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems.

    Science.gov (United States)

    Seo, Jung Woo; Lee, Sang Jin

    2016-01-01

    Large-scale network environments require effective detection and response methods against DDoS attacks. Depending on the advancement of IT infrastructure such as the server or network equipment, DDoS attack traffic arising from a few malware-infected systems capable of crippling the organization's internal network has become a significant threat. This study calculates the frequency of network-based packet attributes and analyzes the anomalies of the attributes in order to detect IP-spoofed DDoS attacks. Also, a method is proposed for the effective detection of malware infection systems triggering IP-spoofed DDoS attacks on an edge network. Detection accuracy and performance of the collected real-time traffic on a core network is analyzed thru the use of the proposed algorithm, and a prototype was developed to evaluate the performance of the algorithm. As a result, DDoS attacks on the internal network were detected in real-time and whether or not IP addresses were spoofed was confirmed. Detecting hosts infected by malware in real-time allowed the execution of intrusion responses before stoppage of the internal network caused by large-scale attack traffic.

  20. A bimodal verification cryptosystem as a framework against spoofing attacks

    OpenAIRE

    Toli, Christina-Angeliki; Preneel, Bart

    2015-01-01

    The exponential growth of immigration crisis and the recent terrorism cases revealed the increase of fraud occurrences, cloning and identity theft with numerous social, economic and political consequences. The trustworthiness of biometrics during verification processes has been compromised by spoofing attackers sprang up to exploit the security gaps. Additionally, the cryptography’s role in the area is highly important as it may promote fair assessment procedures and foster public trust by se...

  1. J. Richard Hackman (1940-2013)

    OpenAIRE

    Wageman, Ruth; Amabile, Teresa M.

    2013-01-01

    When J. Richard Hackman died in Cambridge, Massachusetts, on January 8, 2013, psychology lost a giant. Six and a half feet tall, with an outsize personality to match, Richard was the leading scholar in two distinct areas: work design and team effectiveness. In both domains, his work is foundational. Throughout his career, Richard applied rigorous methods to problems of great social importance, tirelessly championing multi-level analyses of problems that matter. His impact on our field has bee...

  2. Richard Nixon, 1972-2016 Obituary

    OpenAIRE

    Tom, Brian Dermot; Thompson, Simon Gregory; Duffy, SW; Sweeting, Michael John; Ohlssen, DI

    2017-01-01

    After a year-long journey with cancer, Dr Richard Nixon died on August 26th, 2016, aged only 43 years. He leaves behind his wife of 5 years, Valda, and their 1-year-old baby daughter, Kyra. Richard, a Yorkshireman, was born on September 8th, 1972. He attended Ilkley Grammar School, studied mathematics at Durham University (1991–1994) and was awarded the Diploma in Mathematical Statistics from the University of Cambridge in 1995. Richard then took a career break for a couple of years to...

  3. Richard's back: death, scoliosis and myth making.

    Science.gov (United States)

    Lund, Mary Ann

    2015-12-01

    The body of a mediaeval monarch was always under scrutiny, and Richard III's was no exception. In death, however, his body became subject to new forms of examination and interpretation: stripped naked after the battle of Bosworth, his corpse was carried to Leicester and exhibited before being buried. In 2012, it was rediscovered. The revelation that Richard suffered from scoliosis prompts this article to re-evaluate the historical sources about Richard's physique and his posthumous reputation. This article argues that Richard's death and his myth as 'crookback' are inextricably linked and traces attitudes to spinal curvature in the early modern period. It also considers how Shakespeare represented Richard as deformed, and aspects of performance history which suggest physical vulnerability. It then considers Richard's scoliosis from the perspective of medical history, reviewing classical accounts of scoliosis and arguing that Richard was probably treated with a mixture of axial traction and pressure. It demonstrates from the evidence of Richard's medical household that he was well placed to receive hands-on therapies and considers in particular the role of his physician and surgeon, William Hobbes. Finally, it shows how the case of Richard III demonstrates the close relationship between politics and medicine in the period and the contorted process of historical myth making. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  4. Anti-spoof touchless 3D fingerprint recognition system using single shot fringe projection and biospeckle analysis

    Science.gov (United States)

    Chatterjee, Amit; Bhatia, Vimal; Prakash, Shashi

    2017-08-01

    Fingerprint is a unique, un-alterable and easily collected biometric of a human being. Although it is a 3D biological characteristic, traditional methods are designed to provide only a 2D image. This touch based mapping of 3D shape to 2D image losses information and leads to nonlinear distortions. Moreover, as only topographic details are captured, conventional systems are potentially vulnerable to spoofing materials (e.g. artificial fingers, dead fingers, false prints, etc.). In this work, we demonstrate an anti-spoof touchless 3D fingerprint detection system using a combination of single shot fringe projection and biospeckle analysis. For fingerprint detection using fringe projection, light from a low power LED source illuminates a finger through a sinusoidal grating. The fringe pattern modulated because of features on the fingertip is captured using a CCD camera. Fourier transform method based frequency filtering is used for the reconstruction of 3D fingerprint from the captured fringe pattern. In the next step, for spoof detection using biospeckle analysis a visuo-numeric algorithm based on modified structural function and non-normalized histogram is proposed. High activity biospeckle patterns are generated because of interaction of collimated laser light with internal fluid flow of the real finger sample. This activity reduces abruptly in case of layered fake prints, and is almost absent in dead or fake fingers. Furthermore, the proposed setup is fast, low-cost, involves non-mechanical scanning and is highly stable.

  5. Richard Lavenham on Future Contingents

    DEFF Research Database (Denmark)

    Øhrstrøm, Peter

    1983-01-01

    Richard Lavenham on Future Contingents’, Cahiers de l’Institut du Moyen-âge Grec et Latin, 44 (1983), p.180-186.......‘Richard Lavenham on Future Contingents’, Cahiers de l’Institut du Moyen-âge Grec et Latin, 44 (1983), p.180-186....

  6. Richards Barrier LA Reference Design Feature Evaluation

    International Nuclear Information System (INIS)

    N.E. Kramer

    1999-01-01

    The Richards Barrier is one of the design features of the repository to be considered for the License Application (LA), Richards was a soil scientist who first described the diversion of moisture between two materials with different hydrologic properties. In this report, a Richards Barrier is a special type of backfill with a fine-grained material (such as sand) overlaying a coarse-grained material (such as gravel). Water that enters an emplacement drift will first encounter the fine-grained material and be transported around the coarse-grained material covering the waste package, thus protecting the waste package from contact with most of the groundwater. The objective of this report is to discuss the benefits and liabilities to the repository by the inclusion of a Richards Barrier type backfill in emplacement drifts. The Richards Barrier can act as a barrier to water flow, can reduce the waste package material dissolution rate, limit mobilization of the radionuclides, and can provide structural protection for the waste package. The scope of this report is to: (1) Analyze the behavior of barrier materials following the intrusion of groundwater for influxes of 1 to 300 mm per year. The report will demonstrate diversion of groundwater intrusions into the barrier over an extended time period when seismic activity and consolidation may cause the potential for liquefaction and settlement of the Richards Barrier. (2) Review the thermal effects of the Richards Barrier on material behavior. (3) Analyze the effect of rockfall on the performance of the Richards Barrier and the depth of the barrier required to protect waste packages under the barrier. (4) Review radiological and heating conditions on placement of multiple layers of the barrier. Subsurface Nuclear Safety personnel will perform calculations to determine the radiation reduction-time relationship and shielding capacity of the barrier. (5) Evaluate the effects of ventilation on cooling of emplacement drifts and

  7. Obituary: Richard Joseph Elston, 1960-2004

    Science.gov (United States)

    Jannuzi, Buell Tomasson; Bechtold, Jill

    2004-12-01

    Richard Joseph Elston, known for his development of innovative astronomical instrumentation, died on 26 January 2004 in Gainesville, Florida, after a four-year battle with Hodgkin's lymphoma. A professor of astronomy at the University of Florida, Richard had an unusually broad range of interests and skills, and a willingness to share his passion for astronomy with others, which made him a highly valued member of the astronomical community. Born 1 July 1960, in Albuquerque, New Mexico, Richard was the son of a geologist father and journalist mother. His childhood interest in astronomy and instrumentation matured as he majored in physics and astronomy at the University of New Mexico (BS, 1983) under the mentorship of Michael Zeilik. Richard pursued his PhD in astronomy at the University of Arizona and earned his degree in 1988. He pioneered the use of IR arrays for deep imaging surveys of the sky to study galaxy formation, and completed his thesis Search for Rapidly Forming Galaxies at High Redshift under the direction of George Rieke. Richard's graduate work included the first detection of galaxies at intermediate redshifts with evolved populations too red to have been identifiable from optical imaging surveys alone. In the Astrophysical Journal Letters in 1988, he, George Rieke, and Marcia Rieke reported the discovery of this new class of galaxies, now known as EROs (Extremely Red Objects), important as the possible progenitors of present day elliptical galaxies. Following post-doctoral positions at Kitt Peak National Observatory from 1988 to 1991 and at the Observatories of the Carnegie Institution of Washington from 1991 to 1992, Richard joined the scientific staff of Cerro Tololo Inter-American Observatory in Chile, part of the NSF's National Optical Astronomy Observatory. By 1994, he had become head of CTIO's IR instrumentation program and was leading the development of new instruments for the US astronomical community. In 1996, Richard married astronomer

  8. Richard Florida : loovsektor on majanduskasvu mootor / Richard Florida ; interv. Argo Ideon

    Index Scriptorium Estoniae

    Florida, Richard

    2008-01-01

    USA majandus- ja ühiskonnateadlane Richard Florida loovklassi teooriast, selle osast majanduskasvu tagamisel, seosest ühiskonna tolerantsuse ja ühiskonna majandusliku edukuse vahel, sotsiaalse sidususe takistavast rollist loovuse motiveerimisel

  9. DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments.

    Science.gov (United States)

    Song, Min Su; Lee, Jae Dong; Jeong, Young-Sik; Jeong, Hwa-Young; Park, Jong Hyuk

    2014-01-01

    Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.

  10. Lightweight MAC-Spoof Detection Exploiting Received Signal Power and Median Filtering

    DEFF Research Database (Denmark)

    Papini, Davide

    2011-01-01

    this kind of attack based on signal power monitoring. The main contribution of our work is the introduction of a median l- ter that enables the detection of the attack by looking at the variance of the signal power. We take into account two types of references for the samples, time and number of frames......IEEE 802.11 networks are subject to MAC-spoof attacks. An attacker can easily steal the identity of a legitimate station, even Access Points, thus enabling him to take full control over network basic mech- anisms or even access restricted resources. In this paper we propose a method to detect...

  11. Professor Richard Feynman colloquium

    CERN Multimedia

    1965-01-01

    Richard P. Feynman received the Nobel Prize for physics in 1965. Following the ceremony in Stockholm, Feynman gave the colloquium "Development of the space-time view of quantum electrodynamics" at CERN on 17th December.

  12. A Hybrid Circuit for Spoof Surface Plasmons and Spatial Waveguide Modes to Reach Controllable Band-Pass Filters.

    Science.gov (United States)

    Zhang, Qian; Zhang, Hao Chi; Wu, Han; Cui, Tie Jun

    2015-11-10

    We propose a hybrid circuit for spoof surface plasmon polaritons (SPPs) and spatial waveguide modes to develop new microwave devices. The hybrid circuit includes a spoof SPP waveguide made of two anti-symmetric corrugated metallic strips and a traditional substrate integrated waveguide (SIW). From dispersion relations, we show that the electromagnetic waves only can propagate through the hybrid circuit when the operating frequency is less than the cut-off frequency of the SPP waveguide and greater than the cut-off frequency of SIW, generating efficient band-pass filters. We demonstrate that the pass band is controllable in a large range by designing the geometrical parameters of SPP waveguide and SIW. Full-wave simulations are provided to show the large adjustability of filters, including ultra wideband and narrowband filters. We fabricate a sample of the new hybrid device in the microwave frequencies, and measurement results have excellent agreements to numerical simulations, demonstrating excellent filtering characteristics such as low loss, high efficiency, and good square ratio. The proposed hybrid circuit gives important potential to accelerate the development of plasmonic integrated functional devices and circuits in both microwave and terahertz frequencies.

  13. Richard von Volkmann

    Science.gov (United States)

    Willy, Christian; Schneider, Peter; Engelhardt, Michael; Hargens, Alan R.

    2008-01-01

    Richard von Volkmann (1830–1889), one of the most important surgeons of the 19th century, is regarded as one of the fathers of orthopaedic surgery. He was a contemporary of Langenbeck, Esmarch, Lister, Billroth, Kocher, and Trendelenburg. He was head of the Department of Surgery at the University of Halle, Germany (1867–1889). His popularity attracted doctors and patients from all over the world. He was the lead physician for the German military during two wars. From this experience, he compared the mortality of civilian and war injuries and investigated the general poor hygienic conditions in civilian hospitals. This led him to introduce the “antiseptic technique” to Germany that was developed by Lister. His powers of observation and creativity led him to findings and achievements that to this day bear his name: Volkmann’s contracture and the Hueter-Volkmann law. Additionally, he was a gifted writer; he published not only scientific literature but also books of children’s fairy tales and poems under the pen name of Richard Leander, assuring him a permanent place in the world of literature as well as orthopaedics. PMID:18196438

  14. Richard Avedon ja Annie Leibovitz laulsid kaanonit / Marika Alver

    Index Scriptorium Estoniae

    Alver, Marika

    2008-01-01

    Richard Avedoni (1923-2004) retrospektiivnäitusest (fotod aastatest 1946-2004) kuraator Helle Crenzien (Lousiana Kaasaegse Kunsti muuseum Taanis), millega kaasnes ka Helen Whitney film "Richard Avedon : darkness and light" ja Annie Leibovitzi (1949) suurprojektist "A photographer's life 1990-2005" Pariisis

  15. In conversation with: Professor Richard James

    Directory of Open Access Journals (Sweden)

    John Clarke

    2014-03-01

    Full Text Available In 2011, Richard James wrote in the Foreword to Nelson, Clarke, Kift, and Creagh’s (2012 monograph on Australasian literature on the First Year Experience that:The trend towards universal participation will usher in dramatic changes in the character of the first year in higher education. … (p. iiiIn an interview at the University of Melbourne, Australia in July 2013 between Richard James and John Clarke, Co-editor of the International Journal of the First Year in Higher Education, these and related issues were explored.  The interview picks up where the Foreword left off:  focussing on universal participation.

  16. 77 FR 21555 - Manning, Richard W.; Notice of Filing

    Science.gov (United States)

    2012-04-10

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. ID-6835-001] Manning, Richard W.; Notice of Filing Take notice that on April 2, 2012, Richard W. Manning submitted for filing... not serve to make protestants parties to the proceeding. Any person wishing to become a party must...

  17. Richard Halliburton's Bearded Tales

    Science.gov (United States)

    Morris, Charles E., III

    2009-01-01

    Fusing the concept of "the beard" with the genre of the tall tale to theorize bearded tales deepens our understanding of closet eloquence, or rhetorical repertories of sexual passing in U.S. history. An examination of adventurer-writer-lecturer Richard Halliburton's sexual provenance and bestselling travel tale, "The Royal Road to Romance" (1925),…

  18. Richards Bay effluent pipeline

    CSIR Research Space (South Africa)

    Lord, DA

    1986-07-01

    Full Text Available of major concern identified in the effluent are the large volume of byproduct calcium sulphate (phosphogypsum) which would smother marine life, high concentrations of fluoride highly toxic to marine life, heavy metals, chlorinated organic material... ........................ 9 THE RICHARDS BAY PIPELINE ........................................ 16 Environmental considerations ................................... 16 - Phosphogypsum disposal ................................... 16 - Effects of fluoride on locally occurring...

  19. Quantum Man: Richard Feynman's Life in Science

    CERN Document Server

    CERN. Geneva

    2011-01-01

    It took a man who was willing to break all the rules to tame a theory that breaks all the rules. This talk will be based on my new book Quantum Man: Richard Feynman's life in science. I will try and present a scientific overview of the contributions of Richard Feynman, as seen through the arc of his fascinating life. From Quantum Mechanics to Antiparticles, from Rio de Janeiro to Los Alamos, a whirlwind tour will provide insights into the character, life and accomplishments of one of the 20th centuries most important scientists, and provide an object lesson in scientific integrity.

  20. Swearing Used in Richard Wright’s Black Boy

    OpenAIRE

    Giyatmi Giyatmi; Ratih WIjayava; Nunun Tri Widarwati

    2017-01-01

    This research aims at finding the types of swearing expressions and linguistic forms of English swearing used in Richard Wright's Black Boy. This is a descriptive qualitative research since it describes the phenomena of swearing used in the novel. The data of the research are all the conversations or sentences used swearing in the novel written by Richard Wright namely Black Boy as the main data source. The method of collecting data in this research is observation and teknik lanjut catat. Aft...

  1. EDITORIAL: Richard Palmer: celebrating 37 years with Journal of Physics: Condensed Matter Richard Palmer: celebrating 37 years with Journal of Physics: Condensed Matter

    Science.gov (United States)

    Ferry, David

    2009-01-01

    It is with a great deal of both happiness and sadness that I have to announce that we are losing one of the real strengths of the Journal of Physics: Condensed Matter (JPCM). Dr Richard Palmer, our Senior Publisher, announced his retirement, and this issue marks the first without his involvement. Of course, we are happy that he will get to enjoy his retirement, but we are sad to lose such a valuable member of our team. Richard first started work at IOP Publishing in March 1971 as an Editorial Assistant with Journal of Physics B: Atomic and Molecular Physics. After a few months, he transferred to Journal of Physics C: Solid State Physics. During his first year, he was sent on a residential publishing training course and asked to sign an undertaking to stay at IOP Publishing for at least two years. Although Richard refused to sign, as he did not want to commit himself, he has remained with the journal since then. The following year, the Assistant Editor of Journal of Physics C: Solid State Physics, Malcolm Haines, walked out without notice in order to work on his family vineyard in France, and Richard stepped into the breach. In those days, external editors had a much more hands-on role in IOP Publishing and he had to travel to Harwell to be interviewed by Alan Lidiard, the Honorary Editor of Journal of Physics C: Solid State Physics, before being given the job of Assistant Editor permanently. I am told that in those days the job consisted mainly of editing and proofreading and peer review. There was no journal development work. At some point in the early 1980s, production and peer review were split into separate departments and Richard then headed a group of journals consisting of Journal of Physics C: Solid State Physics, Journal of Physics D: Applied Physics and Journal of Physics F: Metal Physics, Semiconductor Science and Technology, Superconductor Science and Technology, Plasma Physics and Controlled Fusion, and later Nanotechnology and Modelling and Simulation

  2. Potshemu medved rõtshit / Richard Pipes

    Index Scriptorium Estoniae

    Pipes, Richard

    2006-01-01

    Harvardi ülikooli ajalooprofessor Richard Pipes arutleb, miks Venemaa viimase aja käitumises väljendub soovimatus koostööks, sageli ka vaenulikkus. Venemaa võimetus rahvusvahelises kontekstis oma kohta leida, selle ajaloolised juured

  3. Richard Peters and Valuing Authenticity

    Science.gov (United States)

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  4. In Conversation with Paul Richards

    Science.gov (United States)

    Holman, Andrew

    2013-01-01

    Paul Richards is one of those individuals who make a difference and is as far from institutional as one can be. The author met up with him at the Learning Disability Today conference in London to talk more about his work and life. Paul coordinates the service user involvement across Southdown Housing Association, based in Sussex.

  5. Obituary: Dr. Richard Roland Baker

    Directory of Open Access Journals (Sweden)

    Thornton R

    2014-12-01

    Full Text Available Richard Baker died at Easter 2007 after a very short illness. It is sad that he died so soon after his retirement from the British American Tobacco Company at the end of 2005, and just as he was beginning to enjoy his new life, even though tobacco science still had a part to play.

  6. Richard W. Ziolkowski Receives Honorary Doctorate

    DEFF Research Database (Denmark)

    Breinbjerg, Olav

    2012-01-01

    At the annual Commemoration of the Technical University of Denmark (DTU) on April 27, 2012, Prof. Richard W. Ziolkowski, University of Arizona (UoA), received DTU's highest academic degree, the Honorary Doctor degree: Doctor Technices Honoris Causa (Figure 1). Prof. Ziolkowski has been a close...

  7. A Novel Anti-Spoofing Solution for Iris Recognition Toward Cosmetic Contact Lens Attack Using Spectral ICA Analysis.

    Science.gov (United States)

    Hsieh, Sheng-Hsun; Li, Yung-Hui; Wang, Wei; Tien, Chung-Hao

    2018-03-06

    In this study, we maneuvered a dual-band spectral imaging system to capture an iridal image from a cosmetic-contact-lens-wearing subject. By using the independent component analysis to separate individual spectral primitives, we successfully distinguished the natural iris texture from the cosmetic contact lens (CCL) pattern, and restored the genuine iris patterns from the CCL-polluted image. Based on a database containing 200 test image pairs from 20 CCL-wearing subjects as the proof of concept, the recognition accuracy (False Rejection Rate: FRR) was improved from FRR = 10.52% to FRR = 0.57% with the proposed ICA anti-spoofing scheme.

  8. Recensie "The Great Reset" : Richard Florida

    NARCIS (Netherlands)

    Roy van Dalm

    2010-01-01

    Like the Great Depression and the Long Depression before it, experts have viewed prolonged economic downturns as crises. In The Great Reset , bestselling author Richard Florida argues that we should instead see the recent recession as an opportunity to create entirely new ways of working and living

  9. Seeing Scale: Richard Dunn’s Structuralism

    Directory of Open Access Journals (Sweden)

    Keith Broadfoot

    2012-11-01

    Full Text Available Writing on the occasion of a retrospective of Richard Dunn’s work, Terence Maloon argued that ‘structuralism had an important bearing on virtually all of Richard Dunn’s mature works’, with ‘his modular, “crossed” formats’ being the most obvious manifestation of this. In this article I wish to reconsider this relation, withdrawing from a broad consideration of the framework of structuralism to focus on some of the quite particular ideas that Lacan proposed in response to structuralism. Beginning from a pivotal painting in the 1960s that developed out of Dunn’s experience of viewing the work of Barnett Newman, I wish to suggest a relation between the ongoing exploration of the thematic of scale in Dunn’s work and the idea of the symbolic that Lacan derives from structuralist thought. This relation, I argue, opens up a different way of understanding the art historical transition from Minimalism to Conceptual art.

  10. Theodore William Richards and the Periodic Table

    Science.gov (United States)

    Conant, James B.

    1970-01-01

    Discusses the contribution of Theodore Richards to the accurate determination of atomic weights of copper and other elements; his major contribution was to the building of the definitive periodic table of the elements. (BR)

  11. Method of lines solution of Richards` equation

    Energy Technology Data Exchange (ETDEWEB)

    Kelley, C.T.; Miller, C.T.; Tocci, M.D.

    1996-12-31

    We consider the method of lines solution of Richard`s equation, which models flow through porous media, as an example of a situation in which the method can give incorrect results because of premature termination of the nonlinear corrector iteration. This premature termination arises when the solution has a sharp moving front and the Jacobian is ill-conditioned. While this problem can be solved by tightening the tolerances provided to the ODE or DAE solver used for the temporal integration, it is more efficient to modify the termination criteria of the nonlinear solver and/or recompute the Jacobian more frequently. In this paper we continue previous work on this topic by analyzing the modifications in more detail and giving a strategy on how the modifications can be turned on and off in response to changes in the character of the solution.

  12. W. Richard Scott, Institutions and Organizations: Ideas, Interests, and Identities

    DEFF Research Database (Denmark)

    Jakobsen, Michael

    2014-01-01

    Book review of: W. Richard Scott: Institutions and Organizations: Ideas, Interests, and Identities. 4th edition. Thousand Oaks, CA: SAGE Publications, 2014. xiii, 345 pp.......Book review of: W. Richard Scott: Institutions and Organizations: Ideas, Interests, and Identities. 4th edition. Thousand Oaks, CA: SAGE Publications, 2014. xiii, 345 pp....

  13. A Novel Anti-Spoofing Solution for Iris Recognition Toward Cosmetic Contact Lens Attack Using Spectral ICA Analysis

    Science.gov (United States)

    Hsieh, Sheng-Hsun; Wang, Wei; Tien, Chung-Hao

    2018-01-01

    In this study, we maneuvered a dual-band spectral imaging system to capture an iridal image from a cosmetic-contact-lens-wearing subject. By using the independent component analysis to separate individual spectral primitives, we successfully distinguished the natural iris texture from the cosmetic contact lens (CCL) pattern, and restored the genuine iris patterns from the CCL-polluted image. Based on a database containing 200 test image pairs from 20 CCL-wearing subjects as the proof of concept, the recognition accuracy (False Rejection Rate: FRR) was improved from FRR = 10.52% to FRR = 0.57% with the proposed ICA anti-spoofing scheme. PMID:29509692

  14. A Novel Anti-Spoofing Solution for Iris Recognition Toward Cosmetic Contact Lens Attack Using Spectral ICA Analysis

    Directory of Open Access Journals (Sweden)

    Sheng-Hsun Hsieh

    2018-03-01

    Full Text Available In this study, we maneuvered a dual-band spectral imaging system to capture an iridal image from a cosmetic-contact-lens-wearing subject. By using the independent component analysis to separate individual spectral primitives, we successfully distinguished the natural iris texture from the cosmetic contact lens (CCL pattern, and restored the genuine iris patterns from the CCL-polluted image. Based on a database containing 200 test image pairs from 20 CCL-wearing subjects as the proof of concept, the recognition accuracy (False Rejection Rate: FRR was improved from FRR = 10.52% to FRR = 0.57% with the proposed ICA anti-spoofing scheme.

  15. Kuues väljasuremine / Richard Leakey, Roger Lewin

    Index Scriptorium Estoniae

    Leakey, Richard

    2002-01-01

    Inimtegevuse hävitavast toimest looduslikule mitmekesisusele, mis tingib loodusliku energiatootmise järsu kahanemise, millest omakorda sõltub inimese enda ellujäämine. Lühidalt Richard Leakey'st

  16. Bridging the Knowledge Gaps between Richards' Equation and Budyko Equation

    Science.gov (United States)

    Wang, D.

    2017-12-01

    The empirical Budyko equation represents the partitioning of mean annual precipitation into evaporation and runoff. Richards' equation, based on Darcy's law, represents the movement of water in unsaturated soils. The linkage between Richards' equation and Budyko equation is presented by invoking the empirical Soil Conservation Service curve number (SCS-CN) model for computing surface runoff at the event-scale. The basis of the SCS-CN method is the proportionality relationship, i.e., the ratio of continuing abstraction to its potential is equal to the ratio of surface runoff to its potential value. The proportionality relationship can be derived from the Richards' equation for computing infiltration excess and saturation excess models at the catchment scale. Meanwhile, the generalized proportionality relationship is demonstrated as the common basis of SCS-CN method, monthly "abcd" model, and Budyko equation. Therefore, the linkage between Darcy's law and the emergent pattern of mean annual water balance at the catchment scale is presented through the proportionality relationship.

  17. Richard A. Werners forskning i pengeskabelse

    DEFF Research Database (Denmark)

    2016-01-01

    Hvilken rolle spiller penge i samfundsøkonomien og hvilken rolle burde penge spille i den økonomiske videnskab? Det forsker Richard Werner i. Han er professor i økonomi ved Southampton University i England, og her præsenteres fire dele af hans forskning i penge: (1) Hvad foregår der egentlig i en...

  18. Richard Mattessich: vida y obra

    OpenAIRE

    Daniel Carrasco Díaz

    2006-01-01

    El texto que se ofrece a continuación constituye el discurso pronunciado por el profesor Daniel Carrasco Díaz, catedrático de Economía Financiera y Contabilidad como padrino del homenajeado, en el solemne acto de investidura del Prof. Dr. Richard Mattessich, profesor emérito de la Sauder School of Commerce, de la University of British Columbia, Vancouver (Canadá), como Doctor honoris causa por la Universidad de Málaga, celebrado el 18 de mayo de 2006.

  19. Failed Mothers, Monster Sons. Reading Shakespeare’S Richard Iii as a Fairy Tale

    Directory of Open Access Journals (Sweden)

    Percec Dana

    2014-03-01

    Full Text Available The paper looks at Shakespeare’s historical play Richard III and its fairy tale-like character given by the configuration of the main character as an arch-villain and the presence of motifs and patterns typically associated with the fairy tale genre. More specifically, it considers the mother-son relationship between the Duchess of York and Richard in the light of the motif of monstrous birth. It is not a coincidence that the emergence of such motifs coincides with the historical contexts of the early modern period. Reading Richard III in this key is related to the revisionist approach to chronicle plays.

  20. Richard Weaver's Untraditional Case for Federalism

    OpenAIRE

    Jeremy David Bailey

    2004-01-01

    Although Richard M. Weaver's political writings do not offer a systematic examination of federalism, they include a defense of federalist arrangements. Because Weaver's federalism is central to his conservatism, and because his argument for federalism differs from more common conservative defenses of federalism offered in the twentieth century, his writings allow students of federalism to examine possible connections between federalism and conservative political thought. Copyright 2004, Oxfor...

  1. In memoriam: Richard (Rick) G. Harrison—benefactor for ...

    Indian Academy of Sciences (India)

    Professor Richard Harrison (1946–2016), a most influential evolutionary biologist of ... were profoundly important in my development as a scientist and a person. ... observations to infer his love of family, but I am going to risk correction by those ...

  2. PREFACE: Celebrating 20 years of Journal of Physics: Condensed Matter—in honour of Richard Palmer Celebrating 20 years of Journal of Physics: Condensed Matter—in honour of Richard Palmer

    Science.gov (United States)

    Ferry, David; Dowben, Peter; Inglesfield, John

    2009-11-01

    This year marks the 20th anniversary of the launch of Journal of Physics: Condensed Matter in 1989. The journal was formed from the merger of Journal of Physics C: Solid State Physics and Journal of Physics F: Metal Physics which had separated in 1971. In the 20 years since its launch, Journal of Physics: Condensed Matter has more than doubled in size, while raising standards. Indeed, Journal of Physics: Condensed Matter has become one of the leading scientific journals for our field. This could not have occurred without great leadership at the top. No one has been more responsible for this growth in both size and quality than our Senior Publisher, Richard Palmer. Richard first started work at IOP in March 1971 as an Editorial Assistant with J. Phys. B After a few months, he transferred to J. Phys.C The following year, the Assistant Editor of J. Phys. C, Malcolm Haines, left suddenly in order to work on his family vineyard in France, and Richard stepped into the breach. In those days, external editors had a much more hands-on role in IOP Publishing and he had to travel to Harwell to be interviewed by Alan Lidiard, the Honorary Editor of J. Phys. C, before being given the job of Assistant Editor permanently. Since J. Phys. C and J. Phys. F re-merged to form Journal of Physics: Condensed Matter, Richard gradually shed his other journal responsibilities, except for Reports on Progress in Physics, to build up Journal of Physics: Condensed Matter. He has worked closely with four Editors-in-Chief of J. Phys. C and five of Journal of Physics: Condensed Matter. When Richard announced his retirement this past winter, we met it with a great deal of both happiness and sadness. Of course, we are happy that he is going to be allowed to enjoy his retirement, but we remain very sad to lose such a valuable member of our team, especially the one who had provided the heart and soul of the journal over its 20 years. We will be able to rely upon the team which Richard ably trained as

  3. Trochanteric fractures. Classification and mechanical stability in McLaughlin, Ender and Richard osteosynthesis

    Energy Technology Data Exchange (ETDEWEB)

    Herrlin, K.; Stroemberg, T.; Lidgren, L.; Walloee, A.; Pettersson, H.

    Four hundred and thirty trochanteric factures operated upon with McLaughlin, Ender or Richard's osteosynthesis were divided into 6 different types based on their radiographic appearance before and immediately after reposition with special reference to the medial cortical support. A significant correlation was found between the fracture type and subsequent mechanical complications where types 1 and 2 gave less, and types 4 and 5 more complications. A comparison of the various osteosyntheses showed that Richard's had significantly fewer complications than either the Ender or McLaughlin types. For Richard's osteosynthesis alone no correlation to fracture type could be made because of the small number of complications in this group.

  4. Richard Wollheim 1923-2003 / Marek Volt

    Index Scriptorium Estoniae

    Volt, Marek

    2004-01-01

    Järelehüüe anglo-ameerika filosoofile Richard Wollheimile (5. V 1923-4. XI 2003), kes huvitus maalist ja psühhoanalüüsist ning kuulub XX sajandi analüütilist kunstifilosoofiat enim kujundanud filosoofide hulka. Tema peamised tööd: "Art and Its Objects" (1968), "Painting As an Art" (1987), "On Painting and the Self" (1992). Ilmunud ka raamatus: Volt, Marek. Esteetikast. Tallinn : Sirp, 2006

  5. Richard von Volkmann: surgeon and Renaissance man.

    Science.gov (United States)

    Willy, Christian; Schneider, Peter; Engelhardt, Michael; Hargens, Alan R; Mubarak, Scott J

    2008-02-01

    Richard von Volkmann (1830-1889), one of the most important surgeons of the 19(th) century, is regarded as one of the fathers of orthopaedic surgery. He was a contemporary of Langenbeck, Esmarch, Lister, Billroth, Kocher, and Trendelenburg. He was head of the Department of Surgery at the University of Halle, Germany (1867-1889). His popularity attracted doctors and patients from all over the world. He was the lead physician for the German military during two wars. From this experience, he compared the mortality of civilian and war injuries and investigated the general poor hygienic conditions in civilian hospitals. This led him to introduce the "antiseptic technique" to Germany that was developed by Lister. His powers of observation and creativity led him to findings and achievements that to this day bear his name: Volkmann's contracture and the Hueter-Volkmann law. Additionally, he was a gifted writer; he published not only scientific literature but also books of children's fairy tales and poems under the pen name of Richard Leander, assuring him a permanent place in the world of literature as well as orthopaedics.

  6. 75 FR 53730 - Culturally Significant Objects Imported for Exhibition Determinations: “Richard Hawkins-Third Mind”

    Science.gov (United States)

    2010-09-01

    ... DEPARTMENT OF STATE [Public Notice 7148] Culturally Significant Objects Imported for Exhibition Determinations: ``Richard Hawkins--Third Mind'' SUMMARY: Notice is hereby given of the following determinations... the exhibition ``Richard Hawkins--Third Mind,'' imported from abroad for temporary exhibition within...

  7. Fluid flow in porous media using image-based modelling to parametrize Richards' equation.

    Science.gov (United States)

    Cooper, L J; Daly, K R; Hallett, P D; Naveed, M; Koebernick, N; Bengough, A G; George, T S; Roose, T

    2017-11-01

    The parameters in Richards' equation are usually calculated from experimentally measured values of the soil-water characteristic curve and saturated hydraulic conductivity. The complex pore structures that often occur in porous media complicate such parametrization due to hysteresis between wetting and drying and the effects of tortuosity. Rather than estimate the parameters in Richards' equation from these indirect measurements, image-based modelling is used to investigate the relationship between the pore structure and the parameters. A three-dimensional, X-ray computed tomography image stack of a soil sample with voxel resolution of 6 μm has been used to create a computational mesh. The Cahn-Hilliard-Stokes equations for two-fluid flow, in this case water and air, were applied to this mesh and solved using the finite-element method in COMSOL Multiphysics. The upscaled parameters in Richards' equation are then obtained via homogenization. The effect on the soil-water retention curve due to three different contact angles, 0°, 20° and 60°, was also investigated. The results show that the pore structure affects the properties of the flow on the large scale, and different contact angles can change the parameters for Richards' equation.

  8. 76 FR 10936 - Culturally Significant Objects Imported for Exhibition Determinations: “Richard Serra Drawing: A...

    Science.gov (United States)

    2011-02-28

    ... DEPARTMENT OF STATE [Public Notice: 7348] Culturally Significant Objects Imported for Exhibition Determinations: ``Richard Serra Drawing: A Retrospective'' SUMMARY: Notice is hereby given of the following... objects to be included in the exhibition ``Richard Serra Drawing: A Retrospective,'' imported from abroad...

  9. Travelling wave solutions for the Richards equation incorporating non-equilibrium effects in the capillarity pressure

    NARCIS (Netherlands)

    van Duijn, C. J.; Mitra, K.; Pop, I. S.

    2018-01-01

    The Richards equation is a mathematical model for unsaturated flow through porous media. This paper considers an extension of the Richards equation, where non-equilibrium effects like hysteresis and dynamic capillarity are incorporated in the relationship that relates the water pressure and the

  10. 78 FR 43093 - Richard C. Theuer; Filing of Food Additive Petition and Citizen Petition

    Science.gov (United States)

    2013-07-19

    ... [Docket Nos. FDA-2013-F-0700 and FDA-2013-P-0472] Richard C. Theuer; Filing of Food Additive Petition and... proposing that the food additive regulations be amended to prohibit the use of carrageenan and salts of... that Richard C. Theuer, Ph.D., 7904 Sutterton Ct., Raleigh, NC 27615, has filed a food additive...

  11. When Richard Branson wants to build his own facility; Quand Richard Branson veut construire son propre complexe

    Energy Technology Data Exchange (ETDEWEB)

    Cosnard, D

    2005-10-01

    The capacity of petroleum refineries is today insufficient to meet the demand. In front of this shortage, Sir Richard Branson, the owner of Virgin Atlantic Airways, has decided to invest in the building of a refinery in Europe or in Canada. His new company, Virgin Oil, is already launched. However, the setting up of a new facility is very expensive and raises important problems of permits and public contestation which remain to be solved. Short paper. (J.S.)

  12. Reading 'blackface': A (narrative) introduction to Richard Kearney's ...

    African Journals Online (AJOL)

    Prominent Irish philosopher Richard Kearney's notion of 'carnal hermeneutics' is introduced by applying it to a case study of a recent event that took place at one of South Africa's university campuses. The narrative assists in illuminating some of the core principles of carnal hermeneutics and illustrates the applicability of ...

  13. H.E. Mr Richard J. Fredericks, Ambassador of the United States of America to Switzerland

    CERN Document Server

    Patrice Loïez

    2001-01-01

    Photo 01 : Prof. L. Maiani, CERN Director-General, gives a piece of LHC super conducting wire to H.E. Mr. Richard J. Fredericks; Photo 02 : Prof. L. Maiani, CERN Director-General, Mr. Jan van der Boon, CERN Director of Administration and H.E. Mr. J. Richard Fredericks

  14. Feasibility of correlation mapping optical coherence tomography (cmOCT) for anti-spoof sub-surface fingerprinting.

    Science.gov (United States)

    Zam, Azhar; Dsouza, Roshan; Subhash, Hrebesh M; O'Connell, Marie-Louise; Enfield, Joey; Larin, Kirill; Leahy, Martin J

    2013-09-01

    We propose the use of correlation mapping optical coherence tomography (cmOCT) to deliver additional biometrics associated with the finger that could complement existing fingerprint technology for law enforcement applications. The current study extends the existing fingerprint paradigm by measuring additional biometrics associated with sub-surface finger tissue such as sub-surface fingerprints, sweat glands, and the pattern of the capillary bed to yield a user-friendly cost effective and anti-spoof multi-mode biometric solution associated with the finger. To our knowledge no other method has been able to capture sub-surface fingerprint, papillary pattern and horizontal vessel pattern in a single scan or to show the correspondence between these patterns in live adult human fingertip. Unlike many current technologies this approach incorporates 'liveness' testing by default. The ultimate output is a biometric module which is difficult to defeat and complements fingerprint scanners that currently are used in border control and law enforcement applications. Copyright © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. Success: Richard Dyer on Diana Ross [and Beyond

    NARCIS (Netherlands)

    Kooijman, J.

    2016-01-01

    In June 1982, film scholar Richard Dyer published a two-page essay on African-American star Diana Ross in the journal Marxism Today. Part of Dyer’s essay focuses on the American conception of success and specifically on how Ross is one of the few black artists who has been "allowed" to be such a

  16. Richard Feynman Quarks, Bombs, and Bongos

    CERN Document Server

    Henderson, Harry

    2010-01-01

    Described by his peers as the "finest physicist of his generation," Richard Feynman defied scientist stereotypes. This brash New York-born American physicist startled the more conservative giants of European physics with his endless ability to improvise. Indeed, later in life, Feynman became an accomplished bongo player. Feynman's legacy to physics was his ability to simplify complex equations and clarify fundamental principles through the use of graphs. He developed the theory of quantum electrodynamics, which illustrates the behavior of electrically charged particles, such as elect

  17. To Have Been a Student of Richard Feynman

    Indian Academy of Sciences (India)

    Excerpt from Most of the Good Stuff: Memories of Richard Feynman, 1993, ... of Feynman, but while it inspired us to try for originality after we left Cornell, it also lowered our productivity to a point that at times was dangerous to our academic careers. In truth .... (However, my actual thesis topic turned out to be a different one.).

  18. An appreciation of Richard Threlkeld Cox

    Science.gov (United States)

    Tribus, Myron

    2002-05-01

    Richard T. Cox's contributions to the foundations of probability theory and inductive logic are not generally appreciated or understood. This paper reviews his life and accomplishments, especially those in his book The Algebra of Probable Inference and his final publication Inference and Inquiry which, in this author's opinion, has the potential to influence in a significant way the design and analysis of self organizing systems which learn from experience. A simple application to the simulation of a neuron is presented as an example of the power of Cox's contribution.

  19. Richard H. Thaler: Wirtschaftsnobelpreisträger 2017

    OpenAIRE

    Bruttel, Lisa Verena; Stolley, Florian

    2017-01-01

    Der diesjährige Nobelpreisträger Richard H. Thaler ist einer breiteren Öffentlichkeit vor allem durch sein mit Cass R. Sunstein gemeinsam verfasstes Buch zum Nudging bekannt geworden. Tatsächlich hat er in den vergangenen 40 Jahren die Entwicklung der Verhaltensökonomie entscheidend mitgeprägt und vorangebracht. Thaler hat die Annahmen hinter dem Modell des Homo oeconomicus untersucht und die Abweichungen menschlichen Verhaltens von den Rationalitätsannahmen auf zwei wesentliche Ursachen zurü...

  20. Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming

    KAUST Repository

    Canepa, Edward S.; Claudel, Christian G.

    2013-01-01

    in traffic flow monitoring systems by using the underlying traffic flow model. The state of traffic is modeled by the Lighthill-Whitham- Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set

  1. Technical realization of a closure concept for a chamber-system in the underground Richard repository in the Czech Republic

    International Nuclear Information System (INIS)

    Kucerka, Miroslav

    2006-01-01

    The Phare project CZ 632.02.04 'Realization of closure of a chamber in the Richard repository as input for establishing a safety case' is a follow up implementation phase of the Phare project, CZ 01.14.03 'Solution for closure of a chamber in the Richard repository'. Main objective of both projects is to propose and realize a disposal system in selected chambers of the Richard repository, which will eliminate burden from the past practices in waste management during the first phase of the Richard repository operation (1965 - 1980) and which will improve its overall long term safety. This objective will be assured by realization of the concept of so called 'hydraulic cage', which technical solution was developed by DBE Technology within the Phare project CZ 01.14.03. The solution is described in the previous presentation 'Hydraulic Cage Concept for Waste Chambers and its Technical Implementation for the Underground Richard Repository, Litomerice, Czech Republic'. (author)

  2. Illustrated & Dissected: Professor Richard Sawdon Smith.

    Science.gov (United States)

    2015-06-01

    This Alternative Gallery feature introduces the photographic artist Professor Richard Sawdon Smith. Professor Sawdon Smith's work stems around a fascination with representations of anatomy that have been fuelled by his experience as a hospital patient. The work has allowed him to explore ideas through the use of medical illustrations which include early anatomical drawings, personal medical photography and facial modelling. The work highlights how such imagery can be used in the context of a patient seeking understanding and acceptance of ill health and disease using the body as a canvas on which to translate the experience.

  3. Richard Feynman a life in science

    CERN Document Server

    Gribbin, John

    1998-01-01

    This text is a portrayal of one of the greatest scientists of the late 20th-century, which also provides a picture of the significant physics of the period. It combines personal anecdotes, writings and recollections with narrative. Richard Feynman's career included: war-time work on the atomic bomb at Los Alamos; a theory of quantum mechanics for which he won the Nobel prize; and major contributions to the sciences of gravity, nuclear physics and particle theory. In 1986, he was able to show that the Challenger disaster was due to the effect of cold on the booster rocket rubber sealings.

  4. Richard Bright and his neurological studies.

    Science.gov (United States)

    Pearce, J M S

    2009-01-01

    Richard Bright was one of the famous triumvirate of Guy's Hospital physicians in the Victorian era. Remembered for his account of glomerulonephritis (Bright's disease) he also made many important and original contributions to medicine and neurology. These included his work on cortical epileptogenesis, descriptions of simple partial (Jacksonian) seizures, infantile convulsions, and a variety of nervous diseases. Most notable were his reports of neurological studies including papers on traumatic tetanus, syringomyelia, arteries of the brain, contractures of spinal origin, tumours of the base of the brain, and narcolepsy. His career and these contributions are outlined. Copyright 2009 S. Karger AG, Basel.

  5. Dispersion relation and self-collimation frequency of spoof surface plasmon using tight binding model

    International Nuclear Information System (INIS)

    Bhattacharya, Sayak; Shah, Kushal

    2015-01-01

    The analytical dispersion relation of spoof surface plasmon (SSP) is known only in the low-frequency limit and thus cannot be used to describe various practically important characteristics of SSP in the high-frequency limit (such as multimodal nature, anisotropic propagation, self-collimation). In this article, we consider a square lattice of holes made on a perfect electric conductor and derive a closed form expression of the SSP dispersion relation in the high-frequency limit using a tight binding model. Instead of using prior knowledge of the band diagram along the entire first Brillouin zone (BZ) edge, we analytically determine the hopping parameters by using the eigenfrequencies only at the three high-symmetry points of the square lattice. Using this dispersion relation, we derive an expression for the self-collimation frequency of SSP. We show that this analytical formulation is also applicable to dielectric photonic crystals and can be used to predict the frequencies corresponding to centimetre-scale supercollimation and second band self-collimation in these structures. Finally, we show that our analytical results are in agreement with the simulation results for both SSP and photonic crystals. (paper)

  6. Quasi-constitutional change without intent : A response to Richard Albert

    NARCIS (Netherlands)

    Passchier, Reijer

    2017-01-01

    Recently, Buffalo Law Review published Richard Albert’s article on “quasi-constitutional amendments.” These are, in Albert’s words, “sub-constitutional changes that do not possess the same legal status as a constitutional amendment, that are formally susceptible to statutory repeal or revision, but

  7. Koht, kust tagasi ei tulda / Mark Jenkins ; fotod Cory Richards

    Index Scriptorium Estoniae

    Jenkins, Mark

    2015-01-01

    National Geographicu ekspeditsiooni, mille koosseisu kuulusid Renan Ozturk, Mark Jenkins, Cory Richards, Emily Harrington ja Kilaree O'Neill, püüdlustest tõusta Kagu-Aasia kõrgeima mäe Hkakabo Razi tippu ning mõõta selle täpset kõrgust GPS-i abil

  8. Wooing-Scenes in “Richard III”: A Parody of Courtliness?

    Directory of Open Access Journals (Sweden)

    Agnieszka Stępkowska

    2009-11-01

    Full Text Available In the famous opening soliloquy of Shakespeare’s Richard III, Richard mightily voices his repugnance to “fair well-spoken days” and their “idle pleasures”. He realizes his physical deformity and believes that it sets him apart from others. He openly admits that he is “not shaped for sportive tricks, nor made to court an amorous looking-glass”. Yet, his monstrosity constitutes more perhaps of his aggressive masculine exceptionality rather than of his deformity. Richard’s bullying masculinity manifests itself in his contempt for women. In the wooing scenes we clearly see his pugnacious pursuit of power over effeminate contentment by reducing women to mere objects. Additionally, those scenes are interesting from a psychological viewpoint as they brim over with conflicting emotions. Therefore, the paper explores two wooing encounters of the play, which belong the best examples of effective persuasion and also something we may refer to as ‘the power of eloquence’.

  9. Richard Kelly: Pioneirismo na iluminação da arquitetura moderna

    Directory of Open Access Journals (Sweden)

    Fernanda Brito Bandeira

    2018-04-01

    Full Text Available Livros resenhado: NEUMANN, Dietrich; STERN, Robert A. M. The structure of light: Richard Kelly and the illumination of modern architecture. New York: Yale University Press, 2010, 214 p. ISBN: 978-0-300-16370-4

  10. Richard Rorty's Conception of Philosophy of Education Revisited

    Science.gov (United States)

    Noaparast, Khosrow Bagheri

    2014-01-01

    In this essay Khosrow Bagheri Noaparast argues that, by focusing on acculturation and edification, Richard Rorty has provided a promising view for education because without acculturation, education turns into a destructive endeavor, and without edification, education risks the danger of being repetitive and reproductive. However, Rorty's view…

  11. The Paradox of the Public Realm in Richard Rorty

    Directory of Open Access Journals (Sweden)

    Martha Palacio Avendaño

    2008-12-01

    Full Text Available The concepto of the public sphere in Richard Rorty's philosophy, inherited of liberal tradition, allows be treated as a part of a game of language called democratic liberalism. One of the rules for validating a move in this game consists in taking for granted the distinction between the public and the private spheres. Richard Rorty thought that democratic liberalism did not need any foundation beyond the way to play it; its only criteria would be the game's practices, according an utopia which would allow us to make more movements in the game. That is, democratic liberalism does not require foundations, but just practices for achieving a social hioe inspired on freedom and pluralism. This kind of utopia, based upon the non-cruelty principle, would make possible an inclusive society where everyone would have a place for their own private vocabulary. In this way, Rorty would have linked freedom and solidarity. However, this language-game reveals the paradox of the link which implies the meaning of the public shere. Herein, freedom is not a sufficient condition of solidarity; hence, there is no place for social inclusion in Rorty's language game.

  12. Has Richard Rorty a moral philosophy?

    Directory of Open Access Journals (Sweden)

    Mohammad Asghari

    2015-06-01

    Full Text Available I try to show that Richard Rorty, although is not a moral philosopher like Kant, nerveless, has moral philosophy that must be taken seriously. Rorty was not engaged with moral philosophy in the systematic manner common among leading modern and contemporary moral philosophers. This paper has two parts: first part, in brief, is concerned with principles of his philosophy such as anti-essentialism, Darwinism, Freudism, and historicism. Second part which be long and detailed, considers many moral themes in Rorty's thought such as critique of Kantian morality, solidarity, moral progress, cruelty and concept of other, etc. Subsequently, I will try to answer the research question of the article namely, has Rorty a moral philosophy?

  13. Whatever Happened to Richard Reid's List of First Programming Languages?

    Science.gov (United States)

    Siegfried, Robert M.; Greco, Daniel M.; Miceli, Nicholas G.; Siegfried, Jason P.

    2012-01-01

    Throughout the 1990s, Richard Reid of Michigan State University maintained a list showing the first programming language used in introductory programming courses taken by computer science and information systems majors; it was updated for several years afterwards by Frances Van Scoy of West Virginia University. However, it has been 5 years since…

  14. Richard Wright, Toni Morrison, and United States book clubs

    Directory of Open Access Journals (Sweden)

    Mark Madigan

    2004-12-01

    Full Text Available This essay focuses on the influence of commercial book clubs in the United States. It will examine the country's oldest commercial book club, the Book-of-the-Month Club (BOMC, Oprah's Book Club (OBC, which bears the name of its founder, television personality Oprah Winfrey, and their roles in the careers of two African-American authors, Richard Wright and Toni Morrison.

  15. Argument from Design in Richard Baxter's Natural Theology

    Directory of Open Access Journals (Sweden)

    Igor Koshelev

    2017-12-01

    Full Text Available The article deals with the teleological argument, or argument from design, as expounded by a famous English Protestant theologian Richard Baxter, one of the leading 17-th century English Puritans, in his work “The Reasons of the Christian Religion”. Natural theology, providing arguments for the existence of God based on reason and without appeal to the Revelation, has always played a vital role throughout the entire history of theological thought. The most popular was the so called teleological argument, or the argument from design, which stands out among all rational arguments for the existence of the Creator. It is mostly known from the “Fifth Way” of the medieval Scholastic philosopher Thomas Aquinas and a famous work “Natural Theology” by an English 19-th century theologian William Paley. The foundation for the modern research in the area was laid during the age of the Scientific Revolution of the 17th century English nature philosophers and theologians, especially Robert Boyle, who believed the teleological argument to be the key element of Natural Theology. His friend and confessor, Richard Baxter, a prominent representative of the Puritan Natural Theology, mostly known by his theological works, paved the way for Natural Theology both in his own time and the following centuries. His work was thought to be the best collection of the evidences for Christianity.

  16. Spoof Detection for Finger-Vein Recognition System Using NIR Camera

    Directory of Open Access Journals (Sweden)

    Dat Tien Nguyen

    2017-10-01

    Full Text Available Finger-vein recognition, a new and advanced biometrics recognition method, is attracting the attention of researchers because of its advantages such as high recognition performance and lesser likelihood of theft and inaccuracies occurring on account of skin condition defects. However, as reported by previous researchers, it is possible to attack a finger-vein recognition system by using presentation attack (fake finger-vein images. As a result, spoof detection, named as presentation attack detection (PAD, is necessary in such recognition systems. Previous attempts to establish PAD methods primarily focused on designing feature extractors by hand (handcrafted feature extractor based on the observations of the researchers about the difference between real (live and presentation attack finger-vein images. Therefore, the detection performance was limited. Recently, the deep learning framework has been successfully applied in computer vision and delivered superior results compared to traditional handcrafted methods on various computer vision applications such as image-based face recognition, gender recognition and image classification. In this paper, we propose a PAD method for near-infrared (NIR camera-based finger-vein recognition system using convolutional neural network (CNN to enhance the detection ability of previous handcrafted methods. Using the CNN method, we can derive a more suitable feature extractor for PAD than the other handcrafted methods using a training procedure. We further process the extracted image features to enhance the presentation attack finger-vein image detection ability of the CNN method using principal component analysis method (PCA for dimensionality reduction of feature space and support vector machine (SVM for classification. Through extensive experimental results, we confirm that our proposed method is adequate for presentation attack finger-vein image detection and it can deliver superior detection results compared

  17. Spoof Detection for Finger-Vein Recognition System Using NIR Camera.

    Science.gov (United States)

    Nguyen, Dat Tien; Yoon, Hyo Sik; Pham, Tuyen Danh; Park, Kang Ryoung

    2017-10-01

    Finger-vein recognition, a new and advanced biometrics recognition method, is attracting the attention of researchers because of its advantages such as high recognition performance and lesser likelihood of theft and inaccuracies occurring on account of skin condition defects. However, as reported by previous researchers, it is possible to attack a finger-vein recognition system by using presentation attack (fake) finger-vein images. As a result, spoof detection, named as presentation attack detection (PAD), is necessary in such recognition systems. Previous attempts to establish PAD methods primarily focused on designing feature extractors by hand (handcrafted feature extractor) based on the observations of the researchers about the difference between real (live) and presentation attack finger-vein images. Therefore, the detection performance was limited. Recently, the deep learning framework has been successfully applied in computer vision and delivered superior results compared to traditional handcrafted methods on various computer vision applications such as image-based face recognition, gender recognition and image classification. In this paper, we propose a PAD method for near-infrared (NIR) camera-based finger-vein recognition system using convolutional neural network (CNN) to enhance the detection ability of previous handcrafted methods. Using the CNN method, we can derive a more suitable feature extractor for PAD than the other handcrafted methods using a training procedure. We further process the extracted image features to enhance the presentation attack finger-vein image detection ability of the CNN method using principal component analysis method (PCA) for dimensionality reduction of feature space and support vector machine (SVM) for classification. Through extensive experimental results, we confirm that our proposed method is adequate for presentation attack finger-vein image detection and it can deliver superior detection results compared to CNN

  18. Response to Richard Widdess: Music, Meaning and Culture

    Directory of Open Access Journals (Sweden)

    Jerome Lewis

    2012-09-01

    Full Text Available This commentary discusses the anthropological implications of Richard Widess’ paper by summarizing some anthropological approaches to music, especially focusing on the way musical participation inculcates and transmits an aesthetic orientation that guides action across cultural domains such as politics, economics and religion. The paper ends by suggesting that the heart of human culture is more likely to be an aesthetic orientation than a script or set of rules, and traces out some reasons why music does this so well.

  19. Review: Lyn Richards (2005. Handling Qualitative Data: A Practical Guide

    Directory of Open Access Journals (Sweden)

    Robert L. Miller

    2006-03-01

    Full Text Available Handling Qualitative Data: A Practical Guide is an introductory textbook covering all stages of qualitative research from the initial conceptualisation of a project, through data collection and analysis, to writing up. The author, Lyn RICHARDS, is a well-known developer of two key qualitative software analysis packages, NUD*IST and NVivo. While RICHARDS clearly advocates the use of qualitative analysis software, the text is "generic" and could be used in tandem with any qualitative software package. The book concentrates on practical advice about the use of software to manage and analyse qualitative data, and provides insights in these areas. The consideration of issues around team-based qualitative research is another strong point. However, due in part to its short length, the overall coverage of topics tends to be superficial. In itself, the book does not provide sufficient detailed support for a student who would like to use it as her/his main source of guidance for carrying out a qualitative research project. URN: urn:nbn:de:0114-fqs0602244

  20. Drawings of fossils by Robert Hooke and Richard Waller

    Science.gov (United States)

    Kusukawa, Sachiko

    2013-01-01

    The drawings of fossils by Robert Hooke and Richard Waller that were the basis of the engravings in Hooke's Posthumous works (1705) are published here for the first time. The drawings show that both Hooke and Waller were proficient draftsmen with a keen eye for the details of petrified objects. These drawings provided Hooke with a polemic edge in making the case for the organic origins of ‘figured stones’.

  1. Justiça e sociedade liberal em Richard Rorty: justiça como lealdade e o projeto social de uma utopia

    Directory of Open Access Journals (Sweden)

    Marcelo de Almeida Silva

    2014-07-01

    Full Text Available O presente texto pretende explorar o conceito de justiça de Richard Rorty e a proposta da Utopia Liberal que o autor apresenta. Para tanto, explora, dentro da obra de Richard Rorty e de alguns autores com quem dialoga, contribuições para o debate da concepção do termo Justiça como um senso de lealdade ampliada e de sua proposta para uma sociedade mais justa, igualitária e inclusiva.   Abstract: This paper aims to explore the concept of justice from Richard Rorty and his proposal about the idea of a Liberal Utopia. With this goal we seek, within the work of Richard Rorty, and some authors with whom he converses, contributions to the discussion of the conception of justice as an expanded sense of loyalty and his proposal for a fairer, equitable and inclusive society.   Resumen: Este trabajo se propone explorar el concepto de justicia de Richard Rorty y la propuesta de liberal utopía que el autor presenta. Con este objetivo, vamos a buscar en la obra de Richard Rorty, y algunos autores con los que conversa, contribuciones a la discusión sobre la concepción de la justicia como un sentido más amplio de la lealtad y su propuesta de una sociedad más justa, equitativa e incluyente.

  2. Strauss, Richard. Ariane a Naxos: opera seulement, integrale. Miliza Korjus / Michel Parouty

    Index Scriptorium Estoniae

    Parouty, Michel

    1995-01-01

    Uuest heliplaadist "Strauss, Richard. Ariane a Naxos: opera seulement, integrale. Miliza Korjus (Najade). Orchestre de l'Opea l'Efat de Vienne" Arlecchino ARL 14-16, distribution Dante (3 CD: 390 F). 1935, 1944. TT: 3h 46'17"

  3. Making the Road While Walking It: A Conversation with Richard Simpson

    Science.gov (United States)

    Zabel, Robert H.; Kaff, Marilyn; Teagarden, James

    2016-01-01

    Richard Simpson is professor of special education at the University of Kansas (KU). Dr. Simpson's duties at KU have included roles of staff psychologist, teaching associate, assistant professor, project director, associate professor, professor, and chairperson for the Department of Special Education. He has directed numerous University of Kansas…

  4. Lendab nagu kotkas üle maailmas kogutud tarkuse / Richard Aroksaar ; intervjueerinud Ene Riet

    Index Scriptorium Estoniae

    Aroksaar, Richard

    2014-01-01

    Intervjuu eestlase Richard Aroksaarega, kes õppinud psühholoogiat ja raamatukogundust, töötab USA Rahvusparkide Ühenduse raamatukogus (National Park Service Library, NPS) süsteemi raamatukoguhoidja ja administraatorina

  5. Prof. Richard Mattessich at 95. His Research Methodology

    Directory of Open Access Journals (Sweden)

    Giuseppe Galassi

    2017-12-01

    Full Text Available This paper is presented as a tribute to prof. Richard Mattessich. It is written “through the eyes” of a researcher who has worked closely with him over a period of 42 years, starting attending his courses of “Income Determination Theory” and “Research Methodology” at the University of British Columbia in 1975. Among his huge scientific research and publications, I intend to underline these three major contributions: (i Accounting metrics and other mathematical instruments which anticipated computer spreadsheet by 30 years; (ii. The preparation of accountants for information economics by means of analytical methods; and (iii The proposition of the “onion model of reality” to distinguish different Kind of reality. Este trabajo se presenta como un tributo al profesor Richard Mattessich. Está escrito “con los ojos” de un investigador que ha trabajado estrechamente con él durante un período de 42 años, comenzando a asistir a sus cursos de " Income Determination Theory" y "Research Methodology" en la Universidad de British Columbia en 1975. Entre su investigación y publicaciones, más importantes pretendo subrayar estas tres contribuciones principales: (i Accounting metrics and other mathematical instruments which anticipated computer spreadsheet by 30 years; (ii The preparation of accountants for information economics by means of analytical methods; y (iii The proposition of the “onion model of reality” to distinguish different Kind of reality.

  6. Swearing Used in Richard Wright’s Black Boy

    Directory of Open Access Journals (Sweden)

    Giyatmi Giyatmi

    2017-07-01

    Full Text Available This research aims at finding the types of swearing expressions and linguistic forms of English swearing used in Richard Wright’s Black Boy. This is a descriptive qualitative research since it describes the phenomena of swearing used in the novel. The data of the research are all the conversations or sentences used swearing in the novel written by Richard Wright namely Black Boy as the main data source. The method of collecting data in this research is observation and teknik lanjut catat. After all the data had been collected then they are coded using the coding system such as data number/title of novel/chapter/page/data. There is no data reduction since all the data are analyzed in this research. This research used theory triangulation. Kind of swearing expressions found in this novel dealing with God and religion terms, name of  animals and plants, part of body, racial terms, stupidity terms, name of occupation, sexual terms, family terms. The linguistic forms of English swearing used in this novel are word, phrase, and clause. The swearing in the form of words consists of (1 noun referring to place, person, occupation, animal, and idea (2 verb and (3 adjective. Phrase consists of (1 noun phrase with swearing functioning as headword, modifier, and both headword and modifier, (2 adjective phrase with swearing functioning as modifier. Swearing expression is also found in the form of sentence.

  7. Historical Investigations of the Richard B. Russell Multiple Resource Area.

    Science.gov (United States)

    1981-11-01

    period of this project as a contemporary c~lebration and a reiteration of an ancient folk construction, Stonehenge . Appropriately, as this document goes to...55, 56m, 59m, 64m, 65-68, 71- Stonehenge 216 72, 75-76, 79-84, 84m, 91, 94- Sutch, Richard 20 95, 100, lOlm, 102, 103, 121m, Swift, James Y. 195 126

  8. Review of Richard Bausch, Hello to the Cannibals

    Directory of Open Access Journals (Sweden)

    Géraldine Chouard

    2006-03-01

    Full Text Available Richard Bausch is credited with five collections of short stories and nine novels that have received various awards in the United States. His latest work, Hello to the Cannibals, blends a historical epic and a more intimate tale. Watch out‑this is a voracious novel.Other CarnageAn ethnologist investigating cannibalistic rites in Africa asks the head of the tribe : « Do you still have cannibals in your tribe ? » « No, we ate the last one yesterday, » answers the head of the tribe. Undoubtedly,...

  9. El vocabulario sechurano de Richard Spruce

    Directory of Open Access Journals (Sweden)

    Matthias Urban

    2015-12-01

    Full Text Available This paper makes accesible a new transcription of Richard Spruce’s vocabulary of the Sechura language. Collected in the mid-19th century by the British botanist, it constitutes one of only two sources of data for this language of northernmost Peru. A comparison of the original with previously published versions shows serious errors in transcription, in particular in those of Otto von Buchwald and Jacinto Jijón y Camaaño. The article also discusses the probable circumstances of data collection and the publication history of the hitherto known version, and concludes with some first observations on the significance of Spruce’s wordlist for elucidating the linguistic history of the region, in particular with regard to the question of the linguistic situation at Olmos.

  10. Transforming Faith: H. Richard Niebuhr and Paulo Freire on Moral Education

    Science.gov (United States)

    Daniel, Joshua Leonard

    2013-01-01

    Through a contextual comparison of the theological ethics of H. Richard Niebuhr and the educational theory of Paulo Freire, I argue that socialization, while an essential task of moral education, is an insufficient aim. The proper aim of moral education is individual development. The intention of my argument is address tendencies towards…

  11. When Richard Branson wants to build his own facility

    International Nuclear Information System (INIS)

    Cosnard, D.

    2005-01-01

    The capacity of petroleum refineries is today insufficient to meet the demand. In front of this shortage, Sir Richard Branson, the owner of Virgin Atlantic Airways, has decided to invest in the building of a refinery in Europe or in Canada. His new company, Virgin Oil, is already launched. However, the setting up of a new facility is very expensive and raises important problems of permits and public contestation which remain to be solved. Short paper. (J.S.)

  12. Richard Carwardine and Jay Sexton, eds., The Global Lincoln.

    Directory of Open Access Journals (Sweden)

    Hans Krabbendam

    2012-06-01

    Full Text Available Most countries have their export heroes that transcend their national origin: India has its Ghandi, South Africa its Mandela, England its Churchill, and the US has Abraham Lincoln. While particularly known for his role in the American Civil War, he has developed into an international beacon for liberalism and democracy, especially for nationals deprived of this liberties.This collection of essays, edited by Corpus Christi College (Oxford, UK colleagues Richard Carwardine and Jay Sexton, puts...

  13. Ripples from a Passing Ship: Memories; and a Legacy of Richard Peters

    Science.gov (United States)

    Harris, Kevin

    2013-01-01

    This paper outlines aspects and dimensions of my "relationship" with Richard Peters from 1966 onward. The underlying suggestion is that, while Peters' contribution to philosophy of education was undeniably of major proportions, both that contribution and his legacy are institutional rather than substantive. (Contains 15 notes.)

  14. Spoof surface plasmon modes on doubly corrugated metal surfaces at terahertz frequencies

    International Nuclear Information System (INIS)

    Liu, Yong-Qiang; Kong, Ling-Bao; Du, Chao-Hai; Liu, Pu-Kun

    2016-01-01

    Spoof surface plasmons (SSPs) have many potential applications such as imaging and sensing, communications, innovative leaky wave antenna and many other passive devices in the microwave and terahertz (THz) spectrum. The extraordinary properties of SSPs (e.g. extremely strong near field, enhanced beam–wave interaction) make them especially attractive for developing novel THz electronic sources. SSP modes on doubly corrugated metal surfaces are investigated and analyzed both theoretically and numerically in this paper. The analytical SSP dispersion expressions of symmetric and anti-symmetric modes are obtained with a simplified modal field expansion method; the results are also verified by the finite integration method. Additionally, the propagation losses are also considered for real copper surfaces with a limited constant conductivity in a THz regime. It is shown that the asymptotical frequency of the symmetric mode at the Brillouin boundary decreases along with the decreased gap size between these two corrugated metal surfaces while the asymptotical frequency increases for the anti-symmetric mode. The anti-symmetric mode demonstrates larger propagation losses than the symmetric mode. Further, the losses for both symmetric and anti-symmetric modes decrease when this gap size enlarges. By decreasing groove depth, the asymptotical frequency increases for both the symmetric and the anti-symmetric mode, but the variation of propagation losses is more complicated. Propagation losses increase along with the increased period. Our studies on the dispersion characteristics and propagation losses of SSP modes on this doubly corrugated metallic structure with various parameters is instructive for numerous applications such as waveguides, circuitry systems with high integration, filters and powerful electronic sources in the THz regime. (paper)

  15. Süütuse kaotamine / Richard Branson ; intervjueerinud Peter Fisk ; tõlkinud Endrik Randoja

    Index Scriptorium Estoniae

    Branson, Richard

    2009-01-01

    Turunduskirjanik Peter Fiski intervjuu Suurbritannia ärimagnaadi Sir Richard Bransoniga, milles arutletakse ettevõtja suurimate saavutuste ja suurimate pettuste üle, uuritakse Bransoni võimet juhtida oma 450 ettevõtet, tema suhtumist konkurentsi ning uutesse äriideedesse, samuti tema ajakasutust

  16. Obituary: Richard D. Schwartz (1941-2011)

    Science.gov (United States)

    Wilking, Bruce

    2011-12-01

    Richard D. Schwartz, Professor Emeritus of Astronomy, died at his home in Sequim, WA, after a nearly 3 year battle against pancreatic cancer. Richard was born in Pretty Prairie, Kansas. He was active in sports and band and graduated in 1959. After completing a BS at Kansas State, and a Master's degree in Divinity at Union Seminary in NY, he further studied astrophysics, receiving his doctorate from University of Washington in 1973. When Dick arrived at the University of Missouri-St. Louis in 1975, he was the only astronomer in the Department of Physics. He built the astronomy program and initiated the B.S. in physics with an astrophysics option that the majority of physics majors choose. Dick was a wonderful teacher and provided outstanding leadership to the campus. He designed and provided oversight on the construction of the campus observatory that was completed in 1981. Since that time the observatory has served as both a teaching and research facility. It is also used for monthly public open houses that draw hundreds of people annually to the campus to view the moon, stars, and planets. Upon his retirement in 2003, the Board of Curators approved naming the campus observatory the "Richard D. Schwartz Observatory" in honor of his distinctive service to the University of Missouri-St. Louis. Just as important as Dick's service to promote public interest in astronomy was his effort to make the campus observatory a research facility. Dick equipped and maintained the observatory with state-of-art detectors that allowed students to get their first taste of scientific research. From 1991-2003, he managed the campus program for the NASA/Missouri Space Grant Consortium and mentored over 30 research students in projects at the observatory. Some of the results have been published in astronomical journals. Many of those students went on to graduate schools and several have achieved tenure and distinction at major universities. In addition to Dick's service to the University

  17. Efficacy Quotient Tindakan ESWL Piezolith Richard Wolf 3000 pada Penderita Batu Ureter di RSUPN Dr. Cipto Mangunkusumo, 2008–2011

    Directory of Open Access Journals (Sweden)

    Vinny Verdini

    2017-01-01

    Full Text Available Extracorporeal shockwave lithotripsy (ESWL saat ini telah menjadi metode yang paling umum dalam tatalaksana aktif batu ureter. Sejak Maret 2008, RSCM telah menggunakan mesin ESWL piezolith 3000 richard wolf dan belum diketahui nilai efficacy quotient (EQ. Penelitian ini bertujuan untuk menentukan nilai EQ dari tindakan ESWL menggunakan mesin piezolith richard wolf 3000 pada batu ureter dan hubungan angka bebas batu dengan lokasi batu, jumlah batu, beban batu, opasitas batu, obstruksi, dan fungsi ginjal. Studi cross sectional ini dilakukan pada bulan Januari 2008-Desember 2011 dan data dianalisis dengan statistik multivariat. Terdapat 113 (95 % dari 119 pasien yang dinyatakan bebas batu setelah tindakan ESWL pertama. Didapatkan nilai EQ 0,89. Hanya ukuran batu yang mempengaruhi angka bebas batu dalam penelitian ini (p<0,05. Disimpulkan bahwa prosedur ESWL menggunakan mesin richard wolf piezolith 3000 memiliki nilai EQ dan angka bebas batu yang lebih baik daripada mesin-mesin sebelumnya dan mesin lain yang sejenis. Faktor yang mempengaruhi keberhasilan adalah ukuran batu ureter yang ditatalaksana.Kata Kunci: batu ureter, ESWL, efficacy quotient, angka bebas batu. Efficacy Quotient of ESWL Piezolith Richard Wolf 3000 Machine in Patientswith Ureteral Stones in Dr. Cipto MangunkusumoNational Hospital 2008 - 2011AbstractExtracorporeal shockwave lithotripsy (ESWL is the most common method of ureteral stone management. Since 2008, RSCM has ben using ESWL piezolith 3000 richard wolf and efficacy quotient (EQ value have not yet studied. The study aims was to determine the efficacy quotient (EQ of ESWL using piezolith richard wolf 3000 machine for ureteral stone by analyzing free-stone rate with location of stones, number of stones, stone burden, stone opacity, obstruction and kidney function. This cross sectional study was carried out in January 2008-December 2011, with multivariate analytical study. Ninety five percent (n=113 of 119 patients were

  18. Richard Wollheim über die Metapher in der Malerei

    OpenAIRE

    Heinrich, Richard

    1993-01-01

    Es handelt sich um den Text eines Vortrages, den ich Jänner 1993 im Rahmen einer Vortragsreihe am Institut für Kunstgeschichte der Universität Wien gehalten habe. Er ist bisher unpubliziert und nicht redigiert. Das worüber ich spreche ist ein Artikel von Richard Wollheim mit dem Titel "Die Metapher in der Malerei". Diesen Artikel habe ich herausgegeben, gemeinsam mit meinem Kollegen Helmuth Vetter, 1991 in dem Band "Bilder der Philosophie". Ursprünglich handelt es sich um einen Vortrag, d...

  19. RICHARD WAGNER E O ROMANTISMO ALEMÃO

    Directory of Open Access Journals (Sweden)

    Rainer Câmara Patriota

    2015-07-01

    Full Text Available A cultura musical romântica encontra em Richard Wagner– em sua obra musical e teórica – um de seus maiores protagonistas.A rejeição da Aufklärung e a exaltação da supremacia germânica –elementos constituidores da Weltanschauung romântica alemã –caracterizam fortemente o pensamento e a atitude de Wagner frenteà vida, assumindo conotações ainda mais radicais através de seucontumaz antissemitismo. De modo que pensar Wagner por ocasiãode seu bicentenário também significa retomar uma discussão crucialsobre o romantismo alemão e suas implicações políticas eideológicas.

  20. Conoscenza e etica in Richard Rorty

    Directory of Open Access Journals (Sweden)

    Emilia Romano

    2011-12-01

    Full Text Available The era in which we live, characterized by multiculturalism and complexity, it is a time when it is clear the difficulty of man to orient and to choose their own way. It’s the time of the fall of every certainty, is the era of “post”, after the tradition, after metaphysics, after the truth, and that requires more effort than any other constant reflection. The neopragmatismo seems to be an effective investigative tool for conducting this reflection and a vantage point to carry on a conversation around the issues of education. In particular, the author intended to refer to the work of Richard Rorty, the author who more than others reflected on the encounter between two important pragmatist tradition: that of classical pragmatism and the “continental” or responsible for the development of a new European concept of truth, understood as a critical and interpretative.

  1. Resisting Biopolitics through “Diaphanous Wonder”: Richard Flanagan's Gould's Book of Fish

    NARCIS (Netherlands)

    Wiese, Doro|info:eu-repo/dai/nl/304842699

    2014-01-01

    In Gould's Book of Fish (2003), author Richard Flanagan manages to invent a format in which content and style account for historical events on Sarah Island, Tasmania in the 1820s, yet he does so in a manner that is not in the least objective, disinterested or fact-orientated. The perspective of

  2. "Symposium" by Richard Dawkins, Gerard 't Hooft, Alain Connes

    CERN Multimedia

    Maximilien Brice

    2004-01-01

    Richard Dawkins will speak on biology, Gerard ‘t Hooft will focus on physics, and Alain Connes will discuss mathematics. CERN scientists probe ever-deeper levels of matter and their interactions, but can we say that the patterns they see are truly fundamental? Does the universe obey the same laws throughout? Since mathematical constructions can be true in the absence of any relation to the physical world, is mathematics more fundamental than physics? Extraterrestrial life would probably look much different from that on Earth, but natural selection still be fundamental to their evolution?

  3. Juvenile Cosmology; Or Richard Powers’ Post-Global Doughnut

    Directory of Open Access Journals (Sweden)

    Judith Roof

    2010-02-01

    Full Text Available Le roman de Richard Powers, Operation Wandering Soul (1993, présente le lien subtil qui associe un mondialisme déjà usé et vieillissant à l’enfant perçu comme catégorie dominante. Comme les faces serpentines d’un ruban de Möbius lové autour de l’illimité et de l’intemporel, le texte, tendu entre ses deux infinis – l’univers et l’enfant – révise la portée, la conception, la structure et le style du genre romanesque. Délaissant Aristote pour Einstein, Operation Wandering Soul se place sur le terrain de la cosmologie. Le récit, qui rassemble la kyrielle des grands ralliements juvéniles et leurs vains pèlerinages, concentre l’espace-temps dans une présentation qui évoque la « somme des histoires » de Richard Feynman. La contraction de l’espace-temps opérée par le roman ne fait pas de celui-ci un hymne simpliste au global (catégorie déjà aussi datée que celle des malheureux vétérans du Vietnam, mais capte au contraire la conscience grandissante d’une existence sans origine qui s’étend à perte de vue au-delà de ses coordonnées supposées. Le roman s’enroule sur lui-même tout en s’épanchant au dehors, boucle ses cadres et ses détours tout en desserrant leur emprise. Il fait tourner la roue de ses récits comme des planètes en rotation, la ronde d’un système solaire, le tourbillon d’une galaxie. La conscience que présente Operation Wandering Soul ne se résume donc pas au seul point de vue de l’âme errante qu’est le personnage de Kraft, mais consiste en la somme de tous les temps et de tous les lieux, de leurs strates accumulées comme une conscience en acte, complexe et tissée de réseaux, qui n’appartient à personne et est partagée par tous. Cette accumulation organise le jeu des perspectives multiples qui instaurent l’acte de lecture et sont instaurées par lui. À cet égard, lire constitue ici une physique des oubliés.Richard Powers’ novel Operation Wandering

  4. Kitchenette: Hell or Home? Different"Kitchenette"Images Created by Richard Wright and Gwendolyn Brooks%Kitchenette:Hell or Home?Different"Kitchenette"Images Created by Richard Wright and Gwendolyn Brooks

    Institute of Scientific and Technical Information of China (English)

    肖志宏

    2017-01-01

    How the southern black migrants navigate and survive the northern urban space is a question profoundly explored and realistically documented in many migration narratives in African American literature. This paper concentrates on the image of Chicago"kitchenette"in the works of Richard Wright and Gwendolyn Brooks, in an attempt to demonstrate the different inter-pretations of migrant spaces on the urban landscape.

  5. Astronomical fire: Richard Carrington and the solar flare of 1859.

    Science.gov (United States)

    Clark, Stuart

    2007-09-01

    An explosion on the Sun in 1859, serendipitously witnessed by amateur astronomer Richard Carrington, plunged telegraphic communications into chaos and bathed two thirds of the Earth's skies in aurorae. Explaining what happened to the Sun and how it could affect Earth, 93 million miles away, helped change the direction of astronomy. From being concerned principally with charting the stars to aid navigation, astronomers became increasingly concerned with what the celestial objects were, how they behaved and how they might affect life on Earth.

  6. Racial Shame and the Pleasure of Transformation: Richard Rodriguez's Queer Aesthetics of Assimilation

    Science.gov (United States)

    Beltran, Cristina

    2012-01-01

    This essay analyzes Latino conservative thought by rethinking the logics of assimilation through a simultaneous exploration of aesthetic possibility and negative affect. Focusing on the writings of Richard Rodriguez, the essay considers how creative forms of self-individuation and political agency cannot easily be decoupled from negative forms of…

  7. La paradoja de lo público en Richard Rorty

    Directory of Open Access Journals (Sweden)

    Martha Palacio Avendaño

    2008-01-01

    Full Text Available El concepto de lo público en Richard Rorty, heredero de la tradición liberal, admite ser tratado como parte de un juego del lenguaje denominado liberalismo democrático. En ese sentido, una de las reglas de este juego para saber si una jugada es válida consiste en asumir la distinción entre esfera pública y privada. Richard Rorty pensó que este juego no requería fundamentación más allá de la forma de jugarlo, que el criterio en que se apoyaría estaba en las prácticas que tienen lugar dentro del mismo con arreglo a sostener una utopía que permitiera hacer cada vez más jugadas. Esto es, el liberalismo democrático no requería basarse en algo más allá de las prácticas conducentes a lograr una esperanza social alentada por la libertad en defensa del pluralismo. Su utopía liberal, guiada por el principio de la no-crueldad, haría posible una sociedad inclusiva en la que todos tuvieran espacio para su léxico privado. De este modo, Rorty habría vinculado libertad y solidaridad, pero su juego del lenguaje permite advertir la paradoja del vínculo que implicaría el sentido de lo público. Aquí, la libertad no es condición suficiente de la solidaridad, de modo que la inclusión social no tiene cabida en su juego del lenguaje.

  8. Richard Rorty, o la posibilidad de un etnocentrismo universal

    Directory of Open Access Journals (Sweden)

    Isabel Gamero Cabrera

    2010-04-01

    Full Text Available En el presente artículo intentaremos comprender y analizar las implicaciones actuales de dos tesis del filósofo estadounidense Richard Rorty en relación con su etnocentrismo: La expansión global del sistema democrático liberal como horizonte de su teoría política y la restricción de las creencias de importancia última a la esfera privada. Compararemos esta teoría con las aportaciones de otros dos autores: una interpretación antropológica de los juegos de lenguaje de Wittgenstein y la democracia radical de Mouffe.

  9. A soil moisture accounting-procedure with a Richards' equation-based soil texture-dependent parameterization

    Science.gov (United States)

    Given a time series of potential evapotranspiration and rainfall data, there are at least two approaches for estimating vertical percolation rates. One approach involves solving Richards' equation (RE) with a plant uptake model. An alternative approach involves applying a simple soil moisture accoun...

  10. [Sir William Richard Gowers: author of the "bible of neurology"].

    Science.gov (United States)

    Hirose, Genjiro

    2014-11-01

    William Richard Gowers is one of the great pioneers in neurology and the author of the well-known neurology textbook, "A Manual of Diseases of the Nervous System." His concepts of neurology are based on meticulously and carefully accumulated knowledge of history, observations, and neurological examinations of patients with various neurological diseases. He is not only a great neurologist but also a great teacher who loves teaching students and physicians through well-prepared lectures. We can glean the essence of the field of neurology through his life story and numerous writings concerning neurological diseases.

  11. Of poetics and possibility: Richard Kearney’s post-metaphysical God

    Directory of Open Access Journals (Sweden)

    Yolande Steenkamp

    2017-11-01

    Full Text Available This article provides an overview of Richard Kearney’s attempt at re-imagining God post-metaphysically. In the context of a continental dialogue on the topic, Kearney has responded to onto-theology with a hermeneutic and phenomenologically informed attempt to rethink God post-metaphysically. This eschatological understanding of God is expounded in the article and is placed in relation to Kearney’s more recent concept of Anatheism. The article closes with a few remarks on what may be gained by Kearney’s work, as well as outlining a few critical questions.

  12. Understanding Richard Wright's "Black Boy": A Student Casebook to Issues, Sources, and Historical Documents.

    Science.gov (United States)

    Felgar, Robert

    In "Black Boy," Richard Wright triumphs over an ugly, racist world by fashioning an inspiring, powerful, beautiful, and fictionalized autobiography. To help students understand and appreciate his story in the cultural, political, racial, social, and literary contexts of its time, this casebook provides primary historical documents,…

  13. Il concetto di medium artistico: Richard Wollheim interprete di Ludwig Wittgenstein

    OpenAIRE

    Maistrello, Andrea

    2016-01-01

    The aim of the dissertation is twofold: (i) analyzing the notion (well known by aestheticians, but not so intensively studied) of artistic medium; (ii) showing the relevance of such notion for aesthetics through the examination of some relevant aspects of Richard Wollheim’s philosophy of art, maybe the main figure in Anglo-American philosophy as for considering artistic medium central in art-theorizing. Artistic media, according to Wollheim, can develop only if properly connected to a cultura...

  14. Gamma radiation and radon concentration levels at the radioactive waste repositories 'Richard' and 'Bratrstvi'

    International Nuclear Information System (INIS)

    Berka, Z.; Sabol, J.; Janu, M.

    1998-01-01

    Owing to the fact that cosmic rays are shielded off, the photon equivalent dose rates in the corridors of the Richard repository are usually slightly lower than outside. However, in points close to barrels containing radioactive waste, the dose rates can reach values as high as tens of μSv/h. Because of high concentrations of natural radionuclides, the dose rates in the Bratrstvi repository is generally considerably higher, as much as 5 times the normal background value. Radon concentrations exhibit specific time variations which are modified by ventilation. Where ventilation is poor or absent, the radon concentrations are extremely high, viz. up to 30 and 300 kBq/m 3 in the Richard and Bratrstvi repositories, respectively. Personal exposure of workers depend on the total time spent underground and on the ventilation rate. While the contribution from photons can be kept below the relevant limits, the radon-related doses may be significant and even exceed the professional limits if no precautions are taken. (P.A.)

  15. Somaesthetic Training, Aesthetics, Ethics, and the Politics of Difference in Richard Shusterman's "Body Consciousness"

    Science.gov (United States)

    Powell, Kimberly

    2010-01-01

    In this essay, the author first addresses the theme of disciplined somatic training and its relationship to self-awareness and transformation. Her attention is focused specifically on the chapter on Ludwig Wittgenstein, in which Richard Shusterman presents and then elaborates upon the philosopher's connections between conscious bodily feelings and…

  16. Richard III in Russian Theatre at the Twilight of the "Thaw"

    OpenAIRE

    Sokolyansky, Mark

    2007-01-01

    Richard III was very rarely staged in Russian theatre in tsarist and Stalin’s times, because the story of inhuman tyranny provoked associations with Russian political reality. In the period of the so-called “Thaw” (1954ß1964) the play became very popular in the USSR and several scenic productions of it were real events in Russian (and Soviet) theatrical life. In the essay three most original and successful performances (in Kujbyshev, Gorkij and Erevan) are discussed and compare...

  17. Metaforos populiarojo mokslo literatūroje: Richard Dawkins knygos analizė

    OpenAIRE

    Urbanavičiūtė, Dovilė

    2017-01-01

    The following paper discusses metaphor usage in the genre of popular science. The object of this analysis is a chapter called ‘Immortal coils’ taken from Richard Dawkins’ book The Selfish Gene. The study discusses the impact of creative conceptual metaphors on the construction of the overall meaning of the text, as well as the significance of their linguistic manifestations and context. In focusing on the genre of popular science, it also makes an attempt at defining potential difficulties of...

  18. Free as in Freedom Richard Stallman's Crusade for Free Software

    CERN Document Server

    Williams, Sam

    2011-01-01

    Free as in Freedom interweaves biographical snapshots of GNU project founder Richard Stallman with the political, social and economic history of the free software movement. It examines Stallman's unique personality and how that personality has been at turns a driving force and a drawback in terms of the movement's overall success. Free as in Freedom examines one man's 20-year attempt to codify and communicate the ethics of 1970s era "hacking" culture in such a way that later generations might easily share and build upon the knowledge of their computing forebears. The book documents Stallman'

  19. Naturalismo e existencialismo na teoria moral de Richard Hare

    Directory of Open Access Journals (Sweden)

    Marco Antônio Oliveira de Azevedo

    2009-08-01

    Full Text Available http://dx.doi.org/10.5007/1677-2954.2009v8n2p247 Em um artigo de 1966, Amartya Sen procurou mostrar que mesmo Richard Hare, um devoto explícitodo antinaturalismo em ética, ainda que inadvertidamente, incorreu num tipo de naturalismo que Senintitulou de existencial. Neste breve artigo, traço um resumo dessa crítica à teoria de Hare, em especial,da chamada “Lei de Hume”, a qual Sen preferiu apropriadamente intitular “Regra de Hare”. Pretendomostrar como esse tipo peculiar de “existencialismo” nos conduz, ainda que sob o possível protesto deHare e seus seguidores, a conclusões subjetivistas e relativistas sobre a moralidade.

  20. Richard Swedberg, The Art of Social Theory

    DEFF Research Database (Denmark)

    Carleheden, Mikael

    2015-01-01

    to systematic consideration. Swedberg attributes this strange absence to what he sees as the miserable state of contemporary social theory. We must, he claims, avoid two misconceptions: ‘empiricism’ and ‘abstract theory’. In the first case, theory is reduced to the task of summarizing the outcome of empirical......It is a rare event when a new general field of research opens up within sociology. However, with this book, Richard Swedberg intends to do just that. It is not just another book on social theory. It is a book on ‘theorizing’. And that makes all the difference. Swedberg has chosen the term ‘art......’, but also ‘craft’, to emphasize the practical side of doing theory. This topic has been strangely absent, not just in sociology but in the social sciences in general. In order to see this absence, we should ask ourselves how education in sociology is conventionally organized. The answer is by a taken...

  1. Missing Kettles and Too Few Toasters: The Forecasting Methodology at Morphy Richards

    OpenAIRE

    Lane, D; Hughes, D

    2002-01-01

    Faced with problems in forecasting at Morphy Richards, this research represents an investigation into their forecasting methodology following the hypothesis that the current forecasting system was no longer sufficient to ensure guaranteed supply to customers, or to enable forward planning.\\ud \\ud The purpose of the research was to identify any requirements for change within the forecasting system and to identify the ‘best practice’ within the industry. Primary research was carried out using a...

  2. The 1D Richards' equation in two layered soils: a Filippov approach to treat discontinuities

    Science.gov (United States)

    Berardi, Marco; Difonzo, Fabio; Vurro, Michele; Lopez, Luciano

    2018-05-01

    The infiltration process into the soil is generally modeled by the Richards' partial differential equation (PDE). In this paper a new approach for modeling the infiltration process through the interface of two different soils is proposed, where the interface is seen as a discontinuity surface defined by suitable state variables. Thus, the original 1D Richards' PDE, enriched by a particular choice of the boundary conditions, is first approximated by means of a time semidiscretization, that is by means of the transversal method of lines (TMOL). In such a way a sequence of discontinuous initial value problems, described by a sequence of second order differential systems in the space variable, is derived. Then, Filippov theory on discontinuous dynamical systems may be applied in order to study the relevant dynamics of the problem. The numerical integration of the semidiscretized differential system will be performed by using a one-step method, which employs an event driven procedure to locate the discontinuity surface and to adequately change the vector field.

  3. Richard Murphy: a life in writing

    Directory of Open Access Journals (Sweden)

    E. Meihuizen

    2006-07-01

    Full Text Available The Irish poet Richard Murphy published his autobiography “The kick: a life among writers” in 2003. From a slightly different perspective the subtitle of this work could be rewritten as “A life in writing” since it is an account of the agencies that moulded a life devoted to creative writing which forms the book’s essential impetus. The memoir is based on notebooks which Murphy kept throughout his life “to hold the scraps of verse, elusive images, dreams, desires and revelations” to be developed into poetry. Apart from contextualising his poetry by registering the relationships, circumstances and landscapes from which it germinated, Murphy also tells of the creative process itself and the personal poetics underlying this process. This article explores what is regarded as the central determining feature of Murphy’s identity as poet, namely the relationship between the creative self and a particular place, where the concept of “place” is seen as a cultural palimpsest which represents not only physical qualities, but also the shaping and development of the landscape through time according to a certain way of life.

  4. Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine

    OpenAIRE

    Marye O'Reilly-Knapp

    2015-01-01

    Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine. Published by Karnac Books: London, 2015 Paperback, Pages 366, ISBN 13: 978-1-78220-190-8

  5. Astronaut Richard H. Truly in training session RMS for STS-2 bldg 9A

    Science.gov (United States)

    1981-01-01

    Astronaut Richard H. Truly in training session with the Remote Manipulator System (RMS) for STS-2 bldg 9A. Views show Truly working at the command console while watching out the windows. Karen Ehlers, an RMS procedures specialist, can be seen at left side of frame (34314); view from behind Truly as he trains at the RMS console (34315).

  6. X-ray cross-sections and crossroads (The International Radiation Physics Society) - Richard Pratt's contributions to both

    International Nuclear Information System (INIS)

    Hubbell, J.H.

    2000-01-01

    Some examples of the impact of the theoretical contributions by Richard Pratt and his collaborators on photon cross section compilations at NBS/NIST and elsewhere over the past several decades are presented. Both the theoretical and measurement works which combine to provide this data base, and the contact with the varied user groups in medical applications, nuclear engineering, crystallography and X-ray astronomy, have formed a global crossroads of researchers now embodied in the International Radiation Physics Society (IRPS). Since the founding of the IRPS at the 3 rd International Symposium on Radiation Physics (ISRP-3) in Ferrara, Italy, in 1985, the Secretariat for this 'global radiation physics family' (the IRPS) has resided at the University of Pittsburgh under the direction of Richard Pratt. A brief account of the origins and history of the IRPS, beginning with ISRP-1 in Calcutta in 1974, is presented.

  7. X-ray cross-sections and crossroads (The International Radiation Physics Society) - Richard Pratt's contributions to both

    Science.gov (United States)

    Hubbell, J. H.

    2000-08-01

    Some examples of the impact of the theoretical contributions by Richard Pratt and his collaborators on photon cross section compilations at NBS/NIST and elsewhere over the past several decades are presented. Both the theoretical and measurement works which combine to provide this data base, and the contact with the varied user groups in medical applications, nuclear engineering, crystallography and X-ray astronomy, have formed a global crossroads of researchers now embodied in the International Radiation Physics Society (IRPS). Since the founding of the IRPS at the 3rd International Symposium on Radiation Physics (ISRP-3) in Ferrara, Italy, in 1985, the Secretariat for this ``global radiation physics family'' (the IRPS) has resided at the University of Pittsburgh under the direction of Richard Pratt. A brief account of the origins and history of the IRPS, beginning with ISRP-1 in Calcutta in 1974, is presented.

  8. Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine

    Directory of Open Access Journals (Sweden)

    Marye O'Reilly-Knapp

    2015-12-01

    Full Text Available Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine. Published by Karnac Books: London, 2015 Paperback, Pages 366, ISBN 13: 978-1-78220-190-8

  9. Muusikamaailm : Suur klaveripidu Ruhrimaal. Kissingeni festival tippudega. Sulasoli 80. aastapäev. Richard Rodgers 100 / Priit Kuusk

    Index Scriptorium Estoniae

    Kuusk, Priit, 1938-

    2002-01-01

    6. juuni-17. augustini Ruhrimaal toimuvast klaverifestivalist. Bad Kissingenis toimuvatest suvepidustustest. Soome Lauljate ja Mängijate Liit tähistab asutamise 80. aastapäeva. Helilooja Richard Rodgersi sünnist möödub 100 aastat

  10. Construction of Fluid - solid Coupling Model with Improved Richards - BP & Its Engineering Application

    Science.gov (United States)

    Xie, Chengyu; Jia, Nan; Shi, Dongping; Lu, Hao

    2017-10-01

    In order to study the slurry diffusion law during grouting, Richards unsaturated-saturated model was introduced, the definition of the grouting model is clear, the Richards model control equation was established, And the BP neural network was introduced, the improved fluid-solid coupling model was constructed, Through the use of saturated - unsaturated seepage flow model, As well as the overflow boundary iterative solution of the mixed boundary conditions, the free surface is calculated. Engineering practice for an example, with the aid of multi - field coupling analysis software, the diffusion law of slurry was simulated numerically. The results show that the slurry diffusion rule is affected by grouting material, initial pressure and other factors. When the slurry starts, it flows in the cracks along the upper side of the grouting hole, when the pressure gradient is reduced to the critical pressure, that is, to the lower side of the flow, when the slurry diffusion stability, and ultimately its shape like an 8. The slurry is spread evenly from the overall point of view, from the grouting mouth toward the surrounding evenly spread, it gradually reaches saturation by non-saturation, and it is not a purely saturated flow, when the slurry spread and reach a saturated state, the diffusion time is the engineering grouting time.

  11. Newtonian nudging for a Richards equation-based distributed hydrological model

    Science.gov (United States)

    Paniconi, Claudio; Marrocu, Marino; Putti, Mario; Verbunt, Mark

    The objective of data assimilation is to provide physically consistent estimates of spatially distributed environmental variables. In this study a relatively simple data assimilation method has been implemented in a relatively complex hydrological model. The data assimilation technique is Newtonian relaxation or nudging, in which model variables are driven towards observations by a forcing term added to the model equations. The forcing term is proportional to the difference between simulation and observation (relaxation component) and contains four-dimensional weighting functions that can incorporate prior knowledge about the spatial and temporal variability and characteristic scales of the state variable(s) being assimilated. The numerical model couples a three-dimensional finite element Richards equation solver for variably saturated porous media and a finite difference diffusion wave approximation based on digital elevation data for surface water dynamics. We describe the implementation of the data assimilation algorithm for the coupled model and report on the numerical and hydrological performance of the resulting assimilation scheme. Nudging is shown to be successful in improving the hydrological simulation results, and it introduces little computational cost, in terms of CPU and other numerical aspects of the model's behavior, in some cases even improving numerical performance compared to model runs without nudging. We also examine the sensitivity of the model to nudging term parameters including the spatio-temporal influence coefficients in the weighting functions. Overall the nudging algorithm is quite flexible, for instance in dealing with concurrent observation datasets, gridded or scattered data, and different state variables, and the implementation presented here can be readily extended to any of these features not already incorporated. Moreover the nudging code and tests can serve as a basis for implementation of more sophisticated data assimilation

  12. Richard Rufus's theory of mixture: a medieval explanation of chemical combination.

    Science.gov (United States)

    Weisberg, Michael; Wood, Rega

    2003-05-01

    Richard Rufus of Cornwall offered a novel solution to the problem of mixture raised by Aristotle. The puzzle is that mixts or mixed bodies (blood, flesh, wood, etc.) seem to be unexplainable through logic, even though the world is full of them. Rufus's contribution to this long-standing theoretical debate is the development of a modal interpretation of certain Averroistic doctrines. Rufus's account, which posits that the elemental forms in a mixt are in accidental potential, avoids many of the problems that plagued non-atomistic medieval theories of mixture. This paper is an initial examination of Rufus' account.

  13. Süüme sundis vabrikujuhti palgatööliseks jääma / Richard Mutso ; interv. Jüri Saar

    Index Scriptorium Estoniae

    Mutso, Richard, 1933-

    2003-01-01

    Intervjuu Võru mööblitehase Wermo peadirektorina töötanud, praeguse tehase nõukogu liikme Richard Mutsoga tehase juhtimisest, euroreferendumist, eraelust. Kommenteerivad: Silva Mutso, Veljo Ipits

  14. Richard Wright's Thematic Treatment of Women in "Uncle Tom's Children,""Black Boy," and "Native Son."

    Science.gov (United States)

    Brewton, Butler E.

    Richard Wright's literary work emphasizes a contrast between black women and white women. Although both are "givers" to black boys, the nature of what they give is different. The black woman gives physical life, feeds it, and protects it at the expense of spiritual or creative vitality. Her goal is to survive bodily, to breathe, to have…

  15. Pimping climate change: Richard Branson, global warming, and the performance of green capitalism

    OpenAIRE

    Scott Prudham

    2009-01-01

    On 21 September 2006 UK über-entrepreneur and Virgin Group Chairman Richard Branson pledged approximately £1.6 billion, the equivalent of all the profits from Virgin Atlantic and Virgin Trains for the next ten years, to fighting climate change. Since then, Branson has restated his commitment to action on global warming, including investment in technologies for sequestering carbon dioxide from the atmosphere. In this paper, I critically examine and engage with Branson’s announcements as a spec...

  16. Selfish memes: An update of Richard Dawkins’ bibliometric analysis of key papers in sociobiology

    OpenAIRE

    Aaen-Stockdale, Craig

    2017-01-01

    This is an Open Access journal available from http://www.mdpi.com/ In the second edition of The Selfish Gene, Richard Dawkins included a short bibliometric analysis of key papers instrumental to the sociobiological revolution, the intention of which was to support his proposal that ideas spread within a population in an epidemiological manner. In his analysis, Dawkins primarily discussed the influence of an article by British evolutionary biologist William Donald Hamilton which had introdu...

  17. Nothing Risked, Nothing Gained: Richard Powers' Gain and the Horizon of Risk

    Directory of Open Access Journals (Sweden)

    Aaron Jaffe

    2010-02-01

    Full Text Available Cet article interprète Gain, sixième roman de Richard Powers, à la lumière du concept de « seconde modernité » proposé par le sociologue allemand Ulrich Beck. Ce concept souligne la dissémination du risque et la manière dont celle-ci invalide les marchés conclus par la « première modernité » entre l’avenir et le présent, entre l’intérieur du corps et l’extérieur. Cet article entend montrer que Beck fournit un cadre interprétatif utile à la compréhension de ces rapports, hors des impasses catégorielles que suscite l’opposition entre les deux régimes narratifs à l’œuvre dans le texte : le récit biographique, local et individuel, de la maladie de Laura Rowen Bodey, et l’histoire collective de l’entreprise Clare devenue conglomérat.This essay interprets Richard Powers' sixth novel Gain with reference to the German sociologist Ulrich Beck's concept of “second modernity.” The concept underscores the dispersal of risk and how it shreds promissory notes understood in “first modernity” between the future and present and the insides and outsides of the body. It argues that Beck supplies an apt interpretive framework for understanding these relationships and overcoming the categorical impasses between the two narrative words at work in Power's novel, the biographical situatedness of Laura Rowen Bodey's illness and the corporate history of the Clare conglomerate.

  18. Richards Bay Mesometeorological Data – Vertical profiles of air temperature and wind velocity and surface wind statistics.

    CSIR Research Space (South Africa)

    Scholtz, MT

    1978-03-01

    Full Text Available This report details the experimental methods and data obtained in the course of a study of the movement of stable air over a complex region. The field work was carried out in the Richards Bay area on the Natal Coast during the period May to August...

  19. Popular science - common ground. A literary critique of Richard Dawkins's The Selfish Gene

    OpenAIRE

    Nilsen, Helene

    2012-01-01

    This thesis aims to perform a literary reading of Richard Dawkins's The Selfish Gene from a perspective situated outside of the 'battle of the two cultures'. Chapter 1 takes Foucault's article What is an author?" as its point of departure. After discussing how Dawkins may be seen as a reader of Darwin, I will go on to discuss Foucault's concept of the author-function, before I move on to consider some different readings of and approaches to The Selfish Gene. With reference to a polemic bet...

  20. The effects of coal dust on photosynthetic performance of the mangrove, Avicennia marina in Richards Bay, South Africa

    International Nuclear Information System (INIS)

    Naidoo, G.; Chirkoot, D.

    2004-01-01

    Richards Bay, on the northern KwaZulu-Natal coast, is the largest coal exporting port in South Africa. The coal is stored at the Richards Bay Coal Terminal (RBCT) prior to export. Dust from coal operations is a major problem in the Richards Bay area. In this study, we tested the hypothesis that coal dust adversely affects photosynthetic performance of Avicennia marina (Forssk.) Vierh., the dominant mangrove species in the harbour. Photosynthetic performance was determined on 10 trees by measuring carbon dioxide uptake and chlorophyll fluorescence parameters at two elevation sites and on upper and lower leaf surfaces that were covered or uncovered with coal dust. Measurements were made on five clear, sunny days at saturating light (>1000 μmol m -2 s -1 ) and high temperature (28-30 deg. C). Coal dust significantly reduced carbon dioxide exchange of upper and lower leaf surfaces by 17-39%, the reduction being generally greater on the lower leaf surface that is covered by a dense mat of trichomes and salt glands. The reduction in carbon dioxide exchange by coal dust was higher at the high elevation site that supported isolated dwarfed trees. The chlorophyll fluorescence data indicated that leaves coated with dust exhibited significantly lower photosystem II (PS II) quantum yield, lower electron transport rate (ETR) through PSII and reduced quantum efficiency of PSII (F v F m ). The chlorophyll fluorescence data supported the gas exchange measurements and are consistent with reduced photosynthetic performance of leaves coated with coal dust. - Coal dust reduced photosynthetic performance of the mangrove, Avicennia marina

  1. Marie-Christine Agosto. Richard Brautigan. Les fleurs de néant.

    Directory of Open Access Journals (Sweden)

    Jean-Bernard Basse

    2006-04-01

    Full Text Available Richard Brautigan, si on lui reconnaît un certain humour, est souvent associé avec condescendance au phénomène hippy et considéré comme un auteur démodé, superficiel. Celui qui écrivait dans Cahier d’un Retour de Troie : « Les mots sont des fleurs de néant » est pourtant l’un de ces écrivains que l’on pourrait qualifier de mineurs essentiels, et seuls ceux qui l’ont peu ou mal lu s’étonneront de ce que Marie-Christine Agosto ait choisi de donner comme sous-titre « Les fleurs de néant » au pet...

  2. Transcendence, Taxis, Trust: Richard Kearney and Jacques Derrida

    Directory of Open Access Journals (Sweden)

    Ulrich Schmiedel

    2017-03-01

    Full Text Available Whatever else it takes to drive a taxi, it takes trust. Day after day, the driver has to decide whether the other is or is not trustworthy. I take the taxi as a test case to analyze and assess Richard Kearney’s diacritical hermeneutics of the other. I argue that Kearney functionalizes the concept of transcendence in order to connect the transcendence of the finite other to the transcendence of the infinite other. However, in his central critique of the deconstructionists following Jacques Derrida, Kearney counters his connection. While Kearney’s critique of Derrida’s account of absolute alterity is correct and compelling, I argue that Derrida’s critique of a distinction between the trustworthy other and the non-trustworthy other might be more crucial than Kearney contends. Insisting on openness to the other’s otherness, Derrida provokes any hermeneutic of the other to trust in transcendence. The taxi is taken as a test to illustrate the implications which diacritical and deconstructive drivers might have for evaluating the entanglement of ethics and eschatology—inside and outside the taxi.

  3. Richard J. Bernstein on Ethics and Philosophy between the Linguistic and the Pragmatic Turn

    OpenAIRE

    Marchetti, Sarin

    2017-01-01

    1. In his compelling article American Pragmatism: The Conflict of Narratives, Richard Bernstein quotes a perceptive line by Alasdair MacIntyre that goes [A] tradition not only embodies the narrative of an argument, but is only recovered by an argumentative retelling of that narrative which will itself be in conflict with other argumentative retellings. Bernstein, in the essay mentioned, works through MacIntyre’s passage in order to “engage in the ‘argumentative retelling’ of a metanarrative –...

  4. Diagnosis and treatment of polycystic ovary syndrome (PCOS): an interview with Richard Legro.

    Science.gov (United States)

    Legro, Richard

    2015-03-27

    In this podcast, we talk to Professor Richard Legro about the recommendations for the diagnosis and treatment of polycystic ovary syndrome (PCOS) based on clinical practice guidelines and discuss the challenges of diagnosis PCOS at specific age groups. The controversies associated with treatment of PCOS, including therapies for infertility as this is a problem commonly observed in PCOS subjects, are highlighted together with future directions on the topic. The podcast for this interview is available at. http://www.biomedcentral.com/content/supplementary/s12916-015-0299-2-s1.mp3.

  5. Richard J. Hill, Picturing Scotland through the Waverley Novels: Walter Scott and the Origins of the Victorian Illustrated Novel.

    Directory of Open Access Journals (Sweden)

    Jacqueline Irene Cannata

    2012-10-01

    Full Text Available Richard J. Hill, Picturing Scotland through the Waverley Novels: Walter Scott and the Origins of the Victorian Illustrated Novel . Farnham, Surrey, and Burlington, VT: Ashgate, 2010. Pp. 236. ISBN 978-0-7546-6806-0. US$99.99.

  6. Dr. Richard J. Whelan: Seeing the Field of Emotional and Behavior Disorders through the Lens of a Pioneer

    Science.gov (United States)

    Kaff, Marilyn S.; Teagarden, Jim; Zabel, Robert H.

    2011-01-01

    Dr. Richard J. Whelan is a distinguished professor emeritus at the University of Kansas. His earliest professional experiences were at the Children's Hospital (Southard School) of the Menninger Clinic, where he served as a recreational therapist, teacher, and director of education. During his career at the University of Kansas and the KU Medical…

  7. Richards growth model and viability indicators for populations subject to interventions

    Directory of Open Access Journals (Sweden)

    Selene Loibel

    2010-12-01

    Full Text Available In this work we study the problem of modeling identification of a population employing a discrete dynamic model based on the Richards growth model. The population is subjected to interventions due to consumption, such as hunting or farming animals. The model identification allows us to estimate the probability or the average time for a population number to reach a certain level. The parameter inference for these models are obtained with the use of the likelihood profile technique as developed in this paper. The identification method here developed can be applied to evaluate the productivity of animal husbandry or to evaluate the risk of extinction of autochthon populations. It is applied to data of the Brazilian beef cattle herd population, and the the population number to reach a certain goal level is investigated.Neste trabalho estudamos o problema de identificação do modelo de uma população utilizando um modelo dinâmico discreto baseado no modelo de crescimento de Richards. A população é submetida a intervenções devido ao consumo, como no caso de caça ou na criação de animais. A identificação do modelo permite-nos estimar a probabilidade ou o tempo médio de ocorrência para que se atinja um certo número populacional. A inferência paramétrica dos modelos é obtida através da técnica de perfil de máxima verossimilhança como desenvolvida neste trabalho. O método de identificação desenvolvido pode ser aplicado para avaliar a produtividade de criação animal ou o risco de extinção de uma população autóctone. Ele foi aplicado aos dados da população global de gado de corte bovino brasileiro, e é utilizado na investigação de a população atingir um certo número desejado de cabeças.

  8. Richard Murphy: Autobiography and the Connemara landscape

    Directory of Open Access Journals (Sweden)

    Elsa Meihuizen

    2015-08-01

    Full Text Available It could be argued that an important feature of Richard Murphy’s work, and of his identity as a poet is the relationship between the creative self and a particular place, where ‘place’ should be understood as referring not just to physical qualities of the natural environment, but in a broader sense to denote an environment in which everything is interrelated and connected, and in which there is no sharp division between the natural and the human. The landscape providing inspiration for Murphy’s poetic imagination is the landscapes and seascapes of Connemara in north-west Ireland. In 1959 he settled in this environment which was to be his base for the next 20 years and from this period and this location emanated the bulk of his poetic oeuvre. For Murphy committing to a life of writing poetry necessarily means being in the Connemara landscape. Returning to this environment in adulthood represents a quest for recovering childhood feelings, of belonging and love, as connected to particular places. Murphy’s Connemara poems could be read as an account of this process of re-placement, as a type of autobiographical text in which the artist creates a ‘double portrait’: in writing about the landscape he also writes about himself, creating a place-portrait which is, at the same time, a self-portrait.

  9. Lucien Cuénot, Richard Goldschmidt y Miquel Crusafont Pairó

    Directory of Open Access Journals (Sweden)

    Casinos, Adrià

    2016-06-01

    Full Text Available An unpublished text, corresponding to a communication done by Crusafont Pairó is analysed. The communication is strongly critical with Cuénot’s necrology published previously by Goldschmidt, where he regrets the teleological ideas on evolution that Cuénot maintained in the last years of his life.Se analiza un texto inédito de Miquel Crusafont Pairó, correspondiente a comunicación que llevó a cabo en la Fundació Bosch i Cardellach, sobre la necrológica de Lucien Cuénot publicada por Richard Goldschmidt. La comunicación es un fuerte ataque a Goldschmidt por sus críticas a la deriva teleológica de Cuénot en los últimos años de su vida.

  10. Why Was General Richard O’Connor’s Command in Northwest Europe Less Effective Than Expected?

    Science.gov (United States)

    2011-03-01

    Commander of 7 Division and Military Governor of Jerusalem , September 1938- August 1939. ______. Papers of General Sir Richard O’Connor KT, GCB, DSO, MC...Montgomery, Brian. A Field Marshall in the Family: A Personal Biography of Montgomery of Alamein. New York: Taplinger, 1973. Montgomery, Field...Commanders: A Composite Biography . Combat Studies Institute publications, Fort Leavenworth, Kansas: U.S. Army Command and General Staff College, 1989

  11. Símbolo y forma: los hermanos Grimm en Richard Wagner

    Directory of Open Access Journals (Sweden)

    Miguel Salmerón Infante

    2015-05-01

    Full Text Available Este escrito estudia el cómo y el porqué de la presencia de los Cuentos de los Hermanos Grimm en la obra de Richard Wagner. Para dar un enfoque más concreto a esta reflexión el análisis se centra en Sigfrido, el drama musical de Wagner con más atmósfera de cuento, y las influencias y préstamos temáticos, formales y lingüísticos que le aportan los KHM. El artículo entiende que hay dos elementos que aprovecha Wagner de los Grimm para sus dramas musicales. El símbolo para su proyecto de tejido de la identidad alemana. Y la forma del cuento con sus temas y fórmulas recurrentes que el aplicó a su música y muy concretamente al Leitmotiv. Todo ello sin olvidar la muy frecuente presencia de la figura del huérfano tanto en Wagner como en los Grimm.  

  12. Leachate flow around a well in MSW landfill: Analysis of field tests using Richards model.

    Science.gov (United States)

    Slimani, R; Oxarango, L; Sbartai, B; Tinet, A-J; Olivier, F; Dias, D

    2017-05-01

    During the lifespan of a Municipal Solid Waste landfill, its leachate drainage system may get clogged. Then, as a consequence of rainfall, leachate generation and possibly leachate injection, the moisture content in the landfill increases to the point that a leachate mound could be created. Therefore, pumping the leachate becomes a necessary solution. This paper presents an original analysis of leachate pumping and injection in an instrumented well. The water table level around the well is monitored by nine piezometers which allow the leachate flow behaviour to be captured. A numerical model based on Richards equation and an exponential relationship between saturated hydraulic conductivity and depth is used to analyze the landfill response to pumping and injection. Decreasing permeability with depth appears to have a major influence on the behaviour of the leachate flow. It could have a drastic negative impact on the pumping efficiency with a maximum quasi-stationary pumping rate limited to approximately 1m 3 /h for the tested well and the radius of influence is less than 20m. The numerical model provides a reasonable description of both pumping and injection tests. However, an anomalous behaviour observed at the transition between pumping and recovery phases is observed. This could be due to a limitation of the Richards model in that it neglects the gas phase behaviour and other double porosity heterogeneous effects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. An experimental ‘Life’ for an experimental life : Richard Waller's biography of Robert Hooke (1705)

    OpenAIRE

    Moxham, Noah

    2016-01-01

    Richard Waller's ‘Life of Dr Robert Hooke’, prefixed to his edition of Hooke's Posthumous Works (1705), is an important source for the life of one of the most eminent members of the early Royal Society. It also has the distinction of being one of the earliest biographies of a man of science to be published in English. I argue that it is in fact the first biography to embrace the subject's natural-philosophical work as the centre of his life, and I investigate Waller's reasons for adopting thi...

  14. Exact and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model with bounded acceleration for a class of fundamental diagrams

    KAUST Repository

    Qiu, Shanwen; Abdelaziz, Mohamed Ewis; Abdel Latif, Fadl Hicham Fadl; Claudel, Christian G.

    2013-01-01

    In this article, we propose a new exact and grid-free numerical scheme for computing solutions associated with an hybrid traffic flow model based on the Lighthill-Whitham-Richards (LWR) partial differential equation, for a class of fundamental

  15. Harmonic analysis, partial differential equations and applications in honor of Richard L. Wheeden

    CERN Document Server

    Franchi, Bruno; Lu, Guozhen; Perez, Carlos; Sawyer, Eric

    2017-01-01

    This is a collection of contributed papers by many eminent Harmonic Analysts and specialists of Partial Differential equations. The papers focus on weighted norm equalities for singular integrals, focusing wave equations, degenerate elliptic equations, Navier-Stokes flow in two dimensions and Poincare-Sobolev inequalities in the setting of metric spaces equipped with measures among others. Many topics considered in this volume stem from the interests of Richard L. Wheeden whose contributions to Potential Theory, singular integral theory and degenerate elliptic PDE theory this volume honors. Luis Caffarelli, Sagun Chanillo, Bruno Franchi, Cristian Guttierez, Xiaojun Huang, Carlos Kenig, Ermanno Lanconelli, Eric Sawyer and Alexander Volberg, are some of the many contributors to this volume. .

  16. Book review: Unholy trinity: The IMF, World Bank and WTO Richard Peet

    Directory of Open Access Journals (Sweden)

    M Breitenbach

    2014-05-01

    Full Text Available In this timely book Richard Peet and his team lay the foundation with an excellent analysis of the process of globalisation and the resultant emergence of the global economy. The authors are especially critical of the increasing influence of institutions like the International Monetary Fund (IMF, World Bank and World Trade Organisation (WTO on the economy and the consequences experienced by peoples, cultures and the environment. The single ideology of neo-liberalism is blamed for the undesirable outcomes. This book considers concepts of power, political interest, hegemony, discourse, responsibility and the power of practicality, in critically examining the IMF, World Bank and WTO. The conclusion is reached that “all three institutions play roles greatly different from those originally agreed to under the charters that set them up”.

  17. Richard Wrangham. Catching fire. How cooking made us Human. Basic Books (Perseus Books Group

    Directory of Open Access Journals (Sweden)

    Claude-Marcel Hladik

    2009-11-01

    Full Text Available L’histoire de l’émergence de l’homme est remise en cause par cet ouvrage puisque jusqu’à présent la plupart des anthropologues et des paléontologues s’accordaient pour faire remonter à environ 500.000 ans les premières utilisations du feu pour la cuisson des aliments par le genre Homo. Les arguments présentés par Richard Wrangham dans son dernier ouvrage nous font remonter aux deux derniers millions d’années. Wrangham et ses collègues avaient publié, dès 1999, les résultats de fouilles au cou...

  18. Meeting to honor F. Richard Stephenson on his 70th birthday

    CERN Document Server

    Green, David; Strom, Richard

    2015-01-01

    This book contains papers from a conference held to celebrate the 70th birthday of one of the world’s foremost astronomical historians, Professor F. Richard Stephenson, the latest recipient of the American Astronomical Society’s highest award for research in astronomical history, the LeRoy Doggett Prize. Reflecting Professor Stephenson’s extensive research portfolio, this book brings together under one cover papers on four different areas of scholarship: applied historical astronomy (which Stephenson founded); Islamic astronomy; Oriental astronomy; and amateur astronomy.  These papers are penned by astronomers from Canada, China, England, France, Georgia, Iran, Japan, Lebanon, the Netherlands, Portugal, Thailand and the USA. Its diverse coverage represents a wide cross-section of the history of astronomy community.  Under discussion are ways in which recent research using historical data has provided new insights into auroral and solar activity, supernovae and changes in the rotation rate of the E...

  19. A critical review of Richard Lynn's reports on reaction time and race.

    Science.gov (United States)

    Thomas, Drew M

    2011-01-01

    In the early 1990s, psychologist Richard Lynn published papers documenting average reaction times and decision times in samples of nine-year-olds taken from across the world. After summarizing these data, Lynn interpreted his results as evidence of national and racial differences in decision time and general intelligence. Others have also interpreted Lynn's data as evidence of racial differences in decision time and intelligence. However, comparing Lynn's summaries with his original reports shows that Lynn misreported and omitted some of his own data. Once these errors are fixed the rankings of nations in Lynn's datasets are unstable across different decision time measures. This instability, as well as within-race heterogeneity and between-race overlap in decision times, implies that Lynn's reaction time data do not permit generalizations about the decision times and intelligence of people of different races.

  20. AD-1 with research pilot Richard E. Gray

    Science.gov (United States)

    1982-01-01

    Standing in front of the AD-1 Oblique Wing research aircraft is research pilot Richard E. Gray. Richard E. Gray joined National Aeronautics and Space Administration's Johnson Space Center, Houston, Texas, in November 1978, as an aerospace research pilot. In November 1981, Dick joined the NASA's Ames-Dryden Flight Research Facility, Edwards, California, as a research pilot. Dick was a former Co-op at the NASA Flight Research Center (a previous name of the Ames-Dryden Flight Research Facility), serving as an Operations Engineer. At Ames-Dryden, Dick was a pilot for the F-14 Aileron Rudder Interconnect Program, AD-1 Oblique Wing Research Aircraft, F-8 Digital Fly-By-Wire and Pilot Induced Oscillations investigations. He also flew the F-104, T-37, and the F-15. On November 8, 1982, Gray was fatally injured in a T-37 jet aircraft while making a pilot proficiency flight. Dick graduated with a Bachelors degree in Aeronautical Engineering from San Jose State University in 1969. He joined the U.S. Navy in July 1969, becoming a Naval Aviator in January 1971, when he was assigned to F-4 Phantoms at Naval Air Station (NAS) Miramar, California. In 1972, he flew 48 combat missions in Vietnam in F-4s with VF-111 aboard the USS Coral Sea. After making a second cruise in 1973, Dick was assigned to Air Test and Evaluation Squadron Four (VX-4) at NAS Point Mugu, California, as a project pilot on various operational test and evaluation programs. In November 1978, Dick retired from the Navy and joined NASA's Johnson Space Center. At JSC Gray served as chief project pilot on the WB-57F high-altitude research projects and as the prime television chase pilot in a T-38 for the landing portion of the Space Shuttle orbital flight tests. Dick had over 3,000 hours in more than 30 types of aircraft, an airline transport rating, and 252 carrier arrested landings. He was a member of the Society of Experimental Test Pilots serving on the Board of Directors as Southwest Section Technical Adviser in

  1. Forjando nuestras democracias: entre Richard Rorty y Vladimiro Montesinos

    Directory of Open Access Journals (Sweden)

    Miguel Giusti

    2001-07-01

    Full Text Available This article aims at explaining the recent history of Peru, in an exercise in which it is possible to extract lessons about the way Latin American democracies have been(or have not been forged. The text draws a parallel between the ideas developed by Richard Rorty in his recently published book, Forjar nuestro país. El pensamiento de izquierdas en los Estados Unidos del siglo XX, and the events in Fugimori's and Montesinos' Peru. If, according to what Rorty believes, "national pride is for the countries what self esteem is for individuals ... " how would it be possible to narrate a history in which there are few motives to be proud of? Trying to escape fatalism and sarcasm, the text tries to show that Montesino's political course is, symbolically, a summary of the decomposition process of Peruvian democracy. Secondly, the text analyses the movements of the political left wing and deals with the support the regimen received from inside and outside the country, a support that was largely based on the illusion of political stability. Finally, it states, as Rorty does, that in order to forge democracies it is necessary for us to be deeply committed to the defense of the State of Right.

  2. Richard Arwed Pfeifer - a pioneer of 'medical pedagogy' and an opponent of Paul Schroder.

    Science.gov (United States)

    Steinberg, Holger; Carius, Dirk; Himmerich, Hubertus

    2013-12-01

    Richard Arwed Pfeifer (1877-1957) was one of the initiators and foster fathers of the renowned child-psychiatric and special needs education workgroup at Leipzig University under Paul Schröder (1873-1941) in the 1920s and 1930s. This paper is an account of their dispute concerning the interrelations between child and adolescent psychiatry and special needs education, as well as their disagreement about whether adolescent psychopaths should be admitted to specialized child psychiatric wards or elsewhere. Moreover, Pfeifer questioned the practical relevance of the separation of constitutional and environmentally-based psychopathy and fought eugenic research, which he found incompatible with the ethics of his profession as a remedial teacher and child psychiatrist.

  3. PolyRES: A polygon-based Richards equation solver

    International Nuclear Information System (INIS)

    Hills, R.G.

    1995-12-01

    This document describes the theory, implementation, and use of a software package designed to solve the transient, two-dimensional, Richards equation for water flow in unsaturated-saturated soils. This package was specifically designed to model complex geometries with minimal input from the user and to simulate groundwater flow related to assessment of low-level radioactive waste disposal sites and engineered facilities. The spatial variation of the hydraulic properties can be defined across individual polygon-shaped subdomains, called objects. These objects combine to form a polygon-shaped model domain. Each object can have its own distribution of hydraulic parameters. The resulting model domain and polygon-shaped internal objects are mapped onto a rectangular, finite-volume, computational grid by a preprocessor. This allows the user to specify model geometry independently of the underlying grid and greatly simplifies user input for complex geometries. In addition, this approach significantly reduces the computational requirements since complex geometries are actually modeled on a rectangular grid. This results in well-structured, finite difference-like systems of equations that require minimal storage and are very efficient to solve. The documentation for this software package includes a user's manual, a detailed description of the underlying theory, and a detailed discussion of program flow. Several example problems are presented that show the use and features of the software package. The water flow predictions for several of these example problems are compared to those of another algorithm to test for prediction equivalency

  4. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  5. O ateísmo de Richard Dawkins nas fronteiras da ciência evolucionista e do senso comum

    OpenAIRE

    Franco, Clarissa de

    2014-01-01

    O objeto de estudo consiste nas principais ideias ateístas de Richard Dawkins e na recepção destas por parte dos ateus inseridos na cultura brasileira. Dawkins é um dos principais divulgadores e militantes do movimento ateísta da atualidade, e a despeito de sua faceta pública divulgada em sites mundiais e em livros de reconhecido sucesso existem debates do autor, concernentes aos espaços acadêmicos e restritos a cientistas, que nem sempre se apresentam congruentes às suas e...

  6. The Mysterious Fall of Soeharto: A Genre Analysis of Richard Mann’s Plots and Schemes that Brought Down Soeharto (PSBDS

    Directory of Open Access Journals (Sweden)

    Sugeng Purwanto

    2012-12-01

    Full Text Available The real cause of Soeharto’s fall from the Indonesian presidency remains a mystery. Richard Mann (1998 launched three significant rhetorical questions: (a Was President Soeharto toppled by student demonstrators and people’s power? (b Was he brought down by the withdrawal of support from the United States? (c Or, was his sudden fall brought about by all of the two plus large doses of Oriental plotting and scheming? This article attempts to analyze Richard Mann’s PSBDS in terms of its macrostructure in order to find out the real cause of Soeharto’s fall. The analysis is substantiated by different resources as linguistic evidences, to justify the validity of the findings. The study revealed a proposition that critical reading is the key to successful comprehension of a text which may include a crosschecking with other resources, a careful identification of the generic structure of a text, and paying attention to how an author positions his or her readers. The article concludes, that in fact, Soeharto resigned from presidency on his own wisdom in order to avoid more bloodshed in Indonesian dreamland.

  7. Pervasive wireless environments

    CERN Document Server

    Yang, Jie; Trappe, Wade; Cheng, Jerry

    2014-01-01

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen

  8. Femineidad y ficción en la obra operística de Richard Strauss

    Directory of Open Access Journals (Sweden)

    María José Sánchez Usón

    2014-01-01

    Full Text Available Tras la muerte de Wagner y Brahms, Richard Straussemergió como uno de los compositores más importantesy populares de la música del siglo XX. Su trayectoria vitaly profesional, azarosa y turbulenta, al igual que las décadasque vivió, estuvo marcada por la realidad femenina.Es innegable que las mujeres de la vida de Strauss, todasde fuerte y distintiva personalidad, dejaron en él huellastan hondas que fue necesario llevarlas a escena, no sólocomo una aportación valiosa a la tipología caracterológicafemenina, sino también como un ejercicio terapéuticopersonal. Así, mujeres reales y mujeres ficticias se confundenen sus obras en un proceso creativo único: el delhombre-artista.

  9. Arte y política: un estudio comparativo de Jacques Rancière y Nelly Richard para el arte latinoamericano

    Directory of Open Access Journals (Sweden)

    Verónica Capasso

    2016-01-01

    Full Text Available En este artículo se indagan y comparan las teorías de Jacques Rancière y Nelly Richard sobre la relación entre arte y política desde el pensamiento posfundacional, y se producen reflexiones y análisis de manifestaciones artísticas latinoamericanas vanguardistas o críticas en diálogo con ambas. Para ello, se parte de una presentación de las teorías de Rancière y Richard en términos generales, se focaliza en las ideas que dichos autores tienen de la política y, específicamente, en la conceptualización que hacen del arte y su relación con la política. Al mismo tiempo, se desarrolla una interpretación de producciones artísticas desde una mirada centrada en sus diversas conexiones con lo político, más allá del contenido temático de estas. Se utiliza la perspectiva metodológica cualitativa transdisciplinaria, que articula distintas áreas de conocimiento (filosofía política, sociología, historia del arte. En el caso de los desarrollos de Jacques Rancière, se recurre a herramientas teóricas metropolitanas para resituarlas y repensarlas en función del arte de Latinoamérica. En este sentido, se trata de potenciar sus ideas en el análisis de casos locales. En cuanto a la teoría de Nelly Richard, sus conceptos de arte crítico y vanguardista se ponen en relación con el arte latinoamericano. Finalmente, se propone una comparación en la cual se destacan similitudes y diferencias conceptuales entre ambos en combinación con análisis de casos para abrir el panorama analítico e interpretativo que vincule teorías actuales con estudios de manifestaciones artísticas locales.

  10. RedDots Replayed

    DEFF Research Database (Denmark)

    Kinnunen, Tomi; Sahidullah, Md; Falcone, Mauro

    2017-01-01

    This paper describes a new database for the assessment of automatic speaker verification (ASV) vulnerabilities to spoofing attacks. In contrast to other recent data collection efforts, the new database has been designed to support the development of replay spoofing countermeasures tailored toward...

  11. Perception of Leitmotives in Richard Wagner's Der Ring des Nibelungen

    Directory of Open Access Journals (Sweden)

    David J. Baker

    2017-05-01

    Full Text Available The music of Richard Wagner tends to generate very diverse judgments indicative of the complex relationship between listeners and the sophisticated musical structures in Wagner's music. This paper presents findings from two listening experiments using the music from Wagner's Der Ring des Nibelungen that explores musical as well as individual listener parameters to better understand how listeners are able to hear leitmotives, a compositional device closely associated with Wagner's music. Results confirm findings from a previous experiment showing that specific expertise with Wagner's music can account for a greater portion of the variance in an individual's ability to recognize and remember musical material compared to measures of generic musical training. Results also explore how acoustical distance of the leitmotives affects memory recognition using a chroma similarity measure. In addition, we show how characteristics of the compositional structure of the leitmotives contributes to their salience and memorability. A final model is then presented that accounts for the aforementioned individual differences factors, as well as parameters of musical surface and structure. Our results suggest that that future work in music perception may consider both individual differences variables beyond musical training, as well as symbolic features and audio commonly used in music information retrieval in order to build robust models of musical perception and cognition.

  12. The ISS flight of Richard Garriott: a template for medicine and science investigation on future spaceflight participant missions.

    Science.gov (United States)

    Jennings, Richard T; Garriott, Owen K; Bogomolov, Valery V; Pochuev, Vladimir I; Morgun, Valery V; Garriott, Richard A

    2010-02-01

    A total of eight commercial spaceflight participants have launched to the International Space Station (ISS) on Soyuz vehicles. Based on an older mean age compared to career astronauts and an increased prevalence of medical conditions, spaceflight participants have provided the opportunity to learn about the effect of space travel on crewmembers with medical problems. The 12-d Soyuz TMA-13/12 ISS flight of spaceflight participant Richard Garriott included medical factors that required preflight intervention, risk mitigation strategies, and provided the opportunity for medical study on-orbit. Equally important, Mr. Garriott conducted extensive medical, scientific, and educational payload operations during the flight. These included 7 medical experiments and a total of 15 scientific projects such as protein crystal growth, Earth observations/photography, educational projects with schools, and amateur radio. The medical studies included the effect of microgravity on immune function, sleep, bone loss, corneal refractive surgery, low back pain, motion perception, and intraocular pressure. The overall mission success resulted from non-bureaucratic agility in mission planning, cooperation with investigators from NASA, ISS, International Partners, and the Korean Aerospace Research Institute, in-flight support and leadership from a team with spaceflight and Capcom experience, and overall mission support from the ISS program. This article focuses on science opportunities that suborbital and orbital spaceflight participant flights offer and suggests that the science program on Richard Garriott's flight be considered a model for future orbital and suborbital missions. The medical challenges are presented in a companion article.

  13. Genetics and the origin of species: the continuing synthesis a symposium in honor of Richard G. Harrison

    Science.gov (United States)

    Grosberg, Richard K.; Rand, David M.; Normark, Benjamin B.

    2013-01-01

    This is a special issue of Genetica that has its origins in a symposium held in honor of Richard G. Harrison at Ithaca, New York on July 22–23. Former students of Rick Harrison organized the symposium and most of the speakers were former students, as well. The quality and breadth of the talks were a testament to Rick’s influence as a thinker, synthesizer, and mentor and it is only appropriate to reflect on Rick’s contributions to the fields of evolutionary ecology, systematics, and genetics in this preface to the symposium articles. PMID:21152955

  14. Battlefield of the Future: How to Achieve Superiority in the Cyberspace Domain

    Science.gov (United States)

    2016-02-01

    the information. Spamming is sending unsolicited email advertising for services, products and websites used as a delivery mechanism for malware and...other cyber threats. Spoofing is generating a fake website to impersonate a real website run by a different party. Email spoofing 11 is altering

  15. Implementation of a Wireless Time Distribution Testbed Protected with Quantum Key Distribution

    Energy Technology Data Exchange (ETDEWEB)

    Bonior, Jason D [ORNL; Evans, Philip G [ORNL; Sheets, Gregory S [ORNL; Jones, John P [ORNL; Flynn, Toby H [ORNL; O' Neil, Lori Ross [Pacific Northwest National Laboratory (PNNL); Hutton, William [Pacific Northwest National Laboratory (PNNL); Pratt, Richard [Pacific Northwest National Laboratory (PNNL); Carroll, Thomas E. [Pacific Northwest National Laboratory (PNNL)

    2017-01-01

    Secure time transfer is critical for many timesensitive applications. the Global Positioning System (GPS) which is often used for this purpose has been shown to be susceptible to spoofing attacks. Quantum Key Distribution offers a way to securely generate encryption keys at two locations. Through careful use of this information it is possible to create a system that is more resistant to spoofing attacks. In this paper we describe our work to create a testbed which utilizes QKD and traditional RF links. This testbed will be used for the development of more secure and spoofing resistant time distribution protocols.

  16. Improvement of an algorithm for recognition of liveness using perspiration in fingerprint devices

    Science.gov (United States)

    Parthasaradhi, Sujan T.; Derakhshani, Reza; Hornak, Lawrence A.; Schuckers, Stephanie C.

    2004-08-01

    Previous work in our laboratory and others have demonstrated that spoof fingers made of a variety of materials including silicon, Play-Doh, clay, and gelatin (gummy finger) can be scanned and verified when compared to a live enrolled finger. Liveness, i.e. to determine whether the introduced biometric is coming from a live source, has been suggested as a means to circumvent attacks using spoof fingers. We developed a new liveness method based on perspiration changes in the fingerprint image. Recent results showed approximately 90% classification rate using different classification methods for various technologies including optical, electro-optical, and capacitive DC, a shorter time window and a diverse dataset. This paper focuses on improvement of the live classification rate by using a weight decay method during the training phase in order to improve the generalization and reduce the variance of the neural network based classifier. The dataset included fingerprint images from 33 live subjects, 33 spoofs created with dental impression material and Play-Doh, and fourteen cadaver fingers. 100% live classification was achieved with 81.8 to 100% spoof classification, depending on the device technology. The weight-decay method improves upon past reports by increasing the live and spoof classification rate.

  17. Hamilton on surnud, tema mõju mitte : in memoriam Richard Hamilton (24. II 1922 - 13. IX 2011) / Kadri Karro ; kommenteerinud Eha Komissarov, Sirje Helme, Jaak Kangilaski

    Index Scriptorium Estoniae

    Karro,Kadri

    2011-01-01

    Briti kunstniku Richard Hamiltoni (1922 - 2011) loomingust eesti kunstiteadlaste Eha Komissarovi, Sirje Helme ja Jaak Kangilaski pilgu läbi. Lähemalt 1956. aastal valminud kollaažist "Mis teeb tänapäeva kodud nii eriliseks, nii meeldivaks?"

  18. Destruction of the Phoenix/Hibiscus and Barringtonia racemosa Communities at Richards Bay, Natal, South Africa

    Directory of Open Access Journals (Sweden)

    P. J. Weisser

    1982-10-01

    Full Text Available The destruction of the Phoenix!Hibiscus and Barringtonia racemosa Communities described by Venter in 1972 on the southern shores of Richards Bay is reported. The cause was the artificial openingof a new mouth about 5,5 km south of the original mouth, which increased tidal range and salinity. These swamp communities occupied a narrow band about 6 ha in area behind the Bruguiera gymnorrhiza Community. An estimated 95 % of the communities was affected and only on the landward border were some isolated remnants of species such as Acrostichum aureum, Hibiscus tiliaceus and Phoenix reclinata detected .Young stands of  Phragmites australis, seedlings of  Bruguiera gymnorrhiza and Avicennia marina and epipelic algae are recoIonizing the affected area.

  19. BACK TO THE ORIGINS OF THE REPUDIATION OF WUNDT: OSWALD KÜLPE AND RICHARD AVENARIUS.

    Science.gov (United States)

    Russo Krauss, Chiara

    2017-01-01

    This essay provides a fresh account of the break between Oswald Külpe and his master Wilhelm Wundt. Kurt Danziger's reconstruction of the "repudiation" of Wundt, which has become the canon for this significant episode of history of psychology, focused on the supposed influence of Ernst Mach on this set of events, overshadowing the other exponent of Empiriocriticism: Richard Avenarius. Analyzing archival documents and examining anew the primary sources, the paper shows that Avenarius was himself a member of Wundt's circle, and that his "repudiation" of the master paved the way for Külpe. The essay points out the original anti-Wundtian aspects of Avenarius' notion of psychology, thus showing how they were then adopted by Külpe. © 2016 Wiley Periodicals, Inc.

  20. HealthSouth's most wanted. Founder and former chairman and CEO Richard Scrushy is indicted for 85 counts of conspiracy, fraud and money laundering.

    Science.gov (United States)

    Piotrowski, Julie

    2003-11-10

    Wake-up call for the industry or an isolated case of corporate chicanery? Healthcare experts are divided on the import of Richard Scrushy's indictment on 85 counts last week in connection with the financial scandal at HealthSouth Corp. The indictment alleges the company founder relied on electronic and telephone surveillance, threats and intimidation to control his accomplices.

  1. “This World Is Not My Home”: Richard Mouw and Christian Nationalism

    Directory of Open Access Journals (Sweden)

    Aaron Pattillo-Lunt

    2016-12-01

    Full Text Available American evangelicalism has often been punctuated by dual commitments to the United States and to God. Those commitments were strongest within politically conservative evangelicalism. Though representing a solid majority among professing evangelicals, conservatives could not speak for the movement as a whole. Politically progressive evangelicals, beginning in the 1960s, formed a dissenting opinion of the post-World War II revival of Christian nationalism. They dared to challenge American action abroad, noticeably during the Vietnam War. Their critique of Christian nationalism and conservative evangelicals’ close ties to the Republican Party led them to seek refuge in either progressive policies or the Democratic Party. A third, underexplored subgroup of evangelicalism rooted in reformed theology becomes important to consider in this regard. These reformed evangelicals sought to contextualize nationalism in biblical rather than partisan or political terms. This goal is championed well by Richard Mouw, resulting in a nuanced look at evangelical Christians’ difficult dual role as both citizens of the Kingdom of God and the United States.

  2. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  3. Analytical and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model

    KAUST Repository

    Mazaré , Pierre Emmanuel; Dehwah, Ahmad H.; Claudel, Christian G.; Bayen, Alexandre M.

    2011-01-01

    In this article, we propose a computational method for solving the Lighthill-Whitham-Richards (LWR) partial differential equation (PDE) semi-analytically for arbitrary piecewise-constant initial and boundary conditions, and for arbitrary concave fundamental diagrams. With these assumptions, we show that the solution to the LWR PDE at any location and time can be computed exactly and semi-analytically for a very low computational cost using the cumulative number of vehicles formulation of the problem. We implement the proposed computational method on a representative traffic flow scenario to illustrate the exactness of the analytical solution. We also show that the proposed scheme can handle more complex scenarios including traffic lights or moving bottlenecks. The computational cost of the method is very favorable, and is compared with existing algorithms. A toolbox implementation available for public download is briefly described, and posted at http://traffic.berkeley.edu/project/downloads/lwrsolver. © 2011 Elsevier Ltd.

  4. Analytical and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model

    KAUST Repository

    Mazaré, Pierre Emmanuel

    2011-12-01

    In this article, we propose a computational method for solving the Lighthill-Whitham-Richards (LWR) partial differential equation (PDE) semi-analytically for arbitrary piecewise-constant initial and boundary conditions, and for arbitrary concave fundamental diagrams. With these assumptions, we show that the solution to the LWR PDE at any location and time can be computed exactly and semi-analytically for a very low computational cost using the cumulative number of vehicles formulation of the problem. We implement the proposed computational method on a representative traffic flow scenario to illustrate the exactness of the analytical solution. We also show that the proposed scheme can handle more complex scenarios including traffic lights or moving bottlenecks. The computational cost of the method is very favorable, and is compared with existing algorithms. A toolbox implementation available for public download is briefly described, and posted at http://traffic.berkeley.edu/project/downloads/lwrsolver. © 2011 Elsevier Ltd.

  5. 76 FR 43196 - Implementation of the Truth in Caller ID Act

    Science.gov (United States)

    2011-07-20

    ... National Network to End Domestic Violence (NNEDV) that the term ``harm'' is a broad concept that... evolution of technology, and the consequences of spoofing ANI and pseudo-ANI, we find that the delivery of... ID spoofing to protect victims of domestic violence. According to NNEDV, a verification requirement...

  6. Je suis un zombie : Études récentes sur Richard Matheson et le mort-vivant

    OpenAIRE

    Ransom, Amy J.; Trudel, Jean-Louis

    2013-01-01

    Dans ce texte nous résumons quatre essais récents sur le phénomène actuel du zombie ainsi qu’un collectif sur l’œuvre de Richard Matheson dont la première version filmique du roman Je suis une légende a servi d’inspiration à l’ur-film de zombies, La nuit des morts vivants de George A. Romero. Tandis que Pierre Cassou-Noguès et Maxime Coulombe signent des traitements plus philosophiques du zombie, leurs ouvrages diffèrent beaucoup dans leur forme et leur fonction. Pour leur part, Amélie Pépin ...

  7. [Richard Koch's life in national socialism and in Soviet emigration].

    Science.gov (United States)

    Boltres, Daniela; Töpfer, Frank; Wiesing, Urban

    2006-01-01

    The Jewish historian and theorist of medicine, Richard Koch, teaching in Frankfurt/Main, fled in 1936 from National Socialist Germany to the USSR where he lived in the Caucasian spa Essentuki until his death in 1949. Here he worked as a doctor and continued his scientific work, especially on the foundations of medicine in natural philosophy. None of his works of this time were published. Koch was a scientific outsider in the USSR, and he was aware of this. However, he tried to make his views compatible with official doctrines. In 1947 he lost his employment at the medical clinic of Essentuki, and his material situation grew worse. It is still an open question whether this development was related to an increasingly anti-Jewish atmosphere in the USSR that was linked with the Stalinist "purges", as Koch himself appeared to believe. Before his flight from Germany Koch did not show any tendency towards communism or the political left at all. His attitude towards Soviet society and Stalin was mixed: cautious criticism was accompanied by strong expressions of commitment to Stalin and Koch's new Socialist home. The question to what extent Koch's comments showed his true convictions must remain without a definite answer. At least in part they can be understood as precautions in threatening circumstances. The opportunity of a remigration to Germany after 1945, however, was turned down by Koch.

  8. Face Liveness Detection Based on Skin Blood Flow Analysis

    Directory of Open Access Journals (Sweden)

    Shun-Yi Wang

    2017-12-01

    Full Text Available Face recognition systems have been widely adopted for user authentication in security systems due to their simplicity and effectiveness. However, spoofing attacks, including printed photos, displayed photos, and replayed video attacks, are critical challenges to authentication, and these spoofing attacks allow malicious invaders to gain access to the system. This paper proposes two novel features for face liveness detection systems to protect against printed photo attacks and replayed attacks for biometric authentication systems. The first feature obtains the texture difference between red and green channels of face images inspired by the observation that skin blood flow in the face has properties that enable distinction between live and spoofing face images. The second feature estimates the color distribution in the local regions of face images, instead of whole images, because image quality might be more discriminative in small areas of face images. These two features are concatenated together, along with a multi-scale local binary pattern feature, and a support vector machine classifier is trained to discriminate between live and spoofing face images. The experimental results show that the performance of the proposed method for face spoof detection is promising when compared with that of previously published methods. Furthermore, the proposed system can be implemented in real time, which is valuable for mobile applications.

  9. Espíritos cheios de bichos: A fauna nas viagens de Louis Agassiz e Richard Francis Burton pelo Brasil oitocentista

    Directory of Open Access Journals (Sweden)

    Janaina Zito Losada

    2015-04-01

    Full Text Available O Brasil do século XIX foi alvo de inúmeras viagens realizadas por cientistas estrangeiros. O objetivo deste artigo é analisar as impressões sobre a fauna brasileira presentes nos relatos das viagens realizadas pelo naturalista suíço Louis Agassiz, em 1865, e pelo explorador inglês Richard Francis Burton, em 1868. Destes relatos privilegiam-se as descrições do meio natural de diferentes regiões brasileiras e das particularidades da fauna silvestre por eles encontrada.

  10. La chiesa di Richard Meier a Tor Tre Teste e il suo contributo al consolidamento identitario dei nuovi quartieri romani oltre il GRA / The church designed by Richard Meier in Tor Tre Teste and the identity consolidation in the new roman neighbourhoods beyond the Great Circular Road

    Directory of Open Access Journals (Sweden)

    Giuseppe Bonaccorso

    2014-06-01

    Full Text Available Il contributo proposto ha l’obiettivo di analizzare alcuni significativi brani del tessuto urbano della periferia est di Roma, adottando metodi interpretativi legati alla storia, alla società, alla programmazione urbanistica e alla costruzione. Gli aspetti salienti del quadrante orientale della periferia romana verranno così delineati partendo “dal di dentro”, sottolineandone i percorsi, gli spazi e i nuclei compositivi che sono all’origine della struttura e della forma stessa dei quartieri disposti a cavallo del Grande Raccordo Anulare. In questo ambito, si pone l’attenzione su alcuni episodi chiave che vedono protagoniste le nuove chiese che riescono a creare una centralità all’interno dei quartieri periferici sostituendo le biblioteche, le piazze e i centri commerciali.  Analizzando da vicino questi esempi, si scopre come di recente sono state realizzate chiese firmate da architetti di fama internazionale proprio allo scopo di rafforzare, o meglio di costruire, un fattore identitario per ciascun quartiere ubicato nel settore orientale della città. Partendo quindi dal generale si arriva a indagare una chiesa e un quartiere che possono essere considerati un modello da seguire per tutta la periferia a ridosso del GRA: la chiesa giubilare di Dio Padre Misericordioso progettata da Richard Meier nel quartiere di Tor Tre Teste. La sequenzialità degli eventi che hanno contraddistinto il concorso per la progettazione della chiesa, la scelta della proposta di Richard Meier, la complessità del cantiere, l’analisi tecnica, stilistica e simbolica della realizzazione finale sono quindi analizzate nell’ambito del rapporto con il quartiere e del tentativo di realizzare (attraverso di essa un centro di attrazione per tutta la periferia.   The article analyses some significant parts of the urban tissue at the eastern periphery of Rome, using the interpretative methods inherent to history, society, urban programming and construction

  11. Poets/Trump/Philosophers: Reflections on Richard Rorty’s Liberalism, Ten Years after His Death

    Directory of Open Access Journals (Sweden)

    Giorgio Baruchello

    2017-08-01

    Full Text Available Starting with a prescient 1998 quote on the impending decline of US liberal democracy into right-wing, strong-man-based demagogy, this paper outlines Richard Rorty’s political philosophy, which I believe can help us understand perplexing political trends in today’s political reality well beyond the US alone. Specifically, I tackle three key-terms encapsulating the thrust of Rorty’s political philosophy, i.e. “liberalism of fear”, “bourgeois” and “postmodernism”. Also, I address a contraposition that explains how Rorty would approach and attempt to defend liberal democracy from contemporary right-wing, strong-man-based degenerations, namely the priority of “poetry” over “philosophy”. Essentially, if one wishes to win in the political arena, she must be armed with the most effective rhetorical weaponry, however good, solid and well-argued her political views may be. Finally, some remarks are offered on the role that “philosophy” can still play within the same arena.

  12. Três décadas de genes egoístas: Discutindo algumas premissas do best seller de Richard Dawkins

    OpenAIRE

    Vieira, Eduardo Paiva de Pontes; Chaves, Silvia Nogueira

    2011-01-01

    O presente trabalho resgata algumas idéias do biólogo evolucionista Richard Dawkins, apresentadas pela primeira vez em seu best-seller O Gene Egoísta (The Selfish Gene), de 1976. O caráter polêmico de algumas concepções ultradarwinistas e sociobiológicas da obra é campo fértil para o embate de idéias, revelando um universo rico para discussões em diversas frentes, especialmente aquelas que podem se desenvolver na formação crítica de alguns profissionais vinculados á ciências biológicas, socio...

  13. Richard Rorty:From Anti-metaphysical Neo-Pragmatism to Rejection of Philosophy

    Directory of Open Access Journals (Sweden)

    M. Akrami

    2010-01-01

    Full Text Available Richard Rorty is a neo-Pragmatist philosopher. For three decades, he has attacked the traditional philosophy (from Plato to Kant as well as any other epistemology searching for truth or claiming to mirror the nature in his philosophical works. Rorty holds that, according to the history of philosophy in his reading, there is no final answer to the traditional questions concerning knowledge, truth, and representation. These questions, therefore, should be dissolved and denied. He maintains that knowledge is justified belief, justification, however, being not the consequence of some correspondence between the theory or the statement, but the consequence of conversation, social practice, group consensus, and social solidarity. Rorty also thinks that democracy has priority on philosophy, disagreeing with the thesis that philosophy is the foundation of the rest of culture.Despite of usefulness of some elements and implications of Rorty’s metaphilosophy (such as his emphasis on freedom, democracy, and pluralism as well as his insisting on philosophical humility and avoiding scientific pride, it is faced with several problems, including 1 ignoring the referential and realist features of language, 2 confusing interpretation and reality, 3 eliminating the border between objectivity and subjectivity, 4 interfering of public and private life, and 5 ignoring the need of science, culture, technology and, in particular, politics, in philosophy. The authors try to show and analyze some elements of these problems.

  14. Quantum mechanics in the cold war; Quantenmechanik im Kalten Krieg. David Bohm und Richard Feynman

    Energy Technology Data Exchange (ETDEWEB)

    Forstner, C.

    2007-07-01

    In the middle of the 20th century David Bohm and Richard Feynman developed two fundamentally different approaches of modern quantum mechanics: Bohm a realistic interpretation by means of hidden parameters and Feynman the path-integral formalism. This is by this more remarakable, because both physicists started from similar conditions and originated from similar connections. By its comparing approach this study presents more than a contribution to the history of the quantum theory. By the question for the social and cultural conditions of the formation of theories it is furthermore of science-sociological and science-theoretical interest. The in the beginning similar and later different binding of both scientists into the scientific community allows furthermore to study, which adapting pressure each group puts on the individual scientist and the fundamental parts of his research, and which new degrees of freedom in the formation of theories arise, when this constraint is cancelled.

  15. Artificial fingerprint recognition by using optical coherence tomography with autocorrelation analysis

    Science.gov (United States)

    Cheng, Yezeng; Larin, Kirill V.

    2006-12-01

    Fingerprint recognition is one of the most widely used methods of biometrics. This method relies on the surface topography of a finger and, thus, is potentially vulnerable for spoofing by artificial dummies with embedded fingerprints. In this study, we applied the optical coherence tomography (OCT) technique to distinguish artificial materials commonly used for spoofing fingerprint scanning systems from the real skin. Several artificial fingerprint dummies made from household cement and liquid silicone rubber were prepared and tested using a commercial fingerprint reader and an OCT system. While the artificial fingerprints easily spoofed the commercial fingerprint reader, OCT images revealed the presence of them at all times. We also demonstrated that an autocorrelation analysis of the OCT images could be potentially used in automatic recognition systems.

  16. Memoria y Estudios Culturales : un acercamiento al relato sobre la propia historia de vida en Raymond Williams y Richard Hoggart

    Directory of Open Access Journals (Sweden)

    Sebastián Matías Stra

    2018-01-01

    Full Text Available [es] Este trabajo intentará recuperar, de forma parcial y fragmentaria, las maneras en que el testimonio en primera persona articulado en el formato de memorias de la propia historia de vida tiene un posible valor metodológico en algunos textos seminales de la conformación de los estudios culturales ingleses. Hablamos particularmente del libro de 1957, The Uses of Literacy: Aspects of Working-class Life, with Special Reference to Publications and Entertainments, de Richard Hoggart y del tradicional artículo Culture is Ordinary de Raymond Williams, publicado en 1958 y que incluye de forma más rudimentaria algunas definiciones que conformaron la primera parte de la obra del autor galés, constituida por los libros Culture and Society y The Long Revolution. [en] This work will attempt to partially and fragmentarily recover the ways in which the testimony in first person articulated in the format of memories of the own history of life has a possible methodological value in some seminal texts of the conformation of the english cultural studies. We refer in special to the 1957 book, The Uses of Literacy: Aspects of Working-class Life, with Special Reference to Publications and Entertainments, by Richard Hoggart and the Raymond Williams' article Culture is Ordinary, published in 1958, which includes, in an incipient way, some of the definitions that formed the first part of the work of the Welsh author, made up of the books Culture and Society and The Long Revolution.

  17. Entre el Dios de Paley y el Dios de Bonnet: El Parco Evolucionismo Teísta de Richard Owen

    OpenAIRE

    Gustavo Caponi

    2013-01-01

    http://dx.doi.org/10.5007/1808-1711.2013v17n1p71En primer lugar, en este artículo se examina el carácter de las putativas referencias a la evolución de las especies que encontramos en las obras que Richard Owen publicó antes de 1858; y luego se analizan las escazas y vagas conjeturas evolucionistas que Owen sin duda formuló con posterioridad a la presentación pública de la Teoría de la Selección Natural.  En lo que respecta a lo primero, el objetivo es subrayar la ambigüedad de esas referenci...

  18. Exact solutions to traffic density estimation problems involving the Lighthill-Whitham-Richards traffic flow model using mixed integer programming

    KAUST Repository

    Canepa, Edward S.; Claudel, Christian G.

    2012-01-01

    This article presents a new mixed integer programming formulation of the traffic density estimation problem in highways modeled by the Lighthill Whitham Richards equation. We first present an equivalent formulation of the problem using an Hamilton-Jacobi equation. Then, using a semi-analytic formula, we show that the model constraints resulting from the Hamilton-Jacobi equation result in linear constraints, albeit with unknown integers. We then pose the problem of estimating the density at the initial time given incomplete and inaccurate traffic data as a Mixed Integer Program. We then present a numerical implementation of the method using experimental flow and probe data obtained during Mobile Century experiment. © 2012 IEEE.

  19. Exact solutions to traffic density estimation problems involving the Lighthill-Whitham-Richards traffic flow model using mixed integer programming

    KAUST Repository

    Canepa, Edward S.

    2012-09-01

    This article presents a new mixed integer programming formulation of the traffic density estimation problem in highways modeled by the Lighthill Whitham Richards equation. We first present an equivalent formulation of the problem using an Hamilton-Jacobi equation. Then, using a semi-analytic formula, we show that the model constraints resulting from the Hamilton-Jacobi equation result in linear constraints, albeit with unknown integers. We then pose the problem of estimating the density at the initial time given incomplete and inaccurate traffic data as a Mixed Integer Program. We then present a numerical implementation of the method using experimental flow and probe data obtained during Mobile Century experiment. © 2012 IEEE.

  20. Face Liveness Detection Using Dynamic Local Ternary Pattern (DLTP

    Directory of Open Access Journals (Sweden)

    Sajida Parveen

    2016-05-01

    Full Text Available Face spoofing is considered to be one of the prominent threats to face recognition systems. However, in order to improve the security measures of such biometric systems against deliberate spoof attacks, liveness detection has received significant recent attention from researchers. For this purpose, analysis of facial skin texture properties becomes more popular because of its limited resource requirement and lower processing cost. The traditional method of skin analysis for liveness detection was to use Local Binary Pattern (LBP and its variants. LBP descriptors are effective, but they may exhibit certain limitations in near uniform patterns. Thus, in this paper, we demonstrate the effectiveness of Local Ternary Pattern (LTP as an alternative to LBP. In addition, we adopted Dynamic Local Ternary Pattern (DLTP, which eliminates the manual threshold setting in LTP by using Weber’s law. The proposed method was tested rigorously on four facial spoof databases: three are public domain databases and the other is the Universiti Putra Malaysia (UPM face spoof database, which was compiled through this study. The results obtained from the proposed DLTP texture descriptor attained optimum accuracy and clearly outperformed the reported LBP and LTP texture descriptors.

  1. Absolut x Adbusters: vínculos sociais da publicidade revelados pela antipublicidade

    Directory of Open Access Journals (Sweden)

    Simone Rocha

    2008-10-01

    Full Text Available O objetivo deste artigo é evidenciar alguns vínculos que a publicidade estabelece com o mundo social por meio do olhar tensionador da antipublicidade. Tomando por base autores como Stuart Hall e Michel Foucault, e através de uma análise sociossemiótica de anúncios da Absolut Vodka e dos spoof ads da ONG canadense Adbusters, procuramos evidenciar alguns dos modos pelos quais a masculinidade é uma representação socialmente compartilhada, tornando-se um elemento relevante a ser considerado na construção de campanhas publicitárias. Palavras-chave: Antipublicidade; publicidade; representações sociais. ABSTRACT The aim of this paper is to evidence the links which advertisements build with the social world from the questioning point of view of spoof ads. Based on authors such as Stuart Hall and Michel Foucault, and through a socio- semiotic analysis of Absolut Vodka ads and the spoof ads produced by Canadian NGO Adbusters, we try to highlight some of the ways in which masculinity is a socially shared representation, thus an important factor to be considered in the construction of advertising campaigns. Keywords: Spoof ads; advertisement; social representations.

  2. Shakespeare for all Seasons ? Richard II en Avignon : de Jean Vilar (1957 à Ariane Mnouchkine (1982 Shakespeare for All Seasons? Richard II at the Avignon Festival: from Jean Vilar (1957 to Ariane Mnouchkine (1982

    Directory of Open Access Journals (Sweden)

    Isabelle Schwartz-Gastine

    2009-06-01

    Full Text Available Richard II has not often been performed on the French stage; however, in the 20th century, within a period of 35 years, two productions premiered at the same venue (the Cour d’Honneur at the open-air Avignon Festival, were so successful that they became emblematic of their times. In 1947 Jean Vilar opened the first Avignon Festival with an ascetic, charismatic eponymous hero who came to an inner knowledge of himself in his bare prison cell; in 1982 Ariane Mnouchkine offered a splendid visual display by transposing the play into the kabuki tradition; this offered the audience breath-taking and dynamic tableaux of elaborate court ceremonies and rebellious lords.At such a distance in time, the English medieval code of honour was dealt with according to completely different theatrical principles of ethics and aesthetics, mirroring the changes in perspective within French society.

  3. Has David Howden Vindicated Richard von Mises’s Definition of Probability?

    Directory of Open Access Journals (Sweden)

    Mark R. Crovelli

    2009-11-01

    Full Text Available In my recent article on these pages (Crovelli 2009 I argued that members of the Austrian School of economics have adopted and defended a faulty definition of probability. I argued that the definition of probability necessarily depends upon the nature of the world in which we live. I claimed that if the nature of the world is such that every event and phenomenon which occurs has a cause of some sort, then probability must be defined subjectively; that is, “as a measure of our uncertainty about the likelihood of occurrence of some event or phenomenon, based upon evidence that need not derive solely from past frequencies of ‘collectives’ or ‘classes.’” I further claimed that the nature of the world is indeed such that all events and phenomena have prior causes, and that this fact compels us to adopt a subjective definition of probability.David Howden has recently published what he claims is a refutation of my argument in his article “Single Trial Probability Applications: Can Subjectivity Evade Frequency Limitations” (Howden 2009. Unfortunately, Mr. Howden appears to not have understood my argument, and his purported refutation of my subjective definition consequently amounts to nothing more than a concatenation of confused and fallacious ideas that are completely irrelevant to my argument. David Howden has thus failed in his attempt to vindicate Richard von Mises’s definition of probability.

  4. Stand diameter distribution modelling and prediction based on Richards function.

    Directory of Open Access Journals (Sweden)

    Ai-guo Duan

    Full Text Available The objective of this study was to introduce application of the Richards equation on modelling and prediction of stand diameter distribution. The long-term repeated measurement data sets, consisted of 309 diameter frequency distributions from Chinese fir (Cunninghamia lanceolata plantations in the southern China, were used. Also, 150 stands were used as fitting data, the other 159 stands were used for testing. Nonlinear regression method (NRM or maximum likelihood estimates method (MLEM were applied to estimate the parameters of models, and the parameter prediction method (PPM and parameter recovery method (PRM were used to predict the diameter distributions of unknown stands. Four main conclusions were obtained: (1 R distribution presented a more accurate simulation than three-parametric Weibull function; (2 the parameters p, q and r of R distribution proved to be its scale, location and shape parameters, and have a deep relationship with stand characteristics, which means the parameters of R distribution have good theoretical interpretation; (3 the ordinate of inflection point of R distribution has significant relativity with its skewness and kurtosis, and the fitted main distribution range for the cumulative diameter distribution of Chinese fir plantations was 0.4∼0.6; (4 the goodness-of-fit test showed diameter distributions of unknown stands can be well estimated by applying R distribution based on PRM or the combination of PPM and PRM under the condition that only quadratic mean DBH or plus stand age are known, and the non-rejection rates were near 80%, which are higher than the 72.33% non-rejection rate of three-parametric Weibull function based on the combination of PPM and PRM.

  5. Kalman filters for assimilating near-surface observations into the Richards equation - Part 2: A dual filter approach for simultaneous retrieval of states and parameters

    Science.gov (United States)

    Medina, H.; Romano, N.; Chirico, G. B.

    2014-07-01

    This study presents a dual Kalman filter (DSUKF - dual standard-unscented Kalman filter) for retrieving states and parameters controlling the soil water dynamics in a homogeneous soil column, by assimilating near-surface state observations. The DSUKF couples a standard Kalman filter for retrieving the states of a linear solver of the Richards equation, and an unscented Kalman filter for retrieving the parameters of the soil hydraulic functions, which are defined according to the van Genuchten-Mualem closed-form model. The accuracy and the computational expense of the DSUKF are compared with those of the dual ensemble Kalman filter (DEnKF) implemented with a nonlinear solver of the Richards equation. Both the DSUKF and the DEnKF are applied with two alternative state-space formulations of the Richards equation, respectively differentiated by the type of variable employed for representing the states: either the soil water content (θ) or the soil water matric pressure head (h). The comparison analyses are conducted with reference to synthetic time series of the true states, noise corrupted observations, and synthetic time series of the meteorological forcing. The performance of the retrieval algorithms are examined accounting for the effects exerted on the output by the input parameters, the observation depth and assimilation frequency, as well as by the relationship between retrieved states and assimilated variables. The uncertainty of the states retrieved with DSUKF is considerably reduced, for any initial wrong parameterization, with similar accuracy but less computational effort than the DEnKF, when this is implemented with ensembles of 25 members. For ensemble sizes of the same order of those involved in the DSUKF, the DEnKF fails to provide reliable posterior estimates of states and parameters. The retrieval performance of the soil hydraulic parameters is strongly affected by several factors, such as the initial guess of the unknown parameters, the wet or dry

  6. [Richard C. M. Mole: The Baltic states from the Soviet Union to the European Union. Identity, discourse and power in the post-communist transition of Estonia, Latvia and Lithuania] / Karsten Brüggemann

    Index Scriptorium Estoniae

    Brüggemann, Karsten, 1965-

    2014-01-01

    Arvustus: Mole, Richard C. M. The Baltic States from the Soviet Union to the European Union : identity, discourse and power in the post-communist transition of Estonia, Latvia and Lithuania. London ; New York : Routledge, 2012, 2013

  7. Unreliability and the Animal Narrator in Richard Adams’s The Plague Dogs

    Directory of Open Access Journals (Sweden)

    Anja Höing

    2017-03-01

    Full Text Available Richard Adams’s talking animal story The Plague Dogs (1978, with its deeply genre-atypical mode of narration, offers a multiplicity of avenues to explore the literary animal as animal. The story draws much of its power from the psychological complexity and related unreliability of both canine narrators, two research lab escapees gone feral. Both the terrier Snitter and the black mongrel Rowf are mentally ill and experience a highly subjective, part-fantastic world. In episodes of zero focalization, a sarcastic voice comments on the plot from the off, aggressively attacking a thoroughly anthropocentric superstructure the protagonists themselves are oblivious of, and presenting all that is normally constructed as “rational” in the implied reader’s world as a carnivalesque farce. Combining these equally unreliable narratives, The Plague Dogs creates a unique mixture of what Phelan (2007 calls “estranging” and “bonding” unreliability and brings to light the devastating consequences of anthropocentrism. The Plague Dogs not only defamiliarizes a genre usually committed to conventional means of storytelling, but the dominant Western conception of the status of animals in the world, showing that once we start to read the animal as animal, this sets into motion an avalanche of other concepts in need of re-reading, among them the very ones making up the fundamental pillars of Western societies’ anthropocentric self-conception.

  8. La France au Tsar : chanson patriotique créée par Marius Richard à la Scala, Henri Helme à Ba-ta-clan [illustration couleurs Donjean

    OpenAIRE

    François Bigot Éditeur , .; Daphy , Éliane

    2010-01-01

    La France au Tsar : chanson patriotique créée par Marius Richard à la Scala, Henri Helme à Ba-ta-clan ; paroles de Lucien Colonge, Musique de J. Claudel. [Illustration couleurs signée] Donjean. A la chanson populaire, Maison Bigot éditeur (sans cotage, sans ©, datation recherche en cours). Titre inconnu du catalogue BNF. Datation provisoire par année de dépôt médihal (2010)

  9. The Effect of Richard Wagner's Music and Beliefs on Hitler's Ideology

    Directory of Open Access Journals (Sweden)

    Carolyn S. Ticker

    2016-09-01

    Full Text Available The Holocaust will always be remembered as one of the most horrific and evil events in all of history. One question that has been so pervasive in regards to this historical event is the question of why. Why exactly did Hitler massacre the Jewish people? Why did he come to the conclusion that the Jews were somehow lesser than him, and that it was okay to kill them? What and who were his influences and how did they help form Hitler’s opinions leading up to the Holocaust? Although more than one situation or person influenced Hitler, I believe that one man in particular really helped contribute to Hitler’s ideas, especially about the Jewish people. This man is the famous musician Richard Wagner. While musicologists admit that Wagner was a musical genius, one aspect of his career that is hard to ignore is his strong antisemitism. In addition to speaking about his hatred for the Jews, he also wrote about it in his music, making it hard to glance over. Hitler had been close to the Wagner family, and had an obsessive, cult-like infatuation with Wagner’s music beginning in his childhood. This infatuation with Wagner’s music and his closeness to his later family helped facilitate and solidify his negative views about the Jewish people. In this paper I will explore the antisemitism that is within Wagner’s music and writing, and then I will discuss how Wagner’s antisemitism helped inform, influence, and shape Hitler’s ideas, indirectly assisting in the propagation of the Holocaust.

  10. Global Positioning System Disaster Notification Messaging Service

    Science.gov (United States)

    2013-09-01

    jammer.” In early 2013, a team from MIT with the cooperation of a witting yacht crew performed a proof of concept navigation attack as if a malicious...attacker were spoofing GPS. GPS signals were slowly overpowered with a compilation of artificial signals which successfully steered the yacht 100...2013, July 30). Students hijack luxury yacht with GPS spoofing. Retrieved from SC magazine website http://www.scmagazine.com.au/News/ Schnabel, J

  11. Obituary: Richard B. Dunn, 1927-2005

    Science.gov (United States)

    Keil, Stephen L.; Dooling, David

    2007-12-01

    Dr. Richard B. Dunn, astronomer emeritus at the National Solar Observatory, died of a heart attack on September 29, 2005. He was recognized as one of the foremost experimental solar physicists. His innovative designs for telescopes and instruments led to many important discoveries in solar physics. Born in Baltimore, Maryland, in 1927 and raised in Minneapolis, Minnesota, Dick's parents were Dr. Halbert L. Dunn and Katherine Brandner. Halbert (MD, Ph.D., F.A.P.H.A.) was an physician who became Chief of the National Office of Vital Statistics, Public Health Service. He published a paper "High Level Wellness for Man and Society" that became the founding paper of the field of wellness health care. After their divorce in 1942, Katherine moved to New York and became a social worker. Dick had two older brothers who died before him, Halbert (born in 1921, who became a civil engineer) and Robert (born in 1924, who became an architect). Dick earned a BS in mechanical engineering and an MS in astronomy at the University of Minnesota. At the end of World War II he served in the United States Army in Japan. For his master's degree, Dick undertook the design and construction of a Lyot-type birefringent filter for observations of solar prominences. This early work led to his acceptance at Harvard, where Professor Donald Menzel encouraged him to continue his work with the 15-inch Cambridge telescope. In 1951 he conducted part of his doctoral thesis work at the fledgling Sacramento Peak Observatory in southern New Mexico. The observatory director, Dr. John Evans, was impressed with Dick's outstanding instrumental talents and invited him to join as one of the first scientific staff members. During his first few years at Sac Peak, Dick developed two more birefringent filter systems including one with an integrated coronagraph. With this system, he produced the best prominence and spicule observations ever obtained. Dick's career was dedicated to obtaining solar observations of the

  12. Entre el Dios de Paley y el Dios de Bonnet: El Parco Evolucionismo Teísta de Richard Owen

    Directory of Open Access Journals (Sweden)

    Gustavo Caponi

    2013-04-01

    Full Text Available Firstly, in this article it is examined the nature of the putative remarks concerning evolution of species that are found in the works that Richard Owen published before 1858; and then it is made the same thing with the few and vague evolutionist conjectures that Owen certainly made after the public presentation of Natural Selection Theory. Regarding the former topic, the goal will be to highlight the ambiguity of those Owen’s remarks, and concerning the latter topic what is looked for is to show that, when he explained his transmutationist thesis, Owen didn’t go beyond a pious theistic evolutionism, without postulating any mechanism of evolutionary change and remaining faithful to Design Theology praised by Paley.

  13. HOW CAN LOVE BE VIOLENT? REFLECTIONS ON RICHARD OF ST.VICTOR’S ON THE FOUR DEGREES OF VIOLENT LOVE

    Directory of Open Access Journals (Sweden)

    MARIUS TALOŞ

    2012-05-01

    Full Text Available The following article focuses on Richard of St. Victor´s most original treatise: On the Four Degrees of Violent Love. Although the topic of violence within the Christian view on ethics, politics and theology was not at all new by 1173, the major contribution of this short but dense mystical writing consists in developing systematically the violence as an inherent consequence of the infinite charity. The love is so powerful that it “wounds, binds, languishes and brings on a faint”, but the same force may have different effects: if these four steps appear to be destructive when oriented to satisfy the “profane” desires, their infinite strength show providential effects when turned to the divine source of the charity.

  14. Richard Francis Burton e a inserÃÃo do kama-sutras como um manual sexual entre os vitorianos (Inglaterra, 1883)

    OpenAIRE

    Felipe Salvador Weissheimer

    2014-01-01

    Dentre os vÃrios âKama-sutrasâ difundidos no mercado, a versÃo clÃssica foi escrita por Vatsyayana (sÃculo I-IV, aproximadamente) e publicada na Inglaterra em 1883 pela Sociedade Hindu Kama-Shastra. Richard Francis Burton foi o membro de maior importÃncia na Sociedade Hindu Kama-Shastra, pois, alÃm de fomentar a publicaÃÃo, auxiliou na traduÃÃo, editou e enunciou vÃrios comentÃrios ao longo da obra. Em seus comentÃrios, percebemos que o projeto da traduÃÃo e publicaÃÃo do Kama-sutras visava e...

  15. Statistical Models for Predicting Threat Detection From Human Behavior.

    Science.gov (United States)

    Kelley, Timothy; Amon, Mary J; Bertenthal, Bennett I

    2018-01-01

    Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure "non-spoof" or insecure "spoof" versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to "login" to or "back" out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing attacks

  16. Modelos de crescimento resultantes da combinação e variações dos modelos de Chapman-Richards e Silva-Bailey aplicados em Leucaena leucocephala (Lam. de Wit.

    Directory of Open Access Journals (Sweden)

    Cícero Carlos Ramos de Brito

    2010-08-01

    Full Text Available O objetivo deste trabalho foi desenvolver novos modelos de crescimento para recursos florestais aplicados à leucena [Leucaena leucocephala (Lam. de Wit], tendo como base as hipóteses biológicas propostas por Chapman-Richards e Silva-Bailey. O experimento de leucena foi conduzido na Estação Experimental da Empresa Pernambucana de Pesquisa Agropecuária - IPA, Caruaru, PE. Foram utilizadas 544 árvores de leucena de um experimento com vinte remedições realizadas ao longo de 12 anos. Compararam-se novos modelos de crescimento resultantes da combinação e variações dos modelos de Chapman-Richards e Silva-Bailey, bem como outros comumente usados em recursos florestais. Para a seleção das equações, utilizaram-se o Índice de Ajuste (IA, o erro-padrão da estimativa e a distribuição gráfica dos resíduos. Os resultados indicaram que todos os modelos testados se ajustaram de maneira satisfatória aos dados, podendo ser utilizados para se estimar o crescimento em altura da leucena.

  17. Staging Unincorporated Power: Richard Harding Davis and the Critique of Imperial News

    Directory of Open Access Journals (Sweden)

    Nirmal Trivedi

    2011-12-01

    Full Text Available This essay contextualizes the work of war correspondent Richard Harding Davis within an evolving “imperial news apparatus” that would culminate in his reporting of the Spanish-American War. Critics have conventionally framed Davis squarely within the imperial cause, associating him with his admirer Roosevelt and naval admiral Alfred T. Mahan. Contrary to readings of Davis as an apologist for US imperialism, Trivedi contends that Davis understood how US imperial power relied on an information apparatus to communicate to an increasingly media-conscious American public through culture, that is, via familiar narratives, symbols, and objects—what Trivedi calls “imperial news.” The essay follows Davis’s development from his fictional representation of the new war correspondent in “The Reporter Who Made Himself King” to his own war correspondence before and after the Spanish-American War as collected in the memoirs A Year from a Reporter’s Notebook (1897, Cuba in War Time (1897, and Notes of a War Correspondent (1912. Davis’s war correspondence and fictional work effectively stage US imperialism as “unincorporated power”: that is, as power reliant on a developing news-making apparatus that deploys particular discursive strategies to validate its political claims. This staging critiques strategies of US imperial sovereignty—specifically its “privatization of knowledge” and its promotion of the war correspondent as nothing more than a spectator and purveyor of massacres.

  18. Staging Unincorporated Power: Richard Harding Davis and the Critique of Imperial News

    Directory of Open Access Journals (Sweden)

    Nirmal Trivedi

    2011-12-01

    Full Text Available This essay contextualizes the work of war correspondent Richard Harding Davis within an evolving “imperial news apparatus” that would culminate in his reporting of the Spanish-American War. Critics have conventionally framed Davis squarely within the imperial cause, associating him with his admirer Roosevelt and naval admiral Alfred T. Mahan. Contrary to readings of Davis as an apologist for US imperialism, Trivedi contends that Davis understood how US imperial power relied on an information apparatus to communicate to an increasingly media-conscious American public through culture, that is, via familiar narratives, symbols, and objects—what Trivedi calls “imperial news.” The essay follows Davis’s development from his fictional representation of the new war correspondent in “The Reporter Who Made Himself King” to his own war correspondence before and after the Spanish-American War as collected in the memoirs A Year from a Reporter’s Notebook (1897, Cuba in War Time (1897, and Notes of a War Correspondent (1912. Davis’s war correspondence and fictional work effectively stage US imperialism as “unincorporated power”: that is, as power reliant on a developing news-making apparatus that deploys particular discursive strategies to validate its political claims. This staging critiques strategies of US imperial sovereignty—specifically its “privatization of knowledge” and its promotion of the war correspondent as nothing more than a spectator and purveyor of massacres.

  19. Charles Darwin, Richard Owen, and Natural Selection: A Question of Priority.

    Science.gov (United States)

    Johnson, Curtis N

    2018-05-03

    No single author presented Darwin with a more difficult question about his priority in discovering natural selection than the British comparative anatomist and paleontologist Richard Owen. Owen was arguably the most influential biologist in Great Britain in Darwin's time. Darwin wanted his approbation for what he believed to be his own theory of natural selection. Unfortunately for Darwin, when Owen first commented in publication about Darwin's theory of descent he was openly hostile (Edinb. Rev. vol. 111, Article VIII, 1860, pp. 487-533, anonymous). Darwin was taken off-guard. In private meetings and correspondence prior to 1860 Owen had been nothing but polite and friendly, even helping Darwin in cataloguing and analyzing Darwin's zoological specimens from the Beagle voyage. Every early indication predicted a life-long friendship and collaboration. But that was not to be. Owen followed his slashing review with a mounting campaign in the 1860s to denounce and discredit both Darwin and his small but ascendant circle of friends and supporters. But that was not enough for Owen. Starting in 1866, perhaps by now realizing Darwin had landed the big fish, Owen launched a new campaign, to claim the discovery of "Darwin's theory" for himself. Darwin naturally fought back, mainly in the "Historical Sketch" that he prefaced to Origin starting in 1861. But when we peel back the layers of personal animus and escalating vituperation we discover in fact their quarrel was generated more by mutual misunderstanding than scientific disagreement. The battle ended only when Darwin finally penetrated to the crux of the matter and put an end to the rivalry in 1872, in the final version of the Sketch.

  20. Arctic observers: Richard King, monogenism and the historicisation of Inuit through travel narratives.

    Science.gov (United States)

    Sera-Shriar, Efram

    2015-06-01

    In 1848 the ethnologist, surgeon and Arctic explorer Richard King (1810-1876) published a three-part series on Inuit in the Journal of the Ethnological Society of London. This series provided a detailed history of Inuit from the eleventh century to the early nineteenth century. It incorporated a mixture of King's personal observations from his experience travelling to the Arctic as a member of George Back's expedition (1833-1835), and the testimonies of other contemporary and historical actors who had written on the subject. The aim was to historicise Inuit through the use of travel reports and show persistent features among the race. King was a monogenist and his sensitive recasting of Inuit was influenced by his participation in a research community actively engaged in humanitarian and abolitionist causes. The physician and ethnologist Thomas Hodgkin (1798-1866) argued that King's research on Inuit was one of the best ethnological approaches to emulate and that it set the standard for the nascent discipline. If we are to take seriously Hodgkin's claim, we should look at how King constructed his depiction of Inuit. There is much to be gained by investigating the practices of nineteenth-century ethnologists because it strengthens our knowledge of the discipline's past and shows how modern understandings of races were formed. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. J.M. Gratale on Tore T. Petersen’s Richard Nixon, Great Britain and the Anglo-American Alignment in the Persian Gulf and Arabian Peninsula

    Directory of Open Access Journals (Sweden)

    2009-09-01

    Full Text Available Tore T. Petersen. Richard Nixon, Great Britain and the Anglo-American Alignment in the Persian Gulf and Arabian Peninsula: Making Allies out of Clients. Sussex Academic Press, 2009.  172pp.  978-1-84519-277-8.Since the events of 9-11 there has been a sizeable quantity of books published on American foreign policy in broad terms, as well as more focused studies on contemporary developments in southwest Asia, more commonly referred to as the Middle East. Many of these volumes are highly politic...

  2. Learning Unfair Trading: a Market Manipulation Analysis From the Reinforcement Learning Perspective

    OpenAIRE

    Martínez-Miranda, Enrique; McBurney, Peter; Howard, Matthew J.

    2015-01-01

    Market manipulation is a strategy used by traders to alter the price of financial assets. One type of manipulation is based on the process of buying or selling assets by using several trading strategies, among them spoofing is a popular strategy and is considered illegal by market regulators. Some promising tools have been developed to detect price manipulation, but cases can still be found in the markets. In this paper we model spoofing and pinging trading from a macroscopic perspective of p...

  3. Thinking through war: the social thought of Richard T. Ely, John R. Commons, and Edward A. Ross during the First World War.

    Science.gov (United States)

    Herzberg, D L

    2001-01-01

    This paper examines the social thought of University of Wisconsin professors Richard T. Ely, John R. Commons, and Edward A. Ross during World War I. Like many of their fellow scholars, these three were actively involved in the pro-war effort. Although their support for the war was strongly conditioned by personal and occupational considerations, the impact of their wartime service was not restricted to those realms. Their social thought, which they impressed into service explaining and justifying the war, was itself altered in subtle and sometimes surprising ways by the forceful positions they took on the political, economic, and racial significance of the conflict. Copyright 2001 John Wiley & Sons, Inc.

  4. Providing the physical basis of SCS curve number method and its proportionality relationship from Richards' equation

    Science.gov (United States)

    Hooshyar, M.; Wang, D.

    2016-12-01

    The empirical proportionality relationship, which indicates that the ratio of cumulative surface runoff and infiltration to their corresponding potentials are equal, is the basis of the extensively used Soil Conservation Service Curve Number (SCS-CN) method. The objective of this paper is to provide the physical basis of the SCS-CN method and its proportionality hypothesis from the infiltration excess runoff generation perspective. To achieve this purpose, an analytical solution of Richards' equation is derived for ponded infiltration in shallow water table environment under the following boundary conditions: 1) the soil is saturated at the land surface; and 2) there is a no-flux boundary which moves downward. The solution is established based on the assumptions of negligible gravitational effect, constant soil water diffusivity, and hydrostatic soil moisture profile between the no-flux boundary and water table. Based on the derived analytical solution, the proportionality hypothesis is a reasonable approximation for rainfall partitioning at the early stage of ponded infiltration in areas with a shallow water table for coarse textured soils.

  5. A framework for privacy and security analysis of probe-based traffic information systems

    KAUST Repository

    Canepa, Edward S.; Claudel, Christian G.

    2013-01-01

    Most large scale traffic information systems rely on fixed sensors (e.g. loop detectors, cameras) and user generated data, this latter in the form of GPS traces sent by smartphones or GPS devices onboard vehicles. While this type of data is relatively inexpensive to gather, it can pose multiple security and privacy risks, even if the location tracks are anonymous. In particular, creating bogus location tracks and sending them to the system is relatively easy. This bogus data could perturb traffic flow estimates, and disrupt the transportation system whenever these estimates are used for actuation. In this article, we propose a new framework for solving a variety of privacy and cybersecurity problems arising in transportation systems. The state of traffic is modeled by the Lighthill-Whitham-Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for some decision variable. The resulting framework is very flexible, and can in particular be used to detect spoofing attacks in real time, or carry out attacks on location tracks. Numerical implementations are performed on experimental data from the Mobile Century experiment to validate this framework. © 2013 ACM.

  6. Obituary: Richard L. (Dick) Walker, Jr., 1938-2005

    Science.gov (United States)

    Pier, Jeffrey R.; Mason, Brian

    2005-12-01

    Koch Center for Science, Math, and Technology at Deerfield Academy in Massachusetts. He also consulted with James Turrell, providing astronomical position information for the design of the Roden Crater Project outside of Flagstaff. While he will be remembered for his significant scientific contributions to the field of astronomy, those who knew Dick, both scientists and non-scientists alike, will probably remember him best for his humility, his humanity, and his loyal and abiding friendship. He was a man with a terrific sense of humor and an infectious laugh. It was always an honor and pleasure to be in his company. Richard L. Walker, Jr. is survived by his wife, Patricia, two daughters from his first marriage: Brenda Walker of Las Vegas, NV, and Pamela Hepburn of Holland, OH, as well as four children from Patricia's first marriage: Doug Browning of Lake Havasu City, AZ, Michael Browning of Kingman, AZ, Kim Bructo of Orient, OH, and Jennifer Brown of Lake Havasu City, AZ. He is also survived by ten grandchildren and three great-grandchildren. He was preceded in death by his father Richard, mother Mary, and daughter, Paula Jean Elizabeth Stone.

  7. Security enhancement of hand geometry scanners using optical blood flow detection

    Science.gov (United States)

    Crihalmeanu, Musat C.; Jerabek, Mark A.; Meehan, Kathleen

    2004-08-01

    In today's security conscious society the efficiency of biometric systems has an increasing tendency to replace the classic but less effective keys and passwords. Hand geometry readers are popular biometrics used for acces control and time and attendance applications. One of their weaknesses is vulnerability to spoofing using fake hands (latex, play-doh or dead-hands). The object of this paper is to design a feature to be added to the hand geometry scanner in order to detect vitality in the hand, reducing the possibilities for spoofing. This paper demonstrates how the hand reader was successfully spoofed and shows the implementation of the vitality detection feature through an inexpensive but efficient electronic design. The method used for detection is photo-plethysmography. The Reflectance Sensor built is of original conception. After amplifying, filtering and processing the sensor's signal, a message is shown via an LCD display, concerning the liveness of the hand and the pulse rate.

  8. Sufi, Christian or Buddhist? Richard Francis Burton’s “Parameters of Belief”

    Directory of Open Access Journals (Sweden)

    John Wallen

    2013-09-01

    Full Text Available Richard Burton has been interpreted and misinterpreted by literary critics as eminent as Edward Said and Louisa Pratt as well as by others such as Rana Kabbani and Reina Lewis. Biographers like Fawn Brody, Edward Rice, Mary Lovell and Jon Godsall have also had their say. Burton has been variously described as imperialist, sexist, gay, obssessed with pornography, racist, plagiarist, sexual libertine, scatologist, expert sociologist, profoundly deceitful and impotent. In spite of this negative press, interest in Burton is always high as his life and times are relevant to many scholars interested in the 19th century origins of modern thought and postcolonial ideas. In this paper presentation I will attempt to get beyond the confused and contradictory portrayals of Burton over the last 50 or so years by looking in some detail at Burton’s two long poems: Stone Talk and The Kasidah. In these works, published 15 years apart, Burton writes under pseudonyms and, as I will argue, is able to express many of his deepest beliefs, especially in The Kasidah where he is playing the part of Hadji Abu Al Yezid, a Sufi like-wise man who possesses some startling similarities to Burton himself. What emerges from this close examination of the texts is a sensitive relativist who, while adhering to the scientific method in all his practical dealings, is yet able to consider the possibility that everything we see around us and all our experience of the world might be, finally, nothing more than Maya and illusion.

  9. You Don't Need Richards'... A New General 1-D Vadose Zone Solution Method that is Reliable

    Science.gov (United States)

    Ogden, F. L.; Lai, W.; Zhu, J.; Steinke, R. C.; Talbot, C. A.

    2015-12-01

    Hydrologic modelers and mathematicians have strived to improve 1-D Richards' equation (RE) solution reliability for predicting vadose zone fluxes. Despite advances in computing power and the numerical solution of partial differential equations since Richards first published the RE in 1931, the solution remains unreliable. That is to say that there is no guarantee that for a particular set of soil constitutive relations, moisture profile conditions, or forcing input that a numerical RE solver will converge to an answer. This risk of non-convergence renders prohibitive the use of RE solvers in hydrological models that need perhaps millions of infiltration solutions. In lieu of using unreliable numerical RE solutions, researchers have developed a wide array of approximate solutions that more-or-less mimic the behavior of the RE, with some notable deficiencies such as parameter insensitivity or divergence over time. The improved Talbot-Ogden (T-O) finite water-content scheme was shown by Ogden et al. (2015) to be an extremely good approximation of the 1-D RE solution, with a difference in cumulative infiltration of only 0.2 percent over an 8 month simulation comparing the improved T-O scheme with a RE numerical solver. The reason is that the newly-derived fundamental flow equation that underpins the improved T-O method is equivalent to the RE minus a term that is equal to the diffusive flux divided by the slope of the wetting front. Because the diffusive flux has zero mean, this term is not important in calculating the mean flux. The wetting front slope is near infinite (sharp) in coarser soils that produce more significant hydrological interactions between surface and ground waters, which also makes this missing term 1) disappear in the limit, and, 2) create stability challenges for the numerical solution of RE. The improved T-O method is a replacement for the 1-D RE in soils that can be simulated as homogeneous layers, where the user is willing to neglect the effects

  10. Escatologia e história em Richard Shaull: a narrativa mítico-teológica entre a memória e o futuro

    Directory of Open Access Journals (Sweden)

    Arnaldo Érico Huff Júnior

    2013-01-01

    Full Text Available Resumo. O texto pretende pensar a produção da teologia da revolução de Richard Shaull no encontro entre escatologia e história. A partir de um breve relato dos anos de Shaull no Brasil, passa-se à análise das principais ideias teológicas que conduziram Shaull à formulação de uma assim chamada teologia da revolução. Finalmente, propõe-se uma chave interpretativa para a história da teologia, a partir de um diálogo com Reinhart Koselleck e Mircea Eliade.

  11. A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS

    Directory of Open Access Journals (Sweden)

    T. Subbulakshmi

    2014-10-01

    Full Text Available Distributed Denial of Service (DDoS attacks were considered to be a tremendous threat to the current information security infrastructure. During DDoS attack, multiple malicious hosts that are recruited by the attackers launch a coordinated attack against one host or a network victim, which cause denial of service to legitimate users. The existing techniques suffer from more number of false alarms and more human intervention for attack detection. The objective of this paper is to monitor the network online which automatically initiates detection mechanism if there is any suspicious activity and also defense the hosts from being arrived at the network. Both spoofed and non spoofed IP’s are detected in this approach. Non spoofed IP’s are detected using Enhanced Support Vector Machines (ESVM and spoofed IP’s are detected using Hop Count Filtering (HCF mechanism. The detected IP’s are maintained separately to initiate the defense process. The attack strength is calculated using Lanchester Law which initiates the defense mechanism. Based on the calculated attack strength any of the defense schemes such as Rate based limiting or History based IP filtering is automatically initiated to drop the packets from the suspected IP. The integrated online monitoring approach for detection and defense of DDoS attacks is deployed in an experimental testbed. The online approach is found to be obvious in the field of integrated DDoS detection and defense.

  12. Against the Nihilism of Suffering and Death: Richard E. K. Kim and His Works

    Directory of Open Access Journals (Sweden)

    Jooyeon Rhee

    2016-03-01

    Full Text Available This article examines the life and works of Richard E. K. Kim (1932–2009, a first-generation Korean diasporic writer in the United States. It focuses on how Kim struggled to overcome the nihilism of suffering and death that derived from colonialism and the Korean War through his literary works. Kim witnessed firsthand these two major historical events, which caused irrevocable psychological and physical damage to many people of his generation. In his autobiographical fiction, he conveys painful memories of the events by reviving the voices of people in that era. What his works offer us goes beyond vivid memories of the past, however; they also present the power of forgiveness as a condition to overcome the nihilism of suffering and death. Remembrance and forgiveness are, therefore, two major thematic pillars of his works that enable us to connect to these difficult and traumatic times. These themes are portrayed in such a gripping way mainly because Kim tried to maintain a certain distance—an emotional and linguistic distance—from the familiar, in order to elucidate the reality of the human condition: an ontological position of the exile from which he produced his works. This article argues that Kim’s works provide us the possibility to transcend the nihilism of historical trauma through articulating the meaning of remembrance and forgiveness from his self-assumed position of exile.

  13. The reliability of the German version of the Richards Campbell Sleep Questionnaire.

    Science.gov (United States)

    Krotsetis, Susanne; Richards, Kathy C; Behncke, Anja; Köpke, Sascha

    2017-07-01

    The assessment of sleep quality in critically ill patients is a relevant factor of high-quality care. Despite the fact that sleep disturbances and insufficient sleep management contain an increased risk of severe morbidity for these patients, a translated and applicable instrument to evaluate sleep is not available for German-speaking intensive care settings. This study aimed to translate the Richards Campbell Sleep Questionnaire (RCSQ), a simple and validated instrument eligible for measuring sleep quality in critically ill patients, and subsequently to evaluate the internal consistency of the German version of the RCSQ. Furthermore, it also aimed to inquire into the perception of sleep in a sample of critically ill patients. The RCSQ was translated following established methodological standards. Data were collected cross-sectionally in a sample of 51 patients at 3 intensive care units at a university hospital in Germany. The German version of the RCSQ showed an overall internal consistency (Cronbach's alpha) of 0·88. The mean of the RSCQ in the sample was 47·00 (SD ± 27·57). Depth of sleep was rated the lowest and falling asleep again the highest of the RCSQ sleep items. The study demonstrated very good internal consistency of the German version of the RCSQ, allowing for its application in practice and research in German-speaking countries. Quality of sleep perception was generally low in this sample, emphasizing the need for enhanced care concepts regarding the sleep management of critically ill patients. Relevance to clinical practice Assessment of self-perception of sleep is crucial in order to plan an individually tailored care process. © 2017 British Association of Critical Care Nurses.

  14. Richard Doll and Alice Stewart: reputation and the shaping of scientific "truth".

    Science.gov (United States)

    Greene, Gayle

    2011-01-01

    As the world watched the Fukushima reactors release radionuclides into the ocean and atmosphere, the warnings of Dr. Alice Stewart about radiation risk and the reassurances of Sir Richard Doll assumed renewed relevance. Doll and Stewart, pioneer cancer epidemiologists who made major contributions in the 1950s-he by demonstrating the link between lung cancer and smoking, she by discovering that fetal X-rays double the chance of a childhood cancer-were locked into opposition about low-dose radiation risk. When she went public with the discovery that radiation at a fraction of the dose "known" to be dangerous could kill a child, her reputation plummeted, whereas Doll, foremost among her detractors, was knighted and lauded as "the world's most distinguished medical epidemiologist" for his work. Their lives and careers, so closely intertwined, took contrary courses, he becoming "more of the establishment" (as he said), while she became more oppositional. When it was discovered, after his death, that he'd been taking large sums of money from industries whose chemicals he was clearing of cancer risk, his reputation remained unscathed; it is now enshrined in the "Authorized Biography" (2009) commissioned by the Wellcome Institute, along with Doll's denigration of Stewart as an "embittered" woman and biased scientist. Stewart lived long enough to see radiation science move her way, to see international committees affirm, in the 1990s, that there is no threshold beneath which radiation ceases to be dangerous; recent evidence from Chernobyl is bearing out her warnings. But a look at the making and breaking of these reputations reveals the power of status, position, and image to shape scientific "knowledge" and social policy.

  15. The Road Movies' Space Dynamics in the 70s: Richard C. Sarafian, Monte Hellman and Terrence Malick

    Directory of Open Access Journals (Sweden)

    Filipa Rosário

    2014-07-01

    Full Text Available Vanishing Point (Richard C. Sarafian, 1971, Two-lane Blacktop (Monte Hellmann, 1971 and Badlands (Terrence Malick, 1973 are road movies that incorporate distinctive journeys, which, at a certain moment, become similar. Their heroes act as non-mystical pilgrims to whom the trip is a journey in itself, even if they come up as a chase, a car race or an escape from the police.In a filmic genre built from the spatial element, the road life structures each narrative in each film. In this way, the moment when the journey looses its teleological sense acquires even more relevance, allowing us to understand the genre’s space dynamics with a different depth.In this essay, I will analyse comparatively the ways through which characters and directors relate to the scenery/landscape, in order to identify ideological constraints related to space, i.e., those symbolic limitations the road movie seems to conceal. Easy Rider (Dennis Hopper, 1969 will be a constant presence since, as the inaugural road movie, it has determined the genre’s underlying forces.

  16. [Some remarks on the theory of sets by Richard Dedekind and Stanisław Leśniewski].

    Science.gov (United States)

    Obojska, Lidia

    2014-01-01

    Mereology, is a part-whole theory, also called the theory of collective sets. It was founded in 1916 by Stanisław Leśniewski and this is an alternative theory versus the classical set theory by Georg Cantor. These two theories are usually teamed up together as Leśniewski himself was referring to the concept of the set by Cantor and Cantor is considered the "main" ideologist of the set theory. However, when analyzing the original texts of various authors, it seems that the very concept of a collective set is closer to the idea of Richard Dedekind rather than that of Georg Cantor. It is known that Cantor borrowed some concepts on the notion of set from Dedekind, whose ideas were also known to Leśniewski, however, there is no study on this topic. This work is therefore an attempt to compare some set-theoretical concepts of both of these authors, i.e. S. Leśiewski and R. Dedekind and the presentation of their convergence.

  17. Invertendo a “Passagem Atlântica”: O “regresso” de Richard Wright a África

    Directory of Open Access Journals (Sweden)

    Ana Luísa Saraiva

    2012-10-01

    Full Text Available O texto discute o sentido polémico do “regresso” a África que Richard Wright inscreve em Black Power e a forma como a narrativa da viagem subverte a “Middle Passage”. O sujeito narrativo orienta o leitor através de uma incursão pessoal nos muitos sentidos da modernidade e desdobra a noção de “destino comum”, já apontada em 12 Million Black Voices. Contudo, qualquer sentido de comunidade é aqui necessariamente ambíguo, por estar sempre relacionado com questões de raça e identidade. Black Power é uma narrativa importante para o conceito de modernidade e assinala uma mudança significativa na produção literária de Wright para uma vertente não-ficcional. Esta segunda fase da sua obra contém, no entanto, um paradoxo crucial: enquanto se volta para o exterior, para o mundo mais global, Wright tenta, simultaneamente, inscrever-se como referência sobre o locus do qual nunca poderia demarcar‑se: África. Em Black Power, a duboisiana “color line” desdobra‑se em múltiplas dimensões.

  18. Health Effects Due to Radionuclides Content of Solid Minerals within Port of Richards Bay, South Africa

    Directory of Open Access Journals (Sweden)

    Felix B. Masok

    2016-11-01

    Full Text Available This study assessed the radiological health hazards to various body organs of workers working within Transnet Precinct in Richards Bay in Kwazulu-Natal, South Africa due to radionuclide content of mineral ores often stored within the facility. Thirty samples were collected from five mineral ores (rock phosphate, rutile, zircon, coal and hematite and analyzed for 238U, 234U, 226Ra, 210Pb, 235U, 232Th, 228Ra, 228Th and 40K using delayed neutron activation analysis and low energy gamma spectroscopy. Rutile was found to be the most radioactive mineral ore within the facility with 210Pb concentration of 759.00 ± 106.00 Bq·kg−1. Effective annual dose rate in (mSv·y−1 delivered to different organs of the body: testes, bone marrow, whole body, lungs and ovaries from mineral ores were such that dose from mineral ores decreased in the order coal > rutile > rock phosphate > hematite > zircon. The organs with the highest received dose rate were the testes and this received dose was from coal. However, all of the calculated absorbed dose rates to organs of the body were below the maximum permissible safety limits.

  19. Who invented the dichotomous key? Richard Waller's watercolors of the herbs of Britain.

    Science.gov (United States)

    Griffing, Lawrence R

    2011-12-01

    On 27 March 1689, Richard Waller, Fellow and Secretary of the Royal Society presented his "Tables of the English Herbs reduced to such an order, as to find the name of them by their external figures and shapes" to his assembled colleagues at a meeting of the Royal Society. These tables were developed for the novice by being color images, composed in pencil and watercolor, of selected plants and their distinguishing characteristics. The botanical watercolors for the tables are now a Turning-the-Pages document online on the website of the Royal Society. However, for the past 320 years, the scientific context for the creation of these outstanding botanical watercolors has remained obscure. These tables were developed by Waller as an image-based dichotomous key, pre-dating by almost 100 years the text-based dichotomous keys in the first edition of Flora Française (1778) by Jean Baptiste Lamarck, who is generally given priority for the development of the dichotomous key. How these large folio images were arranged to illustrate a dichotomous key is unknown, but an arrangement based on Waller's description is illustrated here as leaf-ordering for the separate hierarchical clusters (tables). Although only 24 species of watercolored dicot herbs out of a total of 65 in the set of watercolors (the others being monocots) are used in these tables, they are a "proof of concept", serving as models upon which a method is based, that of using a key composed of dichotomous choices for aiding identification.

  20. Morrow, Reiff, Receive 2013 Space Physics and Aeronomy Richard Carrington Awards: Response

    Science.gov (United States)

    Reiff, Patricia H.

    2014-08-01

    It is a special privilege to receive this award honoring Richard Carrington's discovery of what we now call space weather. It is particularly appropriate that this award also recognizes Cherilynn Morrow, who 20 years ago made a presentation to the Space Science Advisory Committee on Jeff Rosendhal's idea of mission-based E/PO. We worked together, bringing that idea to the successful, but threatened, network it is today. For me, learning and teaching go hand in hand—as we publish our findings for our peers, we should also repay the public investment in our research with accurate, understandable results. My interest in space science was sparked by a father-daughter course in astronomy sponsored by the Brownies at the Oklahoma City Planetarium and kindled by the Bell Labs production The Strange Case of the Cosmic Rays directed by Frank Capra. Knowing that planetarium shows and educational movies can change lives, I have devoted a large portion of my last 25 years to creating software, shows, and portable planetariums to inspire and engage youth. This has not been a one-person effort, of course. My work Cherilynn Ann Morrow would have been impossible without the collaboration of Carolyn Sumners, vice president of the Houston Museum of Natural Science. Our museum kiosk and planetarium control software would not have happened without the skill and perseverance of my chief programmer, Colin Law. Jim Burch has been first a mentor and then a colleague on both the research and outreach sides of my career. I share this honor with a long line of highly talented students and postdocs who have contributed science content and outreach efforts. Most importantly, without the support of my husband, Tom Hill, I would not have had the time and freedom to build an educational network while continuing research and raising a family. I thank AGU for bestowing this honor.

  1. Timothy Leary, Richard Alpert (Ram Dass) and the changing definition of psilocybin.

    Science.gov (United States)

    Wark, Colin; Galliher, John F

    2010-05-01

    This research focuses on the events leading to the 1968 U.S. federal prohibition of psilocybin. It is a study of duelling moral entrepreneurs-Timothy Leary and Richard Alpert vs. the Harvard University Administration. The goal is to show how the primary active compound in an ostensibly harmless fungus (the psilocybin mushroom) became controversial in less than a decade. We used books, newspapers, magazine articles and previously unpublished materials (including documents from the Harvard Archives) to analyze Leary and Alpert's lives and careers through the early 1970s. The prohibition of psilocybin in the U.S. was largely a product of Leary and Alpert's involvement in the "Harvard drug scandal" and their transformation from Harvard professors to countercultural icons. They tested the substance on a variety of human subjects and in doing so piqued the interest of Harvard undergraduates while drawing condemnation from other faculty and Harvard administrators. This case is theoretically interesting because unlike most illegal drugs, psilocybin was never linked to a threatening minority group, but to some of the nation's most privileged youth. The Harvard administrators were not really moral entrepreneurs but Leary and Alpert clearly were. Although they were far from being prohibitionists, they were self-righteous crusaders on different but equally holy missions for the good of young and minority Americans. Ironically, due to their successes the possession of psilocybin was criminalized under United States federal law in 1968 (Pub. L. No. 90-639, Stat. 1361 1968 and Boire, 2002). This case study demonstrates that crusaders can be successful in changing culture even when laws are passed in futile attempts to control their behaviour, just as Leary predicted. Copyright 2009 Elsevier B.V. All rights reserved.

  2. Perbandingan antara Etika Jürgen Habermas dan Richard Rorty sebagai Prinsip Dasar Bertindak Manusia

    Directory of Open Access Journals (Sweden)

    Dominique Rio Adiwijaya

    2010-10-01

    Full Text Available Ethics without doubt is an issue in every scientific field. Questions on ethics are not merely questions on the responsibility of one or two specific individuals, but rather as what have been defined accurately by Immanuel Kant in Critique of Practical Reason – as question of all humanity as a thinking creature and the freedom of choice on, “what should I do”. From Kant’s definition, we may infer that if human can not think and not free in determining their choice, it would be almost impossible to hope for moral responsibility. However this article does not mean to give a full and historical description on ethics, but a sketch on discourse of contemporary ethics which is represented by two famous philosophers, Jürgen Habermas from the tradition of  Critical Theory from Frankfurt School, dan Richard Rorty with “Neo-Pragmatism”. Habermas proposes “discourse ethics” while Rorty proposes ethic concepts through his “liberal-ironists”. It is hoped that the assembly of readers may gain an insight of the unavoidable ethics problems since every ethical position must be theory laden and the theory itself has historical characteristics (the characteristics, origin and historical context of the schools behind it. Therefore ethics is a neverending reflection although it has been started from 2500 years ago. Ethics invites us from specific sciences to enter its general discourse which unavoidably all-encompassing in its nature. 

  3. Geometrically induced surface polaritons in planar nanostructured metallic cavities

    Energy Technology Data Exchange (ETDEWEB)

    Davids, P. S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Intravia, F [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Dalvit, Diego A. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-01-14

    We examine the modal structure and dispersion of periodically nanostructured planar metallic cavities within the scattering matrix formulation. By nanostructuring a metallic grating in a planar cavity, artificial surface excitations or spoof plasmon modes are induced with dispersion determined by the periodicity and geometric characteristics of the grating. These spoof surface plasmon modes are shown to give rise to new cavity polaritonic modes at short mirror separations that modify the density of modes in nanostructured cavities. The increased modal density of states form cavity polarirons have a large impact on the fluctuation induced electromagnetic forces and enhanced hear transfer at short separations.

  4. ‘The Edification of the Church’: Richard Hooker’s Theology of Worship and the Protestant Inward / Outward Disjunction

    Directory of Open Access Journals (Sweden)

    Littlejohn W. Bradford

    2014-06-01

    Full Text Available Sixteenth-century English Protestants struggled with the legacy left them by the Lutheran reformation: a strict disjunction between inward and outward that hindered the development of a robust theology of worship. For Luther, outward forms of worship had more to do with the edification of the neighbour than they did with pleasing God. But what exactly did ‘edification’ mean? On the one hand, English Protestants sought to avoid the Roman Catholic view that certain elements of worship held an intrinsic spiritual value; on the other hand, many did not want to imply that forms of worship were spiritually arbitrary and had a merely civil value. Richard Hooker developed his theology of worship in response to this challenge, seeking to maintain a clear distinction between the inward worship of the heart and the outward forms of public worship, while refusing to disassociate the two. The result was a concept of edification which sought to do justice to both civil and spiritual concerns, without, pace Peter Lake and other scholars, conceding an inch to a Catholic theology of worship

  5. Blood, politics, and social science. Richard Titmuss and the Institute of Economic Affairs, 1957-1973.

    Science.gov (United States)

    Fontaine, Philippe

    2002-09-01

    Long before his last book, The Gift Relationship: From Human Blood to Social Policy, was published in early 1971, Richard M. Titmuss (1907-1973), a professor of social administration at the London School of Economics, had been a major figure in the debates over the welfare state. The Gift Relationship was the culmination of an eventful relationship with the Institute of Economic Affairs, a think tank that advocated the extension of rational pricing to social services. By arguing that the British system of blood procurement and distribution, based on free giving within the National Health Service, was more efficient than the partly commercialized American system, Titmuss intended to signal the dangers of the increasing commercialization of society. What made for the impact of his book, however, was not merely its argument that transfusion-transmitted infections were much more common with paid than with voluntary donors, but also its reflections on what it is that holds a society together. And here Titmuss argued that a "socialist" social policy, by encouraging the sense of community, played a central role. The eclecticism of Titmuss's work, together with its strong ethical and political flavor, makes it a rich and original account of the "social" at a time when heated debated over social policy, both in Britain and in the United States, raised the question of the division of labor among the social sciences.

  6. Review of Richard Parra, «La tiranía del Inca. El Inca Garcilaso y la escritura política en el Perú colonial (1568-1617», Lima, Ediciones Copé, 2015, 508 pp., ISBN 978-6124-20-221-6

    Directory of Open Access Journals (Sweden)

    Germán Adolfo Morong Reyes

    2016-05-01

    Full Text Available Review of Richard Parra, «La tiranía del Inca. El Inca Garcilaso y la escritura política en el Perú colonial (1568-1617», Lima, Ediciones Copé, 2015, 508 pp., ISBN 978-6124-20-221-6

  7. An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2017-01-01

    Full Text Available The Neighbor Discovery Protocol (NDP is one of the main protocols in the Internet Protocol version 6 (IPv6 suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN, such as address autoconfiguration and address resolution. However, it has many vulnerabilities that can be used by malicious nodes to launch attacks, because the NDP messages are easily spoofed without protection. Surrounding this problem, many solutions have been proposed for securing NDP, but these solutions either proposed new protocols that need to be supported by all nodes or built mechanisms that require the cooperation of all nodes, which is inevitable in the traditional distributed networks. Nevertheless, Software-Defined Networking (SDN provides a new perspective to think about protecting NDP. In this paper, we proposed an SDN-based authentication mechanism to verify the identity of NDP packets transmitted in a LAN. Using the centralized control and programmability of SDN, it can effectively prevent the spoofing attacks and other derived attacks based on spoofing. In addition, this mechanism needs no additional protocol supporting or configuration at hosts and routers and does not introduce any dedicated devices.

  8. Towards effective and robust list-based packet filter for signature-based network intrusion detection: an engineering approach

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Kwok, Lam For

    2017-01-01

    Network intrusion detection systems (NIDSs) which aim to identify various attacks, have become an essential part of current security infrastructure. In particular, signature-based NIDSs are being widely implemented in industry due to their low rate of false alarms. However, the signature matching...... this problem, packet filtration is a promising solution to reduce unwanted traffic. Motivated by this, in this work, a list-based packet filter was designed and an engineering method of combining both blacklist and whitelist techniques was introduced. To further secure such filters against IP spoofing attacks...... in traffic filtration as well as workload reduction, and is robust against IP spoofing attacks....

  9. An analytical solution of Richards' equation providing the physical basis of SCS curve number method and its proportionality relationship

    Science.gov (United States)

    Hooshyar, Milad; Wang, Dingbao

    2016-08-01

    The empirical proportionality relationship, which indicates that the ratio of cumulative surface runoff and infiltration to their corresponding potentials are equal, is the basis of the extensively used Soil Conservation Service Curve Number (SCS-CN) method. The objective of this paper is to provide the physical basis of the SCS-CN method and its proportionality hypothesis from the infiltration excess runoff generation perspective. To achieve this purpose, an analytical solution of Richards' equation is derived for ponded infiltration in shallow water table environment under the following boundary conditions: (1) the soil is saturated at the land surface; and (2) there is a no-flux boundary which moves downward. The solution is established based on the assumptions of negligible gravitational effect, constant soil water diffusivity, and hydrostatic soil moisture profile between the no-flux boundary and water table. Based on the derived analytical solution, the proportionality hypothesis is a reasonable approximation for rainfall partitioning at the early stage of ponded infiltration in areas with a shallow water table for coarse textured soils.

  10. Entre el dios de Paley y el dios de Bonnet - El parco evolucionismo teísta de Richard Owen

    Directory of Open Access Journals (Sweden)

    Gustavo Caponi

    2013-04-01

    Full Text Available http://dx.doi.org/10.5007/1808-1711.2013v17n1p71 En primer lugar, en este artículo se examina el carácter de las putativas referencias a la evolución de las especies que encontramos en las obras que Richard Owen publicó antes de 1858; y luego se analizan las escazas y vagas conjeturas evolucionistas que Owen sin duda formuló con posterioridad a la presentación pública de la Teoría de la Selección Natural.  En lo que respecta a lo primero, el objetivo es subrayar la ambigüedad de esas referencias de Owen; y en lo que respecta a lo segundo lo que interesa es mostrar que, a la hora de explicitar sus tesis evolucionistas, Owen no fue más allá de un pío evolucionismo teísta que, sin postular ningún mecanismo del cambio evolutivo, permanecía fiel a la Teología del diseño preconizada por Paley.

  11. First record of the Asian diaptomid Neodiaptomus schmackeri (Poppe & Richard, 1892 (Crustacea: Copepoda: Calanoida in Europe

    Directory of Open Access Journals (Sweden)

    Giuseppe Alfonso

    2014-06-01

    Full Text Available Albania, as well as a great part of the Balkan area in general, still suffers a lack of environmental studies especially in limnological research. The Dumre plateau, in Central Albania, is characterized by an extraordinary high number of karst lakes in a small geographic area. Despite their environmental peculiarity, very few biological data are to date available for these lakes, none on the zooplankton. For this reason, 15 water bodies located in the central area of the plateau were selected for a preliminary limnological survey carried out in the years 2008-2011. Neodiaptomus schmackeri (Poppe & Richard, 1892, a diaptomid calanoid copepod characterized by a South-Eastern Palearctic - Oriental distribution, and the most widely spread Neodiaptomus species in Asia, was found in 8 lakes of the Dumre area. This finding represents the first record of the species, and of the entire genus Neodiaptomus, for Europe. Several environmental variables were measured to characterize the lakes, and the co-occurring planktonic crustaceans were also identified. Taxonomical drawings and descriptions of the main morphological features of both sexes are herein provided in order to compare the Albanian populations of N. schmackeri with those of the native distribution area of the species. The possible causes which determined the occurrence of this non-indigenous species in several Dumre lakes are discussed.

  12. An Enlightenment proposal for music therapy: Richard Brocklesby on music, spirit, and the passions.

    Science.gov (United States)

    Gouk, Penelope

    2015-01-01

    In 1749, the London physician Richard Brocklesby (1722-1797) published his Reflections on Antient [sic] and Modern Musick, an essay that not only sought to compare these practices in terms of their effects, but also to gather evidence supporting the use of music in treating mania and other mental diseases. As might be expected, Brocklesby's discussion of music therapy has already received attention by authors looking back to the origins of this practice, not least because he offers an account of a successful musical cure that took place in his own time (Rorke, 2001). My chapter, however, seeks to broaden the discussion of the Reflections, in order to show how Brocklesby's projected musical cures fit into his larger worldview, one that was influenced as much by Plato and other ancient philosophers as it was by modern thinkers such as Isaac Newton and his followers. Brocklesby's argument was essentially that music acted as a link between the mind and body and therefore could restore their intrinsic harmony, a connection that was mediated by the animal spirits, which also served as the vehicle of the passions. The movements and proportions of music could arouse or quell the passions by their effect on these (imaginary) spirits, which flowed through the nerves and brain and acted as the agent for the mind or soul. I show how his account of music in antiquity led him to reflect on the way that music was perceived and responded to in his own time, both as a stimulus to mental and bodily action, and as a source of esthetic pleasure through the cultivation of musical taste. © 2015 Elsevier B.V. All rights reserved.

  13. Exact and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model with bounded acceleration for a class of fundamental diagrams

    KAUST Repository

    Qiu, Shanwen

    2013-09-01

    In this article, we propose a new exact and grid-free numerical scheme for computing solutions associated with an hybrid traffic flow model based on the Lighthill-Whitham-Richards (LWR) partial differential equation, for a class of fundamental diagrams. In this hybrid flow model, the vehicles satisfy the LWR equation whenever possible, and have a constant acceleration otherwise. We first propose a mathematical definition of the solution as a minimization problem. We use this formulation to build a grid-free solution method for this model based on the minimization of component function. We then derive these component functions analytically for triangular fundamental diagrams, which are commonly used to model traffic flow. We also show that the proposed computational method can handle fixed or moving bottlenecks. A toolbox implementation of the resulting algorithm is briefly discussed, and posted at https://dl.dropbox.com/u/1318701/Toolbox.zip. © 2013 Elsevier Ltd.

  14. Three-dimensional imaging of artificial fingerprint by optical coherence tomography

    Science.gov (United States)

    Larin, Kirill V.; Cheng, Yezeng

    2008-03-01

    Fingerprint recognition is one of the popular used methods of biometrics. However, due to the surface topography limitation, fingerprint recognition scanners are easily been spoofed, e.g. using artificial fingerprint dummies. Thus, biometric fingerprint identification devices need to be more accurate and secure to deal with different fraudulent methods including dummy fingerprints. Previously, we demonstrated that Optical Coherence Tomography (OCT) images revealed the presence of the artificial fingerprints (made from different household materials, such as cement and liquid silicone rubber) at all times, while the artificial fingerprints easily spoofed the commercial fingerprint reader. Also we demonstrated that an analysis of the autocorrelation of the OCT images could be used in automatic recognition systems. Here, we exploited the three-dimensional (3D) imaging of the artificial fingerprint by OCT to generate vivid 3D image for both the artificial fingerprint layer and the real fingerprint layer beneath. With the reconstructed 3D image, it could not only point out whether there exists an artificial material, which is intended to spoof the scanner, above the real finger, but also could provide the hacker's fingerprint. The results of these studies suggested that Optical Coherence Tomography could be a powerful real-time noninvasive method for accurate identification of artificial fingerprints real fingerprints as well.

  15. The rudiments of an Internet-based health plan for consumers: an interview with John Danaher, MD, MBA. Interview by Richard L. Reece.

    Science.gov (United States)

    Danaher, J

    2000-01-01

    Richard L. Reece, MD, interviewed John Danaher, MD, MBA, on August 16, 2000, to discuss how his new company is preparing for the perfect storm--the looming convergence of demanding consumers, defined contributions, and Internet-based health plans. He describes how his firm is putting financial and clinical tools in the hands of consumers and physicians, so consumers can be more enlightened in their health care choices. Danaher says, "We're not about buying goods and services online. We are transforming the way consumers buy health care and seek insurance. We're trying to be a 401 k where people get on, knowing their risk profile and return horizons. We aim to motivate consumers to be proactive in making health care choices. How do we make consumers responsible and motivated enough to take control of managing their health care costs? How well we articulate this call to consumer action will be the key to our success."

  16. An Exact and Grid-free Numerical Scheme for the Hybrid Two Phase Traffic Flow Model Based on the Lighthill-Whitham-Richards Model with Bounded Acceleration

    KAUST Repository

    Qiu, Shanwen

    2012-07-01

    In this article, we propose a new grid-free and exact solution method for computing solutions associated with an hybrid traffic flow model based on the Lighthill- Whitham-Richards (LWR) partial differential equation. In this hybrid flow model, the vehicles satisfy the LWR equation whenever possible, and have a fixed acceleration otherwise. We first present a grid-free solution method for the LWR equation based on the minimization of component functions. We then show that this solution method can be extended to compute the solutions to the hybrid model by proper modification of the component functions, for any concave fundamental diagram. We derive these functions analytically for the specific case of a triangular fundamental diagram. We also show that the proposed computational method can handle fixed or moving bottlenecks.

  17. First Responders Guide to Computer Forensics: Advanced Topics

    National Research Council Canada - National Science Library

    Nolan, Richard; Baker, Marie; Branson, Jake; Hammerstein, Josh; Rush, Kris; Waits, Cal; Schweinsberg, Elizabeth

    2005-01-01

    ... on more advanced technical operations like process characterization and spoofed email. It is designed for experienced security and network professionals who already have a fundamental understanding of forensic methodology...

  18. Da Chrétien de Troyes a Shakespeare («The tragedy of King Richard the Third», a. I, sc. 2

    Directory of Open Access Journals (Sweden)

    Alfonso D'Agostino

    2015-07-01

    Full Text Available L’articolo si propone di considerare le somiglianze fra alcune vicende antico-francesi (l’Yvain di Chrétien de Troyes e il fabliau anonimo De celle que se fist foutre sur la fosse son mari con una scena del Riccardo III di Shakespeare. Anche se non si può dire che il dramma inglese dipenda dai testi narrativi oitanici, esso sviluppa lo stesso motivo della vedova consolata e una serie di motivi secondarî, di immagini (il sangue, il diavolo, la seduzione e di espressioni letterarie in modo sintomaticamente affine. The paper aims to evaluate similarities between some Old-French narratives (Chrétien de Troyes’ Yvain and the anonymous fabliau De celle que se fist foutre sur la fosse son mari and a scene from Shakespeare’s Richard III. Although we cannot affirm that Shakespeare’s play derives from the French narratives, it develops the same theme of “comforted widow” along with a series of secondary themes, of images (the blood, the devil, the seduction and literary expressions in a symptomatically, very similar way.

  19. Face Liveness Detection Using a Light Field Camera

    Directory of Open Access Journals (Sweden)

    Sooyeon Kim

    2014-11-01

    Full Text Available A light field camera is a sensor that can record the directions as well as the colors of incident rays. This camera is widely utilized from 3D reconstruction to face and iris recognition. In this paper, we suggest a novel approach for defending spoofing face attacks, like printed 2D facial photos (hereinafter 2D photos and HD tablet images, using the light field camera. By viewing the raw light field photograph from a different standpoint, we extract two special features which cannot be obtained from the conventional camera. To verify the performance, we compose light field photograph databases and conduct experiments. Our proposed method achieves at least 94.78% accuracy or up to 99.36% accuracy under different types of spoofing attacks.

  20. UNA NUEVA ALTERNATIVA NUMÉRICA PARA LA SOLUCIÓN DE LA ECUACIÓN UNIDIMENSIONAL DE RICHARDS: ESTUDIO DE DRENAJE E INFILTRACIÓN DE FLUIDOS EN LA ZONA NO SATURADA

    Directory of Open Access Journals (Sweden)

    Evelyn Álvarez Sierra

    2016-10-01

    Full Text Available En el trabajo se comparan dos métodos numéricos para resolver el modelo unidimensional de infiltración y drenaje de agua en la zona no saturada en medios porosos, el cual es modelado respecto al contenido de humedad utilizando la ecuación no-lineal de Richards. El primer método está basado en el método clásico de Diferencias Finitas y el segundo en el método de Líneas combinado con el código DASSL para la solución de las ecuaciones diferenciales-algebraicas resultantes. Se muestra que el último método proporciona una vía numérica eficiente para la solución de problemas de EDPs que tienen un comportamiento singular de shock u ondas viajeras, como es el caso de la ecuación de Richard, los cuales se pueden resolver numéricamente con éxito sólo utilizando esquemas muy estables. Los métodos numéricos discutidos en el trabajo se aplican a dos tipos de suelos reales: Yolo Light Clay y Brindabella Silty Clay Loam, usando las propiedades hidráulicas referidas en Broadbridge y White [16]. Para validar el modelo, se comparan los perfiles de humedad con los resultados reportados por Warrick, Lomen e Islas [18].Igualmente, se demuestra con datos reales la ventaja de resolver numéricamente el comportamiento del flujo unidimensional en la zona no saturada de un medio poroso. Finalmente, el modelo propuesto y los resultados numéricos obtenidos posibilitan brindar un pronóstico sobre la utilización de recursos hídricos para el caso de riego en agricultura y también para el transporte de contaminantes.

  1. Improving Speaker Verification Performance in Presence of Spoofing Attacks Using Out-of-Domain Spoofed Data

    DEFF Research Database (Denmark)

    Sarkar, Achintya Kumar; Sahidullah, Md; Tan, Zheng-Hua

    2017-01-01

    of the two systems is challenging and often leads to increased false rejection rates. Furthermore, the performance of CM severely degrades if in-domain development data are unavailable. In this study, therefore, we propose a solution that uses two separate background models – one from human speech...

  2. Visiting Richard Serra’s Promenade sculpture improves postural control and judgment of subjective visual vertical.

    Directory of Open Access Journals (Sweden)

    Zoï eKapoula

    2014-12-01

    Full Text Available Body sway while maintaining an upright quiet stance reflects an active process of balance based on the integration of visual, vestibular, somatosensory and proprioceptive inputs. Richard Serra’s Promenade sculpture featured in the 2008 Monumenta exhibition at the Grand Palais in Paris, France is herein hypothesised to have stimulated the body’s vertical and longitudinal axes as it showcased 5 monumental rectangular solids pitched at a 1.69° angle.Using computerised dynamic posturography we measured the body sway of 23 visitors when fixating a cross, or when observing the artwork (fixating it or actively exploring it with eye movements before and after walking around and alongside the sculpture (i.e., before and after a promenade. A first fixation at the sculpture increased medio-lateral stability (in terms of spectral power of body sway. Eye movement exploration in the depth of the sculpture increased antero-posterior stability (in terms of spectral power and cancelling time of body sway at the expense of medio-lateral stability (in terms of cancelling time. Moreover, a medio-lateral instability associated with eye movement exploration before the promenade (in terms of body sway sensu stricto was cancelled after the promenade. Finally, the overall medio-lateral stability (in terms of spectral power increased after the promenade.Fourteen additional visitors were asked to sit in a dark room and adjust a luminous line to what they considered to be the earth-vertical axis. The promenade executed within the sculpted environment afforded by Serra’s monumental statuary works resulted in significantly improved performances on the subjective visual vertical test.We attribute these effects to the sculpted environment provided by the exhibition which may have acted as a kind of physiologic training ground thereby improving the visitors’ overall sense of visual perspective, equilibrium and gravity.

  3. Sadhana | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Network security; DHCP security; ARP security; ARP spoofing; DHCP starvation; ... This work introduces a new solution to secure ARP and DHCP for preventing and ... Faculty of Computers and Information Technology, University of Tabuk, ...

  4. Web Of Deception: Misinformation On The Internet | Chete ...

    African Journals Online (AJOL)

    Web Of Deception: Misinformation On The Internet. ... Parodies/spoofs, malicious misinformation, promotion of false products on commercial sites, ... greatly reduced since most people do not believe every information they read on the internet, ...

  5. An experimental 'Life' for an experimental life: Richard Waller's biography of Robert Hooke (1705).

    Science.gov (United States)

    Moxham, Noah

    2016-03-01

    Richard Waller's 'Life of Dr Robert Hooke', prefixed to his edition of Hooke's Posthumous Works (1705), is an important source for the life of one of the most eminent members of the early Royal Society. It also has the distinction of being one of the earliest biographies of a man of science to be published in English. I argue that it is in fact the first biography to embrace the subject's natural-philosophical work as the centre of his life, and I investigate Waller's reasons for adopting this strategy and his struggle with the problem of how to represent an early experimental philosopher in print. I suggest that Waller eschews the 'Christian philosopher' tradition of contemporary biography - partly because of the unusually diverse and fragmentary nature of Hooke's intellectual output - and draws instead upon the structure of the Royal Society's archive as a means of organizing and understanding Hooke's life. The most quoted phrase from Waller's biography is that Hooke became 'to a crime close and reserved' in later life; this essay argues that Waller's biographical sketch was fashioned in order to undo the effects of that reserve. In modelling his approach very closely on the structure of the society's records he was principally concerned with making Hooke's work and biography accessible, intelligible and useful to the fellowship in a context familiar to them, a context which had provided the institutional framework for most of Hooke's adult life. I argue that Waller's 'Life' was also intended to make the largest claims for Hooke's intellectual standing that the author dared in the context of the enmity between Hooke and Isaac Newton once the latter became president of the Royal Society. However, I also adduce fresh manuscript evidence that Waller actually compiled, but did not publish, a defence of Hooke's claim to have discovered the inverse square law of gravity, allowing us to glimpse a much more assertive biography of Hooke than the published version.

  6. Hacked E-mail

    Science.gov (United States)

    ... your email address was “spoofed,” or faked, and hackers don’t actually have access to your account. ... use public Wi-Fi .) Tagged with: antivirus , email , hacker , imposter , password , phishing , scam , social networking July 2013 ...

  7. En torno al arte europeo de la segunda mitad del siglo XIX. Aspectos de las relaciones forma–contenido o forma–función en la obra de Lawrence Alma–Tadema, Gottfried Semper y Richard Wagner

    OpenAIRE

    Moreno Dopazo, Ángel

    2011-01-01

    El trabajo se plantea como una reflexión sobre la dificultad actual para apreciar los valores, a menudo denostados, de los ya supuestamente lejanos arte y cultura del siglo XIX. De aquel rico mundo de referentes y asociaciones se destacan aquí las figuras del pintor realista Alma-Tadema, los arquitectos del Ring de Viena, con Semper como singular protagonista, y el músico Richard Wagner. Junto al análisis del complejo universo pictórico del artista holandés afincado en Inglaterra se presenta ...

  8. Research Article Special Issue

    African Journals Online (AJOL)

    pc

    2018-05-01

    May 1, 2018 ... the control center to optimize the power distribution in return. The increasing ... electric smart meter to record reading of electricity consumption from utility meters ... spoofing, tampering and Denial of Service (DoS) attacks [26].

  9. Will the real Robert Neville please, come out? Vampirism, the ethics of queer monstrosity, and capitalism in Richard Matheson's I am legend?

    Science.gov (United States)

    Khader, Jamil

    2013-01-01

    In this article, I argue that Richard Matheson's (1954) vampire novella, I Am Legend, encodes the protagonist's, Robert Neville, traumatic recognition of his queer sexuality in its monstrosity (the unspeakability of male penetrability). Neville's identification with and desire for his undead neighbor, Ben Cortman, are symbolically codified through three different registers: intertextual references to vampiric conventions and codes, the semiotics of queer subculture, and a structure of doubling that links Neville to the queer vampire. Although Neville avoids encountering his unspeakable queer desire, which could be represented only at the level of the Lacanian Real, he must still confront Cortman's obsessive exhortations for him to come out. Only when he symbolically codifies his abnormality in its own monstrosity, by viewing himself through mutant vampires' eyes, can Neville reconfigure the ethical relationship between self and other, humans and mutant humans-vampires. However progressive Matheson's novella is in its advocacy of minority sexual rights, it still renders capitalism's problematic relationship with queer subjectivity invisible. Although capitalism overdetermines every aspect of the social field and makes Neville's daily life possible in its surplus enjoyment, the fundamental antagonism (class struggle) in capitalism is obscured by the assertion of identity politics.

  10. Evaluation of the Ross fast solution of Richards' equation in unfavourable conditions for standard finite element methods

    International Nuclear Information System (INIS)

    Crevoisier, D.; Voltz, M.; Chanzy, A.

    2009-01-01

    Ross [Ross PJ. Modeling soil water and solute transport - fast, simplified numerical solutions. Agron J 2003;95:1352-61] developed a fast, simplified method for solving Richards' equation. This non-iterative 1D approach, using Brooks and Corey [Brooks RH, Corey AT. Hydraulic properties of porous media. Hydrol. papers, Colorado St. Univ., Fort Collins: 1964] hydraulic functions, allows a significant reduction in computing time while maintaining the accuracy of the results. The first aim of this work is to confirm these results in a more extensive set of problems, including those that would lead to serious numerical difficulties for the standard numerical method. The second aim is to validate a generalisation of the Ross method to other mathematical representations of hydraulic functions. The Ross method is compared with the standard finite element model, Hydrus-1D [Simunek J, Sejna M, Van Genuchten MTh. The HYDRUS-1D and HYDRUS-2D codes for estimating unsaturated soil hydraulic and solutes transport parameters. Agron Abstr 357; 1999]. Computing time, accuracy of results and robustness of numerical schemes are monitored in 1D simulations involving different types of homogeneous soils, grids and hydrological conditions. The Ross method associated with modified Van Genuchten hydraulic functions [Vogel T, Cislerova M. On the reliability of unsaturated hydraulic conductivity calculated from the moisture retention curve. Transport Porous Media 1988:3:1-15] proves in every tested scenario to be more robust numerically, and the compromise of computing time/accuracy is seen to be particularly improved on coarse grids. Ross method run from 1.25 to 14 times faster than Hydrus-1D. (authors)

  11. O diálogo da tradição e da renovação sobre a montagem de Tristão e Isolda de Richard Wagner por Peter Konwitschny

    Directory of Open Access Journals (Sweden)

    Alexandre Sobreira Martins

    2006-12-01

    Full Text Available A presente comunicação busca fazer uma leitura da montagem de Peter Konwitschny do drama musical Tristan und Isolde, do compositor alemão Richard Wagner encenada no Teatro Nacional de Munique durante o Festival de Ópera de Munique de 1998, considerando-o como uma revisão pós-moderna que busca romper com a tradição de encenações wagnerianas, trazendo o conteúdo do drama de Wagner para nosso contexto atual; essa leitura será feita à luz das propostas de Christopher Innes e Artaud sobre a representação teatral e as leituras de Homi Bhabha e Michel Foucault sobre a pós-modernidade.

  12. Funding Student Scholarships to the Richard Tapia Celebration of Diversity in Computing Conference 2013, February 7-10, 2013

    Energy Technology Data Exchange (ETDEWEB)

    Tapia, Richard

    2013-02-07

    This Basic Award allowed for the funding of student scholarships to the Richard Tapia Celebration of Diversity in Computing Conference which took place in Washington, D.C. from February 7-10, 2013. The conference was the seventh in a series and included a stellar array of invited speakers, compelling panel discussions, a student poster competition, a daylong Doctoral Consortium, a session featuring a choice of attractions unique to Washington, D.C., a gala banquet and dance, and many exciting networking opportunities. The conference created a welcoming environment for STEM students, especially underrepresented minority and female students, who were provided the highest quality of learning, networking, and social experiences to empower their educational experience and enhance their ability to succeed with a rigorous STEM degree. The networking and mentoring opportunities available at the conference were also designed to empower students to succeed in STEM careers and ultimately serve in leadership in industry and the professoriate. A key step in attracting underrepresented students into STEM fields and paving the way for their success in influential positions is to create a nurturing and supportive network and community for them to rely upon. It is also critical to educate leaders in corporations, government and academia about the benefits to be gained from increasing the percentage of STEM professionals from underrepresented groups. To this end, The Tapia Conference serves both functions, as it connects STEM students with STEM professionals, leaders, and academics who share the vision of a STEM workforce and community that is truly representative of the community in which we live.

  13. ‘By Force of Participation and Conjunction in Him’: John Jewel and Richard Hooker on Union with Christ

    Directory of Open Access Journals (Sweden)

    Gazal André A.

    2014-06-01

    Full Text Available The author of a Christian Letter cited a passage from John Jewel’s A Reply to Harding’s Answer in which the first major apologist of the Elizabethan Settlement spoke of the role of faith and the sacraments in union with Christ. Andrew Willet, the likely author of this work, quoted it against Richard Hooker in order to show how the latter contravened the sacramental theology of the national Church as interpreted by Jewel as one of the foremost expositors of its doctrine. Jewel, however, in his Reply to Harding’s Answer, enumerates four means of the Christian’s union with Christ: the Incarnation, faith, baptism, and the Eucharist-a fact overlooked in A Christian Letter by its author in his endeavor to impeach Hooker’s orthodoxy. Proceeding from the observation that both Jewel and Hooker believed that the locus of Christian salvation is union with Christ, this essay compares the two divines’ respective views of this union by examining the manner in which they understand the role of each of these means forming and maintaining this union. On the basis of this comparison, the essay argues that A Christian Letter misrepresented Jewel’s position and that Hooker’s view of union with Christ was essentially the same as the late bishop of Salisbury’s, notwithstanding some differences in detail and emphases. The article concludes with the opinion that Hooker represents continuity of a particular soteriological emphasis in the Elizabethan Church that can possibly be traced back to Jewel as a representative of the Reformed tradition stressing this doctrine.

  14. Richard Watson.

    Science.gov (United States)

    Wright, Ian; Bevin, William

    2017-11-25

    An inspirational equine veterinary surgeon with a keen interest in racing, to whom horses were a way of life. He took much pride in the success of his homebred racehorses. British Veterinary Association.

  15. Richard Rorty

    DEFF Research Database (Denmark)

    Hjermitslev, Hans Henrik

    2016-01-01

    dekonstruktion forlod han Princeton og blev han i 1982 udnævnt til professor i humaniora ved University of Virginia. Her skrev han i 1989 sit andet hovedværk Contingency, Irony, and Solidarity, der med originale læsninger af Heidegger, Derrida, Orwell, Nabokov, Freud og andre blev modtaget med stor interesse...

  16. Imitating Jesus, yes – but which Jesus? A critical engagement with the ethics of Richard Burridge in Imitating Jesus: An inclusive approach to New Testament ethics (2007

    Directory of Open Access Journals (Sweden)

    Jonathan A. Draper

    2009-08-01

    Full Text Available This paper examines the attempt by Richard Burridge in his recent book, Imitating Jesus: An inclusive approach to New Testament ethics (2007, to build an engaged Christian ethics starting with the historical Jesus but taking full account of the insights into the perspectives of the four gospels in their own right, based on their genre as Greek bioi. While Burridge’s approach is applauded and regarded as a major step forward, it is critiqued here on his selectivity in his presentation of the results of two decades of research into the Jesus of history. Burridge’s selection of the South African experience in the struggle against apartheid as his ‘test case’ is also questioned, since the issues in such struggles for justice appear more straightforward to outsiders than they do to insiders and his analysis raises more questions than it answers.

  17. Statistical Models for Predicting Threat Detection From Human Behavior

    Science.gov (United States)

    Kelley, Timothy; Amon, Mary J.; Bertenthal, Bennett I.

    2018-01-01

    Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure “non-spoof” or insecure “spoof” versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to “login” to or “back” out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing

  18. Statistical Models for Predicting Threat Detection From Human Behavior

    Directory of Open Access Journals (Sweden)

    Timothy Kelley

    2018-04-01

    Full Text Available Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure “non-spoof” or insecure “spoof” versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption. Spoof websites had modified Uniform Resource Locator (URL and authentication level. Participants chose to “login” to or “back” out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level, survey-based (i.e., security knowledge and website familiarity, and real-time measures (i.e., mouse tracking in predicting risky online behavior

  19. Generating and analyzing synthetic finger vein images

    NARCIS (Netherlands)

    Hillerström, Fieke; Kumar, Ajay; Veldhuis, Raymond N.J.

    2014-01-01

    Abstract: The finger-vein biometric offers higher degree of security, personal privacy and strong anti-spoofing capabilities than most other biometric modalities employed today. Emerging privacy concerns with the database acquisition and lack of availability of large scale finger-vein database have

  20. GABUNGAN ALGORITMA VERNAM CHIPER DAN END OF FILE UNTUK KEAMANAN DATA

    Directory of Open Access Journals (Sweden)

    Christy Atika Sari

    2014-10-01

    Full Text Available Adanya kesamaan fungsi pada  metode Kriptografi dan Steganografi untuk mengamankan data, maka makalah ini menggunakan algoritma Vernam Cipher sebagai salah satu algoritma yang popular pada Kriptografi dan End Of File (EOF pada metode Steganografi. Vernam Cipher mempunyai kemampuan untuk menyembunyikan data karena proses enkripsi dan dekripsi menggunakan sebuah kunci yang sama. Kunci ini berasal dari perhitungan XOR anatar bit plainteks dengan bit kunci. Sedangkan EOF dikenal sebagai pengembangan dari metode Least Significant Bit (LSB. EOF dapat digunakan untuk menyisipkan data yang ukurannya sesuai dengan kebutuhan. Pada penelitian ini digunakan file asli berformat .mp3 dan file spoofing berformat .pdf. file hasil stegano berhasil di ekstraksi menjadi file asli dan file spoofing. Ukuran file yang telah melalui proses penyisipan sama dengan ukuran file sebelum disisipkan data ditambah dengan ukuran data yang disisipkan ke dalam file tersebut. Kata Kunci: Vernam Chiper, End Of File, Kriptografi, Steganografi.

  1. Validating User Flows to Protect Software Defined Network Environments

    Directory of Open Access Journals (Sweden)

    Ihsan H. Abdulqadder

    2018-01-01

    Full Text Available Software Defined Network is a promising network paradigm which has led to several security threats in SDN applications that involve user flows, switches, and controllers in the network. Threats as spoofing, tampering, information disclosure, Denial of Service, flow table overloading, and so on have been addressed by many researchers. In this paper, we present novel SDN design to solve three security threats: flow table overloading is solved by constructing a star topology-based architecture, unsupervised hashing method mitigates link spoofing attack, and fuzzy classifier combined with L1-ELM running on a neural network for isolating anomaly packets from normal packets. For effective flow migration Discrete-Time Finite-State Markov Chain model is applied. Extensive simulations using OMNeT++ demonstrate the performance of our proposed approach, which is better at preserving holding time than are other state-of-the-art works from the literature.

  2. Je me souviens de tout, Richard (Rolands Kalniņš, Studio de Riga, 1967 : une manifestation précoce d'une mémoire concurrente de la Grande Guerre patriotique I Remember Everything, Richard (Rolands Kalniņš, Riga Film Studio, 1967: A Precocious Manifestation of a Competing Memory with the Great Patriotic War

    Directory of Open Access Journals (Sweden)

    Juliette Denis

    2012-01-01

    Full Text Available It is usually said that the memory of the war period had been completely reversed in the former Soviet borderlands since the collapse of the USSR, turning former “traitors” into heroes or victims. However, attempts to set up a new approach of the Nazi occupation and collaboration are rooted in the “Thaw” period. I remember everything, Richard – dealing with the Latvian legion, started to be considered in 1957. That coincided both with the massive return of the Latvian deportees from Siberia, and with a renewal of trials against war criminals. Produced only in 1966, the film reflected the social tensions going along with the sensitive topic, and presented a point of view far more nuanced than the official figure of the “Latvian traitor” imposed during the Stalinist period. Based on interviews, archival material and film analysis, this article aims at understanding through the film-making process the connection between the deep changes of the political meaning of the war period, and the social composition of film production.

  3. Zanaatkârlığın Tarihsel Dönüşümü Ve Richard Sennett’in Zanaatkârlık Kavramı / Historical Transformation of Craftsmanship and Richard Sennett’s Concept of Craftsmanhip

    Directory of Open Access Journals (Sweden)

    Umut Osmanlı

    2017-06-01

    Full Text Available Abstract This study examines the concept of crafting which means becoming an expert in an activity. Specializing in a field, in order to facilitate the life, backs as early as the first human settlements in human history. Crafting is a phenomenon in which the person makes the craft in the best possible way for its own goodness. However, it has been gone through some transformations since its formation. The history of crafting includes some milestones such as institution of crafting, its unification and its transformation after the Industrial Revolution. The most essential one of those transformations has been experienced after the Industrial Revolution and it has become difficult to define the crafting followingly. At the present time, crafting has been diminished to the status of a simple worker. In this work, which the historical transformation of crafting is held, It will be examined respectively: the historical roots of crafting, the social status of crafting, professional organizations that hold crafting altogether, the effects on crafting brought by new economic order of industrial revolution and the ideas of Richard Sennett on crafting in order to evaluate crafting in our present society. Hereby, I will try to reach the definitions of crafting that are able to address our today’s society by taking references from the roots of archaic crafting phenomenon. Öz Bu çalışmada, bilinçli olarak yapılan bir eylemde ustalaşma/uzmanlaşma anlamına gelen zanaatkârlık kavramı incelenmiştir. Hayatı kolaylaştırmak adına herhangi bir alanda çalışma ve bu alanda beceri kazanarak ustalaşmak, insanların bir arada yaşamaya başlaması kadar eskidir. Zanaatkârlık, kişinin kendi iyiliği için uğraş verdiği şeyi mümkün olan en iyi şekilde yapmasıdır. Fakat bu durum ortaya çıktığı günden günümüze gelene kadar çeşitli dönüşümlere uğramıştır. Zanaatkârlığın tarihsel serüveni, zanaatk

  4. Protocorms of an epiphytic orchid (Epidendrum amphistomum A. Richard recovered in situ, and subsequent identification of associated mycorrhizal fungi using molecular markers

    Directory of Open Access Journals (Sweden)

    Lawrence W. Zettler

    2012-02-01

    Full Text Available Epiphytic orchids have received considerable study, yet little has been published on their germination requirements in situ involving mycorrhizal fungi. Such research has been hampered by the small, dust-like size of seeds and leafless seedlings (protocorms which are difficult to pinpoint on natural substrates, especially those on arboreal substrates (tree limbs. We report a novel seed sowing and retrieval method, modified from one applied to terrestrial orchids, used in the acquisition of epiphytic orchid protocorms from the Florida Panther National Wildlife Refuge. Seeds from two epiphytic orchid species (Epidendrum amphistomum A. Richard, E. nocturnum Jacquin were placed in separate nylon mesh packets secured within 35 mm plastic slide mounts, and affixed to tree bark using gutter mesh and a staple gun. To confirm that the embryos were viable, some seeds were also sown on asymbiotic media in the laboratory which subsequently germinated after 52 days incubation. Of 60 packets distributed among 18 tree limb sites, one packet – harboring seeds of E. amphistomum affixed to pop ash (Fraxinus caroliniana Mill. on a moss substrate – harbored protocorms after 267 days. Using molecular markers, a fungus assignable to the Ceratobasidiaceae, appears to be the mycorrhizal associate of these protocorms suggesting that this fungus may be associated with the germination process in situ.

  5. Is Tube Artillery a Viable Fire Support Platform for the United States Military on the Battlefields of the Future

    Science.gov (United States)

    2017-04-06

    advantages of utilizing UAVs as a fire support platform are numerous; perhaps none being bigger than the benefit of carrying out offensive strike...radars, manned aircraft, anti-air missiles and anti-aircraft artillery, electronic jamming, hacking , and spoofing. 36 As the UAV platforms stand

  6. Large-scale DNS and DNSSEC data sets for network security research

    NARCIS (Netherlands)

    van Rijswijk, Roland M.; Sperotto, Anna; Pras, Aiko

    The Domain Name System protocol is often abused to perform denial-of-service attacks. These attacks, called DNS amplification, rely on two properties of the DNS. Firstly, DNS is vulnerable to source address spoofing because it relies on the asynchronous connectionless UDP protocol. Secondly, DNS

  7. Kinetics of proton transfer in a green fluorescent protein: A laser ...

    Indian Academy of Sciences (India)

    Unknown

    therefore implicates bulk solvent-controlled protein dynamics in the protonation process. ... recently to protein–protein interactions in the bacterial response regulator SpoOF. NMR ..... molecular mechanism for redox-driven proton transfer to a buried iron–sulphur cluster ... Dynamic simulations of proton transfer from bulk.

  8. Richard Bradley: a unified, living agent theory of the cause of infectious diseases of plants, animals, and humans in the first decades of the 18th century.

    Science.gov (United States)

    Santer, Melvin

    2009-01-01

    During the years 1714 to 1721, Richard Bradley, who was later to become the first Professor of Botany at Cambridge University, proposed a unified, unique, living agent theory of the cause of infectious diseases of plants and animals and the plague of humans. Bradley's agents included microscopic organisms, revealed by the studies of Robert Hooke and Antony van Leeuwenhoek. His theory derived from his experimental studies of plants and their diseases and from microscopic observation of animalcules in different naturally occurring and artificial environments. He concluded that there was a microscopic world of "insects" that lived and reproduced under the appropriate conditions, and that infectious diseases of plants were caused by such "insects." Since there are structural and functional similarities between plants and animals, Bradley concluded that microscopic organisms caused human and animal infectious diseases as well. However, his living agent cause of infectious diseases was not accepted by the contemporary scientific society.

  9. Leo Tolstoy, Mikhail Artsybashev, and Richard Wagner: About One Case of Polemics in Tolstoy’s The Circle of Reading

    Directory of Open Access Journals (Sweden)

    Anastasia A. Tulyakova

    2017-12-01

    Full Text Available The article deals with a case from the creative history of Leo Tolstoy’s The Circle of Reading (1908, when Tolstoy included the revised story of Guy de Maupassant’s Le Port under the title “Sisters” in the second edition of the book. The author proves that the reason for Tolstoy’s decision was his polemic with “saninstvo” as one of the most fashionable ethical trends of the first decade of the 1900s. The key component of Sanin’s behavior and hedonistic philosophy in Mikhail Artsybashev’s novel was incest. Maupassant’s novella is based on the same plot. On the basis of Tolstoy’s nonfictional texts of the 1890s, including the treatise What Is Art? (1898, the article reconstructs the writer’s view on the forms and boundaries of the representation of incest in Richard Wagner’s operas and in Friedrich Nietzsche’s philosophy, with which Tolstoy also polemicized and in connection with which he stated the ethical potential of art and its permissiveness. From this perspective, Tolstoy’s reaction to Artsybashev’s novel, combining the motives of incest and extreme individualism, turns out to be a new phase of the old dispute. Tolstoy included the story “Sisters” in the second edition of The Circle of Reading as a response to the philosophy of “saninstvo.” Thus, Tolstoy’s collection of wise thoughts can be considered not only as didactic, but also as a polemical text, and deeply rooted in the ideological context of the 1890s‒1900s.

  10. Multisource data assimilation in a Richards equation-based integrated hydrological model: a real-world application to an experimental hillslope

    Science.gov (United States)

    Camporese, M.; Botto, A.

    2017-12-01

    Data assimilation is becoming increasingly popular in hydrological and earth system modeling, as it allows for direct integration of multisource observation data in modeling predictions and uncertainty reduction. For this reason, data assimilation has been recently the focus of much attention also for integrated surface-subsurface hydrological models, whereby multiple terrestrial compartments (e.g., snow cover, surface water, groundwater) are solved simultaneously, in an attempt to tackle environmental problems in a holistic approach. Recent examples include the joint assimilation of water table, soil moisture, and river discharge measurements in catchment models of coupled surface-subsurface flow using the ensemble Kalman filter (EnKF). Although the EnKF has been specifically developed to deal with nonlinear models, integrated hydrological models based on the Richards equation still represent a challenge, due to strong nonlinearities that may significantly affect the filter performance. Thus, more studies are needed to investigate the capabilities of EnKF to correct the system state and identify parameters in cases where the unsaturated zone dynamics are dominant. Here, the model CATHY (CATchment HYdrology) is applied to reproduce the hydrological dynamics observed in an experimental hillslope, equipped with tensiometers, water content reflectometer probes, and tipping bucket flow gages to monitor the hillslope response to a series of artificial rainfall events. We assimilate pressure head, soil moisture, and subsurface outflow with EnKF in a number of assimilation scenarios and discuss the challenges, issues, and tradeoffs arising from the assimilation of multisource data in a real-world test case, with particular focus on the capability of DA to update the subsurface parameters.

  11. Energy world governance. Review of the conference which was held at IFRI, 26 March 2009, with Tatsuo Masuda, Andre Mernier et Richard H. Jones

    International Nuclear Information System (INIS)

    Schulke, Ch.

    2009-01-01

    The conference was related with some of the major questions concerning global energy governance today, the role of the different international organizations dealing with energy, the rules of the game between market and state players, the efforts to deal with climate change, and the integration of emerging countries in global energy governance, the roles of the different international organizations dealing with energy (will we see further fragmentation or more cooperation between them?). Tatsuo Masuda in his contribution discussed global energy governance from an oil perspective. Andre Mernier noted the particular nature of the Energy Charter, which, as it is founded upon an international treaty, is unlike other organizations in being legally binding. The legal basis of the organization means that agreements are especially powerful. Then Richard H. Jones underlined that last summer's volatility in oil markets, the ensuing financial and economic crisis, the major disruption in gas supplies to European markets this winter and the upcoming climate change negotiations have led to increasing calls for a stronger global dialogue on energy issues. This dialogue should deal with prices and investment, energy security and climate change

  12. Corrugated metal surface with pillars for terahertz surface plasmon polariton waveguide components

    KAUST Repository

    Yuehong, Xu; Yanfeng, Li; Chunxiu, Tian; Jiaguang, Han; Quan, Xu; Xueqian, Zhang; Xixiang, Zhang; Ying, Zhang; Weili, Zhang

    2018-01-01

    In the terahertz regime, due to perfect conductivity of most metals, it is hard to realize a strong confinement of Surface plasmon polaritons (SPPs) although a propagation loss could be sufficiently low. We experimentally demonstrated a structure with periodic pillars arranged on a thin metal surface that supports bound modes of spoof SPPs at terahertz (THz) frequencies. By using scanning near-field THz microscopy, the electric field distribution above the metal surface within a distance of 130 μm was mapped. The results proved that this structure could guide spoof SPPs propagating along subwavelength waveguides, and at the same time reduce field expansion into free space. Further, for the development of integrated optical circuits, several components including straight waveguide, S-bend, Y-splitter and directional couplers were designed and characterized by the same method. We believe that the waveguide components proposed here will pave a new way for the development of flexible, wideband and compact photonic circuits operating at THz frequencies.

  13. Corrugated metal surface with pillars for terahertz surface plasmon polariton waveguide components

    KAUST Repository

    Yuehong, Xu

    2018-01-12

    In the terahertz regime, due to perfect conductivity of most metals, it is hard to realize a strong confinement of Surface plasmon polaritons (SPPs) although a propagation loss could be sufficiently low. We experimentally demonstrated a structure with periodic pillars arranged on a thin metal surface that supports bound modes of spoof SPPs at terahertz (THz) frequencies. By using scanning near-field THz microscopy, the electric field distribution above the metal surface within a distance of 130 μm was mapped. The results proved that this structure could guide spoof SPPs propagating along subwavelength waveguides, and at the same time reduce field expansion into free space. Further, for the development of integrated optical circuits, several components including straight waveguide, S-bend, Y-splitter and directional couplers were designed and characterized by the same method. We believe that the waveguide components proposed here will pave a new way for the development of flexible, wideband and compact photonic circuits operating at THz frequencies.

  14. Operational experience using the OSTR flip fuel self-protection program

    International Nuclear Information System (INIS)

    Dodd, B.; Ringle, J.C.; Anderson, T.V.; Johnson, A.G.

    1982-01-01

    Recent changes in NRC Physical Security regulations make it highly desirable for a small number of TRIGA research reactor establishments to maintain each of the fuel elements in their reactor core above the self-protection dose rate criterion. OSTR operations personnel have written a computer program (SPOOF) which calculates the exposure rate (in Rhr -1 ) from an irradiated fuel element at 3 feet in air using the actual operating history of the reactor. The purpose of this current paper is to describe the operational experience gained over the last year and a half while using the SPOOF computer program, and while performing the quarterly dose rate measurements needed to confirm the continuing accuracy of the program, and, most importantly, the self-protection status of the OSTR fuel. The computer program in association with the quarterly dose rate measurements have been accepted by the NRC, and allow the OSTR to take credit for self-protecting FLIP fuel under the current physical security regulations

  15. Face Liveness Detection Using Defocus

    Directory of Open Access Journals (Sweden)

    Sooyeon Kim

    2015-01-01

    Full Text Available In order to develop security systems for identity authentication, face recognition (FR technology has been applied. One of the main problems of applying FR technology is that the systems are especially vulnerable to attacks with spoofing faces (e.g., 2D pictures. To defend from these attacks and to enhance the reliability of FR systems, many anti-spoofing approaches have been recently developed. In this paper, we propose a method for face liveness detection using the effect of defocus. From two images sequentially taken at different focuses, three features, focus, power histogram and gradient location and orientation histogram (GLOH, are extracted. Afterwards, we detect forged faces through the feature-level fusion approach. For reliable performance verification, we develop two databases with a handheld digital camera and a webcam. The proposed method achieves a 3.29% half total error rate (HTER at a given depth of field (DoF and can be extended to camera-equipped devices, like smartphones.

  16. [Richard Freiherr v. Krafft-Ebing and Sigmund Freud--discourse on the "normality" and "perversion" of human sexuality at the close of the 19th century and the beginning of the 20th century].

    Science.gov (United States)

    Kapfhammer, Hans-Peter

    2015-01-01

    Sexuality has been defined a central feature of personal identity since the epoch of enlightenment and has gradually become a decisive issue also in societal and political terms. A major transfer from religion and religious institutions to medicine and medical experts and later on to neuropsychiatrists has to be underlined in the primary position to assess "normal" and "deviant" manifestations of sexuality. Richard Freiherr von Krafft-Ebing and Sigmund Freund play an eminent role in this "discourse on sexuality" (M. Foucault) during the nineteenth and beginning twentieth century on the way to modern sexology. Within this overarching context Krafft-Ebing's and Freud's theoretical conceptualizations of sexuality and perversion will be sketched and basic clinical and societal implications there out will be discussed.

  17. Information Security in the 1990s: Keeping the Locks on.

    Science.gov (United States)

    Kovac, Ron J.

    1999-01-01

    As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…

  18. En torno al arte europeo de la segunda mitad del siglo XIX. Aspectos de las relaciones forma–contenido o forma–función en la obra de Lawrence Alma–Tadema, Gottfried Semper y Richard Wagner

    Directory of Open Access Journals (Sweden)

    Ángel Moreno Dopazo

    2010-01-01

    Full Text Available El trabajo se plantea como una reflexión sobre la dificultad actual para apreciar los valores, a menudo denostados, de los ya supuestamente lejanos arte y cultura del siglo XIX. De aquel rico mundo de referentes y asociaciones se destacan aquí las figuras del pintor realista Alma-Tadema, los arquitectos del Ring de Viena, con Semper como singular protagonista, y el músico Richard Wagner. Junto al análisis del complejo universo pictórico del artista holandés afincado en Inglaterra se presenta una reducida selección de obras arquitectónicas que culminan con los nuevos espacios para el arte más decisivamente alemán del XIX, la música.

  19. Book review: Handbook of cyanobacterial monitoring and cyanotoxin analysis

    Science.gov (United States)

    Graham, Jennifer L.; Loftin, Keith A.

    2018-01-01

    Review of Meriluoto, Jussi, Lisa Spoof, and GeoffreyA. Codd [eds.]. 2017. Handbook of Cyanobacterial Monitoring and Cyanotoxin Analysis. John Wiley & Sons, Ltd.: Chichester, West Sussex, UK, ISBN 978‐1‐119‐06868‐6 (978‐1‐119‐06876‐1 eBook), DOI 10.1002/9781119068761.

  20. Richard Phillips Feynman

    Indian Academy of Sciences (India)

    While the two relativity theories were largely the creation of Albert Einstein, the quantum ... of what may lie in store for anyone who dares to follow the beat of a different drum. ... saw Feynman's exceptional talents and in a special lecture explained to him the beautiful principle ... The Character of Physical Law – 1965. c).

  1. Richard Phillips Feynman

    Indian Academy of Sciences (India)

    ARTICLE-IN-A-BOX. 797. RESONANCE │ September 2011. The war years interrupted the efforts of both Feynman and Schwinger to tackle the divergence problems in quantum electrodynamics, another of Dirac's pioneering creations from 1927. In 1965 the Physics Nobel Prize was shared by the two of them and Sin-Ichiro ...

  2. Lt Richard Gueli

    African Journals Online (AJOL)

    Win98SE

    reality, conflicts in Africa (and other parts of the world), often fuelled by deep- ... Often, confusion exists between what is meant by human rights law and .... assist peoples in their right to self-determination; as a result of a state formally consenting ...... As regional 'superpower', it could be argued that South Africa should take a.

  3. Efficient internal and surface fingerprint extraction and blending using optical coherence tomography.

    Science.gov (United States)

    Darlow, Luke Nicholas; Connan, James

    2015-11-01

    Optical coherence tomography provides a 3D representation of fingertip skin where surface and internal fingerprints are found. These fingerprints are topographically identical. However, the surface skin is prone to damage, distortion, and spoofing; and the internal fingerprint is difficult to access and extract. This research presents a novel scaling-resolution approach to fingerprint zone detection and extraction. Furthermore, a local-quality-based blending procedure is also proposed. The accuracy of the zone-detection algorithm is comparable to an earlier work, yielding a mean-squared error of 25.9 and structural similarity of 95.8% (compared to a ground-truth estimate). Blending the surface and internal fingerprints improved the National Institute of Science and Technology's Fingerprint Image Quality scores and the average maximum match scores (when matched against conventional surface counterparts). The fingerprint blending procedure was able to combine high-quality regions from both fingerprints, thus mitigating surface wrinkles and anomalous poor-quality regions. Furthermore, spoof detection via a surface-to-internal fingerprint comparison was proposed and tested.

  4. Placing a Hand in the Fire: Assessing the Impact of a YouTube Experiential Learning Project on Viral Marketing Knowledge Acquisition

    Science.gov (United States)

    Payne, Nathaniel J.; Campbell, Colin; Bal, Anjali S.; Piercy, Niall

    2011-01-01

    The goal of this study is to evaluate the effectiveness of an experiential learning social media project that was integrated into a graduate marketing class. As part of the semester-long project, students were required to work within a team and create a spoof video, which was posted on YouTube. Students' success was partially determined by the…

  5. To Spice Up Course Work, Professors Make Their Own Videos

    Science.gov (United States)

    Young, Jeffrey R.

    2008-01-01

    College faculty members have recently begun creating homemade videos to supplement their lectures, using free or low-cost software. These are the same technologies that make it easy for students to post spoof videos on YouTube, but the educators are putting the tools to educational use. Students tune in to the short videos more often than they…

  6. Kalman filters for assimilating near-surface observations in the Richards equation - Part 2: A dual filter approach for simultaneous retrieval of states and parameters

    Science.gov (United States)

    Medina, H.; Romano, N.; Chirico, G. B.

    2012-12-01

    We present a dual Kalman Filter (KF) approach for retrieving states and parameters controlling soil water dynamics in a homogenous soil column by using near-surface state observations. The dual Kalman filter couples a standard KF algorithm for retrieving the states and an unscented KF algorithm for retrieving the parameters. We examine the performance of the dual Kalman Filter applied to two alternative state-space formulations of the Richards equation, respectively differentiated by the type of variable employed for representing the states: either the soil water content (θ) or the soil matric pressure head (h). We use a synthetic time-series series of true states and noise corrupted observations and a synthetic time-series of meteorological forcing. The performance analyses account for the effect of the input parameters, the observation depth and the assimilation frequency as well as the relationship between the retrieved states and the assimilated variables. We show that the identifiability of the parameters is strongly conditioned by several factors, such as the initial guess of the unknown parameters, the wet or dry range of the retrieved states, the boundary conditions, as well as the form (h-based or θ-based) of the state-space formulation. State identifiability is instead efficient even with a relatively coarse time-resolution of the assimilated observation. The accuracy of the retrieved states exhibits limited sensitivity to the observation depth and the assimilation frequency.

  7. Entre a tradição humanista e o neopragmatismo: Richard Rorty e a virada literária da filosofia

    Directory of Open Access Journals (Sweden)

    Eduardo Cesar Maia Ferreira Filho

    2017-09-01

    Full Text Available Este ensaio defende que o pensamento pós-analítico e pós-filosófico de Richard Rorty pode assumir uma função – de caráter profilático – muito interessante no âmbito dos estudos literários acadêmicos e na crítica literária em geral: suas reflexões críticas funcionam como uma advertência contra certas pretensões cientificistas da filosofia e, por consequência, das teorias literárias em geral. Os variados usos e objetivos da linguagemhumana em atos interpretativos – como na crítica literária – extrapolam a noção moderna de verdade como correspondência; o objetivo da crítica não é, pois, "a verdade", mas simplesmente continuar e enriquecer a grande e interminável conversação que é a cultura humana. A crítica só pode dizer “verdades” se entendermos essa palavra numa acepção humanístico-pragmática e não, como faz a filosofia racionalista tradicional, entendendo a verdade como certeza e como correspondência. Para o neopragmatista, devemos abandonar de uma vez por todas a busca por uma teoria geral da representação ou por uma teoria geral da linguagem; da mesma forma, transladando essa concepção ao âmbito literário, também deveríamos desobrigar-nos das sucessivas tentativas de criar uma teoria geral exclusivista da interpretação e da crítica literárias, ou da busca de uma metodologia monista e definitiva: a crítica é uma atividade plural e que atende a diversas demandas e objetivos

  8. Digging into the Past, Exploring the Present: Richard Flanagan’s Gould’s Book of Fish: A Novel in Twelve Fish

    Directory of Open Access Journals (Sweden)

    Maria Renata Dolce

    2015-07-01

    Full Text Available Abstract – This paper will analyze the ‘historical’ novel Gould’s Book of Fish (2001 by the Tasmanian writer Richard Flanagan with the aim of reflecting upon the power of the creative word as a means to forge reality, shape identities, mask or unmask truths, and also to prefigure a different, alternative world order based on commonly negotiated and thus shared values. The postmodernist revisiting of the traditional genre of the historical novel does not compromise the postcolonial commitment of the writer: Flanagan’s incursions into the Australian colonial past are informed by his concern for urgent social and political causes which has characterized his unswerving fight against all systems of inequality and exploitation. In his novel, the subversion of the linear causal relation of events which calls into question the truthfulness and objectivity of history, together with the foregrounded metanarrative reflection on the art of writing, contribute to the revisiting and re-discussing of the myth of progress and the cult of rationality at the very roots of Western civilization and of its imperialistic enterprise. Flanagan’s ‘anti-historical’ historical novel tackles urgent questions about modernity interrogating the founding narratives of the Australian national identity, in order to explore the uncontrollable and shifting areas of the contemporary ‘transnation’ in which the traditional categories shaping subjectivities are disrupted. As the paper will demonstrate, the writer digs into the past of his nation not simply in order to unravel its hidden histories but to detect the profound, inextricable interconnections with the present across different times and spaces. Feelings and experiences that exist above and beyond historical contingencies and cultural differences represent the writer’s privileged area of investigation as they trespass upon conventional and artificial boundaries revealing what it is that makes us all

  9. Charles Richard de Beauregard and the treatment of blennorrhagic urethral stenosis in Madrid in the 18th century: Advertising, secrecy and deception.

    Science.gov (United States)

    Gómiz, J J; Galindo, I

    2015-12-01

    Describe the introduction of the treatment for blennorrhagic urethral stenosis in the city of Madrid in the 18th century by the French surgeon Charles de Beauregard, the formulations employed in the preparation of his personal «bougies», the advertising in the press, their marketing and distribution. Nonsystematic review of the Madrid newspaper Gaceta de Madrid y Diario curioso, erudito, económico y comercial (Madrid Gazette, curious, erudite, financial and commercial) between 1759 and 1790. Review of the medical literature of the 18th century preserved in the Fondo Antiguo of the Biblioteca Histórica of Universidad Complutense de Madrid (Historical Resource of the Historical Library of the Complutense University of Madrid). A Google search of «Charles Richard de Beauregard». Charles de Beauregard focused his professional work mainly on the treatment of the urethral sequela of blennorrhagia, phimosis and paraphimosis. He introduced to 18th century Spanish society (with purported originality and clear commercial interests) therapeutic methods based on lead acetate that had already been developed in France by Thomas Goulard. The urethral sequela of diseases such as blennorrhagic urethritis, stenotic phimosis and paraphimosis were highly prevalent in 18th century Madrid and required complex solutions for the practice of urology of that era. Charles de Beauregard introduced innovative but not original treatments that were invasive but not bloody and that provided him with fame and social prestige. He advertised his professional activity and marketed his therapeutic products through advertisements submitted to the daily press (Madrid Gazette, Gaceta de Madrid). Copyright © 2015 AEU. Publicado por Elsevier España, S.L.U. All rights reserved.

  10. Heinberg Richard, 2008, Pétrole: la fête est finie ! Avenir des sociétés industrielles après le pic pétrolier, Éditions Demi-Lune, [2003 pour la première édition en langue anglaise

    Directory of Open Access Journals (Sweden)

    Luc Semal

    2009-05-01

    Full Text Available Il a fallu attendre cinq ans pour que soit traduit ce best-seller de Richard Heinberg consacré au pic pétrolier et à ses conséquences sociales en tous genres ! Durant ces cinq années, les ouvrages scientifiques consacrés à ce thème ont continué à proliférer dans le monde anglo-saxon et ont même largement contribué à y faire naître le mouvement des transition towns (dont l’un des principaux objectifs est de préparer les communautés locales aux pénuries pétrolières. Mais en France, pendant la ...

  11. Eesti romaan 1933 / Ants Oras

    Index Scriptorium Estoniae

    Oras, Ants, 1900-1982

    2009-01-01

    Ülevaade 1933. aasta eesti romaanist. Pikemalt käsitletakse: A. H. Tammsaare "Tõde ja õigus" V, Leida Kibuvits "Rahusõit", Richard Roht "Vastsed rajad", Richard Roht "Võitluse teel", August Mälk "Üks neistsinatseist", Mats Mõtslane "Kevadised vood", Oskar Luts "Tagahoovis", Oskar Luts "Tuulesellid", August Jakobson "Üheksas laine", Hella Wuolijoki "Udutaguste Leeni Tartus", Richard Janno "Valeraha", Richard Janno "Selja tagant"

  12. Spoofed Data Detection in VANETs using Dynamic Thresholds

    NARCIS (Netherlands)

    Petit, Jonathan; Feiri, Michael; Kargl, Frank

    2011-01-01

    Vehicular ad hoc networks aim at enhancing road safety by providing vehicle-to-vehicle communications and safety-related applications. But safety-related applications, like Local Danger Warning, need a high trust level in received messages. Indeed, decisions are made depending on these messages. To

  13. 76 FR 21006 - United States and State of New York v. Stericycle, Inc., et al.; Proposed Final Judgment and...

    Science.gov (United States)

    2011-04-14

    .... By: /s/ Richard L. Schwartz, Acting Chief, Antitrust Bureau. /s/ Richard E. Grimm, Assistant Attorney...-6015 E-mail: Richard.Grimm@ag.ny.gov E-mail: [email protected] United States District Court for...

  14. Richard DeBlasio | NREL

    Science.gov (United States)

    DeBlasio's leadership, electricity research at NREL helped develop interconnection technology and validate Smart Grid modernization. Professional Experience Trained in electrical and electronics engineering , DeBlasio has worked in various leadership positions at NREL (and SERI) since 1978. These included research

  15. Radar operation in a hostile electromagnetic environment

    Energy Technology Data Exchange (ETDEWEB)

    Doerry, Armin Walter

    2014-03-01

    Radar ISR does not always involve cooperative or even friendly targets. An adversary has numerous techniques available to him to counter the effectiveness of a radar ISR sensor. These generally fall under the banner of jamming, spoofing, or otherwise interfering with the EM signals required by the radar sensor. Consequently mitigation techniques are prudent to retain efficacy of the radar sensor. We discuss in general terms a number of mitigation techniques.

  16. Tampering detection system using quantum-mechanical systems

    Science.gov (United States)

    Humble, Travis S [Knoxville, TN; Bennink, Ryan S [Knoxville, TN; Grice, Warren P [Oak Ridge, TN

    2011-12-13

    The use of quantum-mechanically entangled photons for monitoring the integrity of a physical border or a communication link is described. The no-cloning principle of quantum information science is used as protection against an intruder's ability to spoof a sensor receiver using a `classical` intercept-resend attack. Correlated measurement outcomes from polarization-entangled photons are used to protect against quantum intercept-resend attacks, i.e., attacks using quantum teleportation.

  17. Fusion of Multimodal Biometrics using Feature and Score Level Fusion

    OpenAIRE

    Mohana Prakash, S.; Betty, P.; Sivanarulselvan, K.

    2016-01-01

    Biometrics is used to uniquely identify a person‘s individual based on physical and behavioural characteristics. Unimodal biometric system contains various problems such as degree of freedom, spoof attacks, non-universality, noisy data and error rates. Multimodal biometrics is introduced to overcome the limitations in Unimodal biometrics. The presented methodology extracts the features of four biometric traits such as fingerprint, palm, iris and retina. Then extracted features are fused in th...

  18. Generating and analyzing synthetic finger vein images

    OpenAIRE

    Hillerström, Fieke; Kumar, Ajay; Veldhuis, Raymond N.J.

    2014-01-01

    Abstract: The finger-vein biometric offers higher degree of security, personal privacy and strong anti-spoofing capabilities than most other biometric modalities employed today. Emerging privacy concerns with the database acquisition and lack of availability of large scale finger-vein database have posed challenges in exploring this technology for large scale applications. This paper details the first such attempt to synthesize finger-vein images and presents analysis of synthesized images fo...

  19. Secure positioning in wireless networks

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    So far, the problem of positioning in wireless networks has been studied mainly in a non-adversarial settings. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call...... Verifiable Multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations....

  20. Acquisition of Cooperative Small Unmanned Aerial Systems for Advancing Man Machine Interface Research

    Science.gov (United States)

    2016-08-24

    Airborne Cross Runway Departure/Landing Scenario Figure 7 Illustration of a participant looking at the 10Hz or 15Hz flickering visual stimulus in a...Figure 5 An illustration using a formation of UAVs for Direction of Arrival (DOA) mitigation of spoofing signals Spoofer Antenna array based on a...this project is to research and develop robust and jamming-resistant receivers including advanced interference mitigation algorithms and network

  1. Beyond the Soundtrack: Representing Music in Cinema, a cura di Daniel Goldmark, Lawrence Kramer e Richard Leppert, Berkeley, University of California Press, 2007

    Directory of Open Access Journals (Sweden)

    Francesco Finocchiaro

    2012-11-01

    Full Text Available Beyond the Soundtrack: Representing Music in Cinema (edited by Daniel Goldmark, Lawrence Kramer and Richard Leppert, Berkeley, University of California Press, 2007, viii-324 pp. offers sixteen essays of various authors about film music. These papers were presented in 2004 in a study congress at the University of Minnesota. In introducing the book, the editors assert an assumption, today broadly accepted: indeed they affirm, that music has traditionally been regarded as a subordinate element in cinematographic text: film music literature still has a marginal position in the much larger field of film studies which focuses on image, narrative, film history. In this theoretical and historiographic context, the expression “Beyond the Soundtrack” is meant to be more than a title: it is the manifesto of a conceptual shift. We can summarize this change in reconsidering the importance of film music, in order to understand a movie not only as a visual, but also as a musical medium. The change of paradigm brings renewed questions and completely new issues. If we abandon the assumption, at this point obsolete, that film music has a mere functional role, it will be necessary to ask not how to conceptualize the use of music in film, but rather how the film conceptualizes music: how films imagine music, how films represent music as an artistic and social phenomenon, and how films position music as an integral parts of a fictional world. Such questions aim to consider film music not as an atmospheric expedient, but «as an agent, a force, and an object engaged in ongoing negotiations with image, narrative, and context», as the editors assert at the very beginning of their book.

  2. Making structured metals transparent for ultrabroadband electromagnetic waves and acoustic waves

    International Nuclear Information System (INIS)

    Fan, Ren-Hao; Peng, Ru-Wen; Huang, Xian-Rong; Wang, Mu

    2015-01-01

    In this review, we present our recent work on making structured metals transparent for broadband electromagnetic waves and acoustic waves via excitation of surface waves. First, we theoretically show that one-dimensional metallic gratings can become transparent and completely antireflective for extremely broadband electromagnetic waves by relying on surface plasmons or spoof surface plasmons. Second, we experimentally demonstrate that metallic gratings with narrow slits are highly transparent for broadband terahertz waves at oblique incidence and high transmission efficiency is insensitive to the metal thickness. Further, we significantly develop oblique metal gratings transparent for broadband electromagnetic waves (including optical waves and terahertz ones) under normal incidence. In the third, we find the principles of broadband transparency for structured metals can be extended from one-dimensional metallic gratings to two-dimensional cases. Moreover, similar phenomena are found in sonic artificially metallic structures, which present the transparency for broadband acoustic waves. These investigations provide guidelines to develop many novel materials and devices, such as transparent conducting panels, antireflective solar cells, and other broadband metamaterials and stealth technologies. - Highlights: • Making structured metals transparent for ultrabroadband electromagnetic waves. • Non-resonant excitation of surface plasmons or spoof surface plasmons. • Sonic artificially metallic structures transparent for broadband acoustic waves

  3. Reliable Location-Based Services from Radio Navigation Systems

    Directory of Open Access Journals (Sweden)

    Per Enge

    2010-12-01

    Full Text Available Loran is a radio-based navigation system originally designed for naval applications. We show that Loran-C’s high-power and high repeatable accuracy are fantastic for security applications. First, we show how to derive a precise location tag—with a sensitivity of about 20 meters—that is difficult to project to an exact location. A device can use our location tag to block or allow certain actions, without knowing its precise location. To ensure that our tag is reproducible we make use of fuzzy extractors, a mechanism originally designed for biometric authentication. We build a fuzzy extractor specifically designed for radio-type errors and give experimental evidence to show its effectiveness. Second, we show that our location tag is difficult to predict from a distance. For example, an observer cannot predict the location tag inside a guarded data center from a few hundreds of meters away. As an application, consider a location-aware disk drive that will only work inside the data center. An attacker who steals the device and is capable of spoofing Loran-C signals, still cannot make the device work since he does not know what location tag to spoof. We provide experimental data supporting our unpredictability claim.

  4. Technology Corner: Analysing E-mail Headers For Forensic Investigation

    Directory of Open Access Journals (Sweden)

    M. Tariq Banday

    2011-06-01

    Full Text Available Electronic Mail (E-Mail, which is one of the most widely used applications of Internet, has become a global communication infrastructure service.  However, security loopholes in it enable cybercriminals to misuse it by forging its headers or by sending it anonymously for illegitimate purposes, leading to e-mail forgeries. E-mail messages include transit handling envelope and trace information in the form of structured fields which are not stripped after messages are delivered, leaving a detailed record of e-mail transactions.  A detailed header analysis can be used to map the networks traversed by messages, including information on the messaging software and patching policies of clients and gateways, etc. Cyber forensic e-mail analysis is employed to collect credible evidence to bring criminals to justice. This paper projects the need for e-mail forensic investigation and lists various methods and tools used for its realization. A detailed header analysis of a multiple tactic spoofed e-mail message is carried out in this paper. It also discusses various possibilities for detection of spoofed headers and identification of its originator. Further, difficulties that may be faced by investigators during forensic investigation of an e-mail message have been discussed along with their possible solutions.

  5. Making structured metals transparent for ultrabroadband electromagnetic waves and acoustic waves

    Energy Technology Data Exchange (ETDEWEB)

    Fan, Ren-Hao [National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093 (China); Peng, Ru-Wen, E-mail: rwpeng@nju.edu.cn [National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093 (China); Huang, Xian-Rong [Advanced Photon Source, Argonne National Laboratory, Argonne, IL 60439 (United States); Wang, Mu [National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093 (China)

    2015-07-15

    In this review, we present our recent work on making structured metals transparent for broadband electromagnetic waves and acoustic waves via excitation of surface waves. First, we theoretically show that one-dimensional metallic gratings can become transparent and completely antireflective for extremely broadband electromagnetic waves by relying on surface plasmons or spoof surface plasmons. Second, we experimentally demonstrate that metallic gratings with narrow slits are highly transparent for broadband terahertz waves at oblique incidence and high transmission efficiency is insensitive to the metal thickness. Further, we significantly develop oblique metal gratings transparent for broadband electromagnetic waves (including optical waves and terahertz ones) under normal incidence. In the third, we find the principles of broadband transparency for structured metals can be extended from one-dimensional metallic gratings to two-dimensional cases. Moreover, similar phenomena are found in sonic artificially metallic structures, which present the transparency for broadband acoustic waves. These investigations provide guidelines to develop many novel materials and devices, such as transparent conducting panels, antireflective solar cells, and other broadband metamaterials and stealth technologies. - Highlights: • Making structured metals transparent for ultrabroadband electromagnetic waves. • Non-resonant excitation of surface plasmons or spoof surface plasmons. • Sonic artificially metallic structures transparent for broadband acoustic waves.

  6. O neopragmatismo de Richard Rorty e a reflexão política contemporânea

    Directory of Open Access Journals (Sweden)

    Sérgio Eduardo Ferraz

    2014-03-01

    Full Text Available Este artigo examina o pensamento filosófico de Richard Rorty e, em particular, sua dimensão política, delineando seu tratamento original e crítico de temas centrais à teoria política contemporânea. O objetivo do texto é triplo: chamar a atenção para a fertilidade das ideias de um autor ainda pouco lido no Brasil (i, assinalar as notáveis consequências corrosivas da abordagem rortyana para pressupostos e pretensões fundantes de importantes vertentes da teoria política (ii, e, numa ótica mais positiva, apontar o potencial inspirador dos escritos desse autor para a reflexão sobre novos modos de justificação da democracia (iii. Salientam-se também, nesse último caso, os limites impostos a esse tipo de empreitada político-intelectual. A abordagem empregada consiste em demarcar os contornos gerais do projeto filosófico do autor, seguindo-se uma apresentação dos tópicos mais propriamente políticos da obra de Rorty. Mais especificamente, o artigo explora a proposta rortyana de substituição da noção de verdade pela de justificação, assinalando-se suas consequências para pretensões de verdade, objetividade e universalismo, presentes em diversas linhas da teoria política. Nesse veio, o artigo discute as eventuais implicações relativistas das teses rortyanas, chegando-se, por essa rota, às ideias de contingência, imaginação e persuasão, núcleos conceituais vitais à reflexão em tela. Um breve contraste com posições de autores como Habermas e Rawls, caros ao próprio Rorty, é esboçado no propósito de tornar mais clara a especificidade da abordagem rortyana da política. Transitando, do modo assinalado, por esses tópicos, o texto resulta em um panorama sintético da perspectiva rortyana acerca do que vem a ser, contemporaneamente, uma "política democrática", liberta de "universalismos" e "objetividades", na qual ganham estatuto decisivo questões de justificação, tolerância e coexist

  7. A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key

    OpenAIRE

    Tanmay Bhattacharya; Sirshendu Hore; S. R. Bhadra Chaudhuri

    2011-01-01

    Unimodal biometric systems have to contend with a variety of problems such as noisy data, intra-class variations, restricted degrees of freedom, non-universality; phishing attacks spoof attacks, and high false acceptance rates. In order for the biometrics to be ultra-secure and to provide more-than-average accuracy, more then one form of biometric identification is required. Hence some of these limitations can be addressed by a combination of different biometric recognition technologies that ...

  8. Tampering detection system using quantum-mechanical systems

    Energy Technology Data Exchange (ETDEWEB)

    Humble, Travis S [Knoxville, TN; Bennink, Ryan S [Knoxville, TN; Grice, Warren P [Oak Ridge, TN

    2011-12-13

    The use of quantum-mechanically entangled photons for monitoring the integrity of a physical border or a communication link is described. The no-cloning principle of quantum information science is used as protection against an intruder's ability to spoof a sensor receiver using a `classical` intercept-resend attack. Correlated measurement outcomes from polarization-entangled photons are used to protect against quantum intercept-resend attacks, i.e., attacks using quantum teleportation.

  9. Human Factors in Web-Authentication

    Science.gov (United States)

    2009-02-06

    questions is vulnerable to man-in-the-middle ( MITM ) attacks [113, 144]. Since these attacks exploit similar human tendencies as attacks against...researchers have discovered a “Universal Man-in-the-Middle Phishing Kit” [75], a hacker toolkit which enables a phisher to easily set up a MITM ...the-middle ( MITM ) attacker spoofing the login page of the target Web site [113, 144]. 1 When a user attempts to login 1Challenge questions also have

  10. Understanding network hacks attack and defense with Python

    CERN Document Server

    Ballmann, Bastian

    2015-01-01

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

  11. Harmonic maps of the hyperbolic space and development of singularities in wave maps and Yang-Mills fields

    International Nuclear Information System (INIS)

    Cazenave, T.; Shatah, J.; Tahvildar-Zadeh, A.S.

    1998-01-01

    In this article we explore some of the connections between the theories of Yang-Mills fields, wave maps, and harmonic maps. It has been shown that the search for similarity solutions of wave maps leads to harmonic maps of the hyperbolic space. On the other hand, Glassey and Strauss have shown that the equations for an SO(3)-equivariant Yang-Mills connection on the Minkowski space R 3,1 with gauge group SU(2) reduce to a certain nonlinear wave equation, which we can now identify as a wave map on R 1,1 . More generally, we will here show the reduction under equivariance of a Yang-Mills system on the Minkowski space R n,1 to a wave map system on R n-2,1 in the specific case of SO(n) bundles with SO(n) symmetry. We then prove for odd n the existence of equivariant harmonic maps from the hyperbolic space H n that are smooth at the ideal boundary of H n , thus establishing the existence of similarity solutions for equivariant wave maps and Yang-Mills fields. As a consequence we show that for n ≥ 7, it is possible to have a wave map into a negatively curved target manifold that develops from smooth initial data and blows up in finite time, in sharp contrast to the elliptic case of harmonic maps. Finally we show how these singular solutions can be lifted to one dimension higher to produce singular travelling waves. (orig.)

  12. Institutional Challenges to Developing Metrics of Success in Irregular Warfare

    Science.gov (United States)

    2011-12-01

    develop national policy and strategic goals. If an IW conflict has a 11 Richard L. Daft , Essentials...13 Richard L. Daft , Essentials of Organization Theory and Design (Mason, OH:Thomson Learning, 2003), 52. 14 Henry...37 Richard L. Daft , Essentials of Organization Theory & Design (Mason, OH: Thompson Learning, 2003), 52

  13. Flinging a New Star: “Fire and Cloud” and “Bright and Morning Star” as Reflections of Richard Wright’s Changing Relationship with Communism

    Directory of Open Access Journals (Sweden)

    April Conley Kilinski

    2012-10-01

    Full Text Available Richard Wright's collection of short novella's, Uncle Tom's Children, was originally published in 1938; in 1940, after the success of Native Son, a new printing of the text appeared with two additions. The first was the introductory essay entitled "The Ethics of Living Jim Crow," which was written in 1937, and later served as part of Black Boy. The second was the novella "Bright and Morning Star." Michel Fabre notes that Harper's Magazine rejected this story, "but since it fit Party specifications even better than had the four previous stories, New Masses published it as part of a special literary supplement on May 10, [1938]" (164 . In fact, perhaps because New Masses originally published the final story, critical attention to the revised edition of book almost exclusively posits that the 1940 edition reflects Wright's commitment to Communism at the time. However, several of Wright's other writings-including the introductory essay to the 1940 edition, "The Ethics of Living Jim Crow;" "Blue print for Negro Writing," first published in New Challenge in the fall of 1937; "I Tried to be a Communist," first published in Atlantic Monthly in August and September 1944; and his responses to the Communist party's review of Native Son in 1940-also indicate that his focus in the late 1930s was more on the development of an individual black consciousness than on advancing the causes of the Communist party. By juxtaposing the final two stories, "Fire and Cloud" and "Bright and Morning Star," and considering them in terms of the other writings indicated above, I argue that the 1940 edition of Uncle Tom's Children (with the two additions demonstrates Wright's growing ambivalence with the Communist Party between the years of 1937 and 1940.

  14. Genetic Diversity and Population Structure of Two Freshwater Copepods (Copepoda: Diaptomidae, Neodiaptomus schmackeri (Poppe and Richard, 1892 and Mongolodiaptomus birulai (Rylov, 1922 from Taiwan

    Directory of Open Access Journals (Sweden)

    Shuh-Sen Young

    2013-11-01

    Full Text Available We used the mitochondria DNA COI (cytochrome c oxidase subunit I sequence as a genetic marker to analyze the population genetic structure of two species of freshwater copepods, Neodiaptomus schmackeri (Poppe and Richard, 1892 and Mongolodiaptomus birulai (Rylov, 1922 from Taiwan. Four populations with 51 individuals of N. schmackeri and five populations with 65 individuals of M. birulai were included. We compared the nucleotide sequences of a 635-bp fragment of the COI gene of N. schmackeri and a 655-bp fragment of the COI gene of M. birulai, and eight and 14 unique haplotypes were recorded, respectively. Tseng-Wen reservoir and Wu-San-Tao reservoir are linked by a channel, and the gene flow between them was unrestricted (Fst = 0.058; Nm = 4.04; Fst, population differentiation parameter; Nm, the number of succesfull migrants per generation; the gene flow between all other populations of both species was restricted (Fst = 0.4–0.99; Nm = 0–0.37. Based on the COI gene diversification pattern, we suggest that most populations of N. schmackeri and M. birulai are isolated from each other. According to the neighbor-joining tree and the minimum spanning network (MSN, the species have similar metapopulation genetic structures. Genetic distance was not found to be correlated with geographical distance. The genetic diversification pattern was not shown to be comparable with geographical isolation owing to long-distance separation. The genetic structure of the present populations may result from serial extinction and redistribution of the populations formed in each reservoir relative to time. Human activity in the reservoirs with regards to water resource management and the fishery industry also exerts an effect on population redistribution.

  15. IoT Security Techniques Based on Machine Learning

    OpenAIRE

    Xiao, Liang; Wan, Xiaoyue; Lu, Xiaozhen; Zhang, Yanyong; Wu, Di

    2018-01-01

    Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques including supervised learning, unsupervised learning and reinforcement learning. We focus on the machine le...

  16. Hyperbolic and Plasmonic Properties of Silicon/Ag Aligned Nanowire Arrays

    Science.gov (United States)

    2013-06-17

    Cleveland, J. D. Caldwell, E. Foos, J. Niinistö, and M. Ritala, “Spoof-like plasmonic behavior of plasma enhanced atomic layer deposition grown Ag thin...M. Leskela, “ Plasma -enhanced atomic layer deposition of silver thin films,” Chem. Mater. 23(11), 2901–2907 (2011). 52. O. J. Glembocki, S. M. Prokes...all principal components of the dielectric permittivity tensor are positive, the iso-frequency surface is “closed” and forms a spheroid or ellipsoid

  17. Vitality detection in personal authentication systems using fingerprints

    OpenAIRE

    Coli, Pietro

    2008-01-01

    Fingerprints are considered as the sign of each human being, and this has contributed the development of biometric applications based on such features. Since 2002, an important vulnerability has been shown: it is possible to deceive fingerprint scanners through artificial replicas of fingertips. In order to address this shortcoming it is need to recognize a spoofing attempt with artificial fingers looking for some “life signs” each time an user submit a fingerprint (vitality detection problem...

  18. Using a CO2 laser for PIR-detector spoofing

    NARCIS (Netherlands)

    Schleijpen, R.; Putten, F.J.M. van

    2016-01-01

    This paper presents experimental work on the use of a CO2 laser for triggering of PIR sensors. Pyro-electric InfraRed sensors are often used as motion detectors for detection of moving persons or objects that are warmer than their environment. Apart from uses in the civilian domain, also

  19. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Science.gov (United States)

    Sequeira, Ana F.; Cardoso, Jaime S.

    2015-01-01

    Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system. PMID:26102491

  20. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Directory of Open Access Journals (Sweden)

    Ana F. Sequeira

    2015-06-01

    Full Text Available Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

  1. Face antispoofing based on frame difference and multilevel representation

    Science.gov (United States)

    Benlamoudi, Azeddine; Aiadi, Kamal Eddine; Ouafi, Abdelkrim; Samai, Djamel; Oussalah, Mourad

    2017-07-01

    Due to advances in technology, today's biometric systems become vulnerable to spoof attacks made by fake faces. These attacks occur when an intruder attempts to fool an established face-based recognition system by presenting a fake face (e.g., print photo or replay attacks) in front of the camera instead of the intruder's genuine face. For this purpose, face antispoofing has become a hot topic in face analysis literature, where several applications with antispoofing task have emerged recently. We propose a solution for distinguishing between real faces and fake ones. Our approach is based on extracting features from the difference between successive frames instead of individual frames. We also used a multilevel representation that divides the frame difference into multiple multiblocks. Different texture descriptors (local binary patterns, local phase quantization, and binarized statistical image features) have then been applied to each block. After the feature extraction step, a Fisher score is applied to sort the features in ascending order according to the associated weights. Finally, a support vector machine is used to differentiate between real and fake faces. We tested our approach on three publicly available databases: CASIA Face Antispoofing database, Replay-Attack database, and MSU Mobile Face Spoofing database. The proposed approach outperforms the other state-of-the-art methods in different media and quality metrics.

  2. The "dirty weather" diaries of Reverend Richard Davis: insights about early colonial-era meteorology and climate variability for northern New Zealand, 1839-1851

    Science.gov (United States)

    Lorrey, Andrew M.; Chappell, Petra R.

    2016-03-01

    Reverend Richard Davis (1790-1863) was a colonial-era missionary stationed in the Far North of New Zealand who was a key figure in the early efforts of the Church Mission Society. He kept meticulous meteorological records for the early settlements of Waimate North and Kaikohe, and his observations are preserved in a two-volume set in the Sir George Grey Special Collections in the Auckland Central Library. The Davis diary volumes are significant because they constitute some of the earliest land-based meteorological measurements that were continually chronicled for New Zealand. The diary measurements cover nine years within the 1839-1851 time span that are broken into two parts: 1839-1844 and 1848-1851. Davis' meteorological recordings include daily 9 a.m. and noon temperatures and midday pressure measurements. Qualitative comments in the diary note prevailing wind flow, wind strength, cloud cover, climate variability impacts, bio-indicators suggestive of drought, and notes on extreme weather events. "Dirty weather" comments scattered throughout the diary describe disturbed conditions with strong winds and driving rainfall. The Davis diary entries coincide with the end of the Little Ice Age (LIA) and they indicate southerly and westerly circulation influences and cooler winter temperatures were more frequent than today. A comparison of climate field reconstructions derived from the Davis diary data and tree-ring-based winter temperature reconstructions are supported by tropical coral palaeotemperature evidence. Davis' pressure measurements were corroborated using ship log data from vessels associated with iconic Antarctic exploration voyages that were anchored in the Bay of Islands, and suggest the pressure series he recorded are robust and can be used as "station data". The Reverend Davis meteorological data are expected to make a significant contribution to the Atmospheric Circulation Reconstructions across the Earth (ACRE) project, which feeds the major data

  3. Vitality Detection in Face Images using Second Order Gradient

    OpenAIRE

    Aruni Singh

    2012-01-01

    Spoofing is a very big challenge in biometrics, specially in face image. So many artificial techniques are available to tamper or hide the original face. To ensure the actual presence of live face image in contrast to fake face image this research has been contributed. The intended purpose of proposed approach is also to endorse the biometric authentication, by joining the liveness awareness with Facial Recognition Technology (FRT). In this research 200 dummy face images and 200 real face ima...

  4. Richard R. John, Network Nation

    DEFF Research Database (Denmark)

    Nye, David

    2011-01-01

    Favorable review of this 520 page work, which shows that mass communications are not anonymous agents of change, but culturally constructed through a continual process of technical choice and political negotiation....

  5. Richard T. (Rick) Elander | NREL

    Science.gov (United States)

    saccharification Process integration and scale-up Process separations and product recovery Industrial various enzymatic and thermochemical hydrolysis routes. He has direct experience in designing , implementing, and utilizing biomass pretreatment, biomass slurry solid-liquid separation, and enzymatic

  6. 1800-IJBCS-Article-Richard Ouedraogo

    African Journals Online (AJOL)

    hp

    Conclusion : Il convient de prioriser les mesures préventives et la prise en charge précoce .... Heslop, 2006). Dans notre contexte, la faible accessibilité aux services de santé spécialisés, pourrait expliquer en partie l'importance de cette incidence. En effet, la ... contrefaçon « médicaments de la rue », se sont révélées peu ...

  7. Kadunud linna otsinguil / Richard Woods

    Index Scriptorium Estoniae

    Woods, Richard

    2000-01-01

    University of East Londoni arheoloogiatudeng Alan Robinson leidis 1998. a. Mehhiko dzhunglist umbes aastatest 600-900 pKr pärineva linna, mis katab 12 ruutmiili suuruse ala. Seni on leitud 11 väljakut, 10 püramiidikujulist ehitist, 6 ümmargust ehitist, 11 sammast.

  8. Home Page of Richard Talaga

    Science.gov (United States)

    bottom of the page is a (planned) link to one of my favorite hobbies. Current Experiments MINOS Neutrino Argonne efforts to join this (existing) experiment * Talaga's Presentations Hobbies and Photos Dive Photos

  9. Beckett elab edasi / Richard Brooks

    Index Scriptorium Estoniae

    Brooks, Richard

    2001-01-01

    Dublini Gate Theatre, Blue Angel Films, RTE ja Channel 4 on jäädvustanud üheks telesarjaks kõik 19 Samuel Becketi näidendit. Mõnest filmist pikemalt, näiteks John Gielgudi kuu aega enne surma tehtud rollist David Mameti lavastatud "Katastroofis"

  10. 756-IJBCS-Article-Richard Priso

    African Journals Online (AJOL)

    DR GATSING

    s'établir dans les marécages et même à y cultiver nonobstant les risques. Par ailleurs, les marécages naturels jouent un rôle important dans le traitement des déchets liquides. Ils interceptent l'eau et éliminent les polluants par biodégradation, absorption et échanges ioniques entre les sédiments (Odum, 1996) et jouent un ...

  11. Editors’ Note

    Directory of Open Access Journals (Sweden)

    Heller WD

    2014-12-01

    Full Text Available The unexpected death of Richard Baker at Easter of this year was a shock for all who knew him. It was just in the last Issue of the Journal (Volume 22, No. 4, January 2007 that we as Editors were pleased and proud to print the laudation by Thomas A. Perfetti of Richard Baker who received the 2006 Tobacco Science Research Conference Lifetime Achievement Award. In this Issue, we have the sad duty to print an obituary for Richard Baker. We have asked Ray Thornton, a former Scientific and Regulatory Manager at BAT to write the obituary, because Ray was a colleague, neighbour and friend of Richard Baker.

  12. Africa’s Oil Coast: How the Region’s Strategic Importance May Cause Operational Challenges for AFRICOM as Currently Constructed

    Science.gov (United States)

    2014-05-22

    Applications (Englewood Cliffs, NJ: Prentice-Hill, 1990), 4. 10Richard L. Daft , Organization Theory and Design, 7th ed. (Cincinnati, OH: South...the researcher referenced several of Mary Jo Hatch’s design templates. Figure 2. An Open System and its Subsystems Source: Richard L. Daft ...and improve horizontal and vertical information flow throughout their environment. Richard Daft and Mary Jo Hatch’s frameworks provided the

  13. Emergency Preparedness: A Handbook for Families.

    Science.gov (United States)

    1982-06-01

    Advancement of Science, 1966. FAMILY HANDYMAN MAGAZINE. America’s Handyman Book. New York: Charles Scribner’s Sons, 1980. FARACE , Richard V., Kenneth...1972. FARACE , Richard V. Communication Strategies for Crisis Relocation Planning. Washington, D.C.: Defense Civil Preparedness Agency, November 1975... FARACE , Richard V., Kenneth L. Villard, and L. Edna Rogers. Family Communication About Plans for Natural and Nuclear Disasters. Washington, D.C

  14. Social perspective: the missing element in mental health practice

    National Research Council Canada - National Science Library

    U'Ren, Richard C

    2011-01-01

    .... ________________________________________________________________ Library and Archives Canada Cataloguing in Publication U'Ren, Richard, 1939- Social perspective : the missing element in mental health practice / Richard U'Ren...

  15. A New Vector for Air Force Development of Joint Leaders

    Science.gov (United States)

    2010-05-26

    All Saying the Same Thing?”. A survey of leadership literature also includes: Richard L. Daft , The Leadership Experience (South-Western, 2002...dividing and specializing labor, to perform a mission or achieve an objective.”13 In The Leadership Experience, Richard Daft defines culture as a...Air Force, policy is also a significant mechanism 14 Richard L. Daft , The Leadership Experience, 2nd ed. (Mason, Ohio: South-Western, 2002), 510. 15

  16. Hopes against Hobbes: On Authoritarianism, Regime Legitimation and Soft Power with a Review of Richard C. Bush’s Hong Kong in the Shadow of China: Living with the Leviathan (2016

    Directory of Open Access Journals (Sweden)

    Emile Kok-Kheng Yeoh

    2017-08-01

    Full Text Available Richard C. Bush’s Hong Kong in the shadow of China: Living with the Leviathan (2016 represents an important study on post-“Handover” Hong Kong focusing on the making of the 2014 Occupy Campaign and Umbrella Movement and the impact on the coming development in politics, governance and economy of Hong Kong, taking into consideration China’s Hong Kong policy and the response of the Hong Kong people as well as the perspectives of Taiwan and the United States. This article, while reviewing the book, also provides a detailed analysis of the wider implications of the issues the author of the book has raised as regards Hong Kong – as China’s policy approach towards Hong Kong and by extension Taiwan and the struggle of the Hong Kong people, as well as the Taiwan people, to protect the political freedom and democratic rights they aspire to maintain (in the case of Hong Kong and that they have fought hard to secure (in Taiwan have impacts that reach far beyond Hong Kong and Taiwan in the light of the PRC’s current relentless global projection, riding on the wave of her economic miracle, of her hard and so-called “soft” power in a through an intricate nexus of her domestic and foreign policies that not only serves to strengthen domestic governance and enhance international influence but also involves extraterritorial actions to maintain CCP’s one-party authoritarianism.

  17. READING COMPREHENSION QUESTIONS DEVELOPED BY ENGLISH TEACHERS OF SENIOR HIGH SCHOOLS IN SURABAYA

    Directory of Open Access Journals (Sweden)

    Mukhlisatun Muayanah

    2014-06-01

    Full Text Available According to the Competence Based Curriculum (KBK in the subject of English at Senior High School, the reading skill emphasizes the ability to read written English in the forms of narration, spoof/recount, procedures, report, news items (1st grade, anecdote, exposition, hortatory exposition (2nd grade, descriptions, explanation, discussion, and commentary (3rd grade. Therefore, the objective of teaching reading is to enable the students to have the ability to comprehend and interpret the content of many types of written English discourse.

  18. 76 FR 58076 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2011-09-19

    ... information, contact Richard W. Hartman II, Executive Director of the International Security Advisory Board..., 2011. Richard W. Hartman II, Executive Director, International Security Advisory Board, U.S. Department...

  19. 76 FR 81005 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2011-12-27

    .... For more information, contact Richard W. Hartman II, Executive Director of the International Security..., 2011. Richard W. Hartman II, Executive Director, International Security Advisory Board, U.S. Department...

  20. 78 FR 41183 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2013-07-09

    ..., nuclear proliferation, and diplomacy. For more information, contact Richard W. Hartman II, Executive..., telephone: (202) 736-4290. Dated: June 26, 2013. Richard W. Hartman, II, Executive Director, International...

  1. 77 FR 47162 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2012-08-07

    ... security, nuclear proliferation, and diplomacy. For more information, contact Richard W. Hartman II... 20520, telephone: (202) 736-4290. Dated: July 31, 2012. Richard W. Hartman, II, Executive Director...

  2. 76 FR 36167 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2011-06-21

    ..., international security, nuclear proliferation, and diplomacy. For more information, contact Richard W. Hartman..., DC 20520, telephone: (202) 736-4290. Dated: June 13, 2011. Richard W. Hartman, II., Executive...

  3. 78 FR 51266 - International Security Advisory Board (ISAB) Meeting Notice

    Science.gov (United States)

    2013-08-20

    ... security, nuclear proliferation, and diplomacy. For more information, contact Richard W. Hartman II... 20520, telephone: (202) 736-4290. Dated: August 7, 2013. Richard W. Hartman, II, Executive Director...

  4. Filosofiens historiografi: Fire genrer

    DEFF Research Database (Denmark)

    Rorty, Richard

    2007-01-01

    Oversættelse af Richard Rortys artikel "Filosofiens historiografi: Fire genrer" Udgivelsesdato: 26 Oktober......Oversættelse af Richard Rortys artikel "Filosofiens historiografi: Fire genrer" Udgivelsesdato: 26 Oktober...

  5. 77 FR 21142 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2012-04-09

    ..., international security, nuclear proliferation, and diplomacy. For more information, contact Richard W. Hartman..., DC 20520, telephone: (202) 736-4290. Dated: March 28, 2012. Richard W. Hartman II, Executive Director...

  6. 78 FR 66984 - International Security Advisory Board (ISAB); Meeting Notice; Closed Meeting

    Science.gov (United States)

    2013-11-07

    ... information, contact Richard W. Hartman II, Executive Director of the International Security Advisory Board, U.... Richard W. Hartman, II, Executive Director, International Security Advisory Board, U.S. Department of...

  7. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

    Science.gov (United States)

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-03-31

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  8. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    Science.gov (United States)

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572

  9. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kashif Saleem

    2016-03-01

    Full Text Available The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP involves an artificial immune system (AIS that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2 and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  10. Musketärid kõik kaante vahel / Ants Juske

    Index Scriptorium Estoniae

    Juske, Ants, 1956-2016

    2009-01-01

    Arvustus: Kaljo, Richard. Musketärid. Tallinn : Jutulind, 2008. Kunstialbumisse on koondatud 203 Richard Kaljo illustratsiooni Alexandre Dumas' musketäride triloogiale, mis anti välja 1950. aastate lõpul

  11. Klassikute menukus / Mai Levin

    Index Scriptorium Estoniae

    Levin, Mai, 1942-

    2010-01-01

    Richard Uutmaa näitus "Tuntud ja tundmatu Uutmaa" Tallinnas US Art Gallerys 12. detsembrini 2010. Richard Sagritsa näitus Rakvere Näitustemajas 31. jaanuarini 2011. Kuraator Teet Veispak, kujundaja Valeri Vinogradov

  12. Drama leaves

    CERN Multimedia

    2002-01-01

    A new production by Unlimited Theatre, a Leeds-based collaborative group of five actors, directors, writers and performers, interweaves two narratives. One thread concerns a train journey, during which there is a chance meeting between a wannabe stand-up comedian and a librarian on tranquillisers. Intercut is a spoof lecture by a crazed professor who seeks to use particle physics to unravel our complex lives, but whose ideas and accompanying slides grow more and more bizarre. The play entitled 'Neutrino' won the Fringe First Award at the Edinburgh.

  13. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  14. Dynamic malware analysis using IntroVirt: a modified hypervisor-based system

    Science.gov (United States)

    White, Joshua S.; Pape, Stephen R.; Meily, Adam T.; Gloo, Richard M.

    2013-05-01

    In this paper, we present a system for Dynamic Malware Analysis which incorporates the use of IntroVirt™. IntroVirt is an introspective hypervisor architecture and infrastructure that supports advanced analysis techniques for stealth-malwareanalysis. This system allows for complete guest monitoring and interaction, including the manipulation and blocking of system calls. IntroVirt is capable of bypassing virtual machine detection capabilities of even the most sophisticated malware, by spoofing returns to system call responses. Additional fuzzing capabilities can be employed to detect both malware vulnerabilities and polymorphism.

  15. The Ethics of Ironic Science in Its Search for Spoof.

    Science.gov (United States)

    Ronagh, Maryam; Souder, Lawrence

    2015-12-01

    The goal of most scientific research published in peer-review journals is to discover and report the truth. However, the research record includes tongue-in-cheek papers written in the conventional form and style of a research paper. Although these papers were intended to be taken ironically, bibliographic database searches show that many have been subsequently cited as valid research, some in prestigious journals. We attempt to understand why so many readers cited such ironic science seriously. We draw from the literature on error propagation in research publication for ways categorize citations. We adopt the concept of irony from the fields of literary and rhetorical criticism to detect, characterize, and analyze the interpretations in the more than 60 published research papers that cite an instance of ironic science. We find a variety of interpretations: some citing authors interpret the research as valid and accept it, some contradict or reject it, and some acknowledge its ironic nature. We conclude that publishing ironic science in a research journal can lead to the same troubles posed by retracted research, and we recommend relevant changes to publication guidelines.

  16. Online Shopping With Spoofing Detection Using Web and Mobile Application

    OpenAIRE

    M.Poovizhi; K.Karthika; S.Nandhini; Dr.P.Gomathi

    2018-01-01

    Abstract— E-commerce is that the shopping for marketing of products and services, or the sending of funds or knowledge, over a web and straightforward access to immense stores of reference material, email, and new avenues for advertising and data distribution, to call some. Like most technological advances, there conjointly another side: criminal hackers. Governments, companies, and personal voters round the world area unit anxious to be an area of this revolution, however, they are afraid th...

  17. Book Review: The future of spacetime. Stephen William Hawking (ed.); Kip S. Thorne, Igor Novikov, Timothy Ferris, Alan Lightman, and Richard Price, W.W. Norton & Company, 2002, 224 pp., US 25.95, ISBN 0393020223

    Science.gov (United States)

    Smeenk, Chris

    2003-12-01

    The study of Einstein's theory of general relativity experienced a renaissance beginning in the early 1960s. Prior to this resurgence of interest, general relativity was isolated from mainstream physics-admired for its elegance, perhaps, but only from a distance. The generation of students who risked their careers by entering this neglected field has now reached the age of festschrifts. In June of 2000, Caltech hosted ;Kipfest,; a conference in honor of Kip Thorne's 60th birthday. Thorne started graduate school at Princeton in 1962 and began research in general relativity under John Wheeler's guidance in the heady early days of the renaissance. Since then, he has played a prominent role in general relativity: as co-author of the influential textbook Gravitation, as a leader in research regarding astrophysical applications of Einstein's theory, and as a co-founder and chief advocate for the Laser Interferometer Gravitational Wave Observatory (LIGO), to mention a few aspects of his far-reaching work. ;Kipfest; included 14 speakers discussing fields to which Thorne has contributed. But the conference also reflected Thorne's long-standing commitment to communicating science to a general audience: Igor Novikov, Stephen Hawking, Timothy Ferris, and Alan Lightman gave popular talks at ;Kipfest,; with Thorne himself tricked into delivering a fifth. The Future of Spacetime gathers adaptations of these five lectures, along with a lengthy introductory essay by Richard Price.

  18. COMPASS: A source term code for investigating capillary barrier performance

    International Nuclear Information System (INIS)

    Zhou, Wei; Apted, J.J.

    1996-01-01

    A computer code COMPASS based on compartment model approach is developed to calculate the near-field source term of the High-Level-Waste repository under unsaturated conditions. COMPASS is applied to evaluate the expected performance of Richard's (capillary) barriers as backfills to divert infiltrating groundwater at Yucca Mountain. Comparing the release rates of four typical nuclides with and without the Richard's barrier, it is shown that the Richard's barrier significantly decreases the peak release rates from the Engineered-Barrier-System (EBS) into the host rock

  19. 78 FR 10250 - Qualification of Drivers; Exemption Applications; Vision

    Science.gov (United States)

    2013-02-13

    ...) Glen T. Garrabrant (NJ) Richard A. Guthrie (MT) Glen T. Garrabrant (NJ) Richard A. Guthrie (MT) Alan L. Johnston (IL) Bryon K. Lavender (OH) Victor M. McCants (AL) James E. Menz (NY) Dennis I. Nelson (WI...

  20. Airway Clearance Techniques (ACTs)

    Medline Plus

    Full Text Available ... North American CF Conference 2017 NACFC Carolyn and C Richard Mattingly Leadership in Mental Health Care Award ... Distinguished Scientific Achievement Award Quality Care Awards Richard C Talamo Distinguished Clinical Achievement Award Robert J Beall ...

  1. A Conversation Well Worth Remembering

    Science.gov (United States)

    Woolven-Allen, John

    2009-01-01

    To mark the 200th anniversary of Charles Darwin's birth, a special event was held at Oxford, which included a "Conversation" between Professor Richard Dawkins and Bishop Richard Harries. Here we present a personal reminiscence of the event.

  2. Gaming

    CERN Document Server

    Duke, Richard D

    2014-01-01

    Als Richard Duke sein Buch ""Gaming: The Future's Language"" 1974 veröffentlichte, war er ein Pionier für die Entwicklung und Anwendung von Planspielen in Politik, Strategieentwicklung und Management. Das Buch wurde zu einem viel zitierten Standardwerk. 2014 feiert die von Richard D. Duke gegründete International Simulation and Gaming Association (ISAGA) ihr 45-jähriges Bestehen. Gleichzeitig legt Richard D. Duke eine überarbeitete Auflage seines Klassikers vor.   Inhaltsverzeichnis TABLE OF CONTENTSAcknowledgments Preface SECTION I1. The ProblemSECTION II2. Modes of Human Communication3. Mode

  3. Countering Weapons Of Mass Destruction: A Preliminary Field Study In Improving Collaboration

    Science.gov (United States)

    2016-03-01

    with private industry avoids 140 Richard Re, “ PlayStation 2 Detonation: Controlling the Threat of...Theoretical Considerations.” Social Service Review 36, no. 2 (1962): 211–217. Re, Richard. “ PlayStation 2 Detonation: Controlling the Threat of Dual

  4. 76 FR 78234 - Medicine Bow-Routt National Forests and Thunder Basin National Grassland, Campbell County, WY...

    Science.gov (United States)

    2011-12-16

    ... DEPARTMENT OF AGRICULTURE Forest Service Medicine Bow-Routt National Forests and Thunder Basin... Supervisor, Medicine Bow-Routt National Forests and Thunder Basin National Grassland, 2250 East Richards.... Responsible Official Richard Cooksey, Deputy Forest Supervisor, Medicine Bow-Routt National Forests and...

  5. Global Logistics Management

    Science.gov (United States)

    2011-07-21

    Phillips, Richard Spencer, and Leigh Warner. Catherine Whittington served as the Board Staff Analyst. PROCESS The Task Group conducted more than...Chair) Mr. Pierre Chao Mr. William Phillips Mr. Richard Spencer Ms. Leigh Warner DBB Staff Analyst Catherine Whittington 2 Methodology

  6. Den Danske Idiomordbog. Design: Richard Almind

    DEFF Research Database (Denmark)

    Vrang, Vibeke; Bergenholt, Henning; Lund, Lena

    mere. I sidste tilfælde drejer det sig dels om en indlæringsfunktion, dels om en underholdningsfunktion. I fagsproget taler vi om lexicotainment (ordbogsunderholdning). Hvor mange idiomer findes der overhovedet på dansk? Hertil kan vi sige, at denne ordbog indeholder ca. 7.500 idiomer. Dette tal kan...... dog, alt efter, hvordan man tæller, gøres betydeligt større. Hvis vi fx tager et idiom fra idiomordbogen: gå/være (helt) ad Pommern til, tæller det som et og kun et idiom med betydningen 'gå/være meget dårligt', selv om det i praksis dækker fire varianter....

  7. the watershed case of richard steele

    African Journals Online (AJOL)

    in South Africa, such as the Society of Friends, Jehovah's Witnesses, and Seventh-day .... Africa needed prophets to call its people back to what he believed were ..... an influence on Steele's ethical formation, which was evolving in the direction of pacifism. .... defeat or humiliate the opponent, but to win his friendship and un-.

  8. Obituary: Eugene Richard Tomer, 1932-2007

    Science.gov (United States)

    Dunkl, Charles F.

    2009-01-01

    Dr. Eugene R. Tomer passed away on 2 July 2007 at his home in San Francisco, California. The cause of death was cancer. Tomer was a consulting applied mathematician with a wide range of interests in dynamical astronomy, electromagnetic theory for use in communications, and computational methods of applied mathematics. He was a member of AAS, and the Society for Applied and Industrial Mathematics [SIAM]. With K. H. Prendergast, he co-wrote the influential paper "Self-consistent Models of Elliptical Galaxies," published in the Astronomical Journal 75 (1970), 674-679. This paper has been cited over eighty times. Tomer was born on 13 June 1932. He earned the Ph.D. in Mathematics at the University of California-Berkeley in 1978 (title of dissertation: On the C*-algebra of the Hermite Operator). In 1996 he and A. F. Peterson wrote "Meeting the Challenges Presented by Computational Electromagnetics," a publication of the Naval Postgraduate School at Monterey, California. This writer met Eugene at the 1992 Annual SIAM meeting in Los Angeles in connection with the Activity Group on Orthogonal Polynomials and Special Functions, which the writer chaired at the time. Eugene volunteered to edit the Newsletter of the group, which he did from July 1992 to July 1995. Thanks to his skills and efforts, the Newsletter became a carefully edited, professional publication. Eugene not only organized a Problems Column, attracting questions in pure and applied mathematics, but he also designed the logo for the group. He gave much time and effort to this service, in an era when copy had to be physically assembled and mailed to SIAM Headquarters. Eventually he felt he had done what he could for the Activity Group. He told me that he hoped the Group would get seriously involved with applications such as in astronomy, physics, and sciences that use special function solutions of differential equations. During Tomer's editorship, we communicated mostly by e-mail, our homes being far apart. He was a good friend to the Group and to me, as much as one can be over a separation of thousands of miles. As well, Eugene was an active amateur radio operator, much appreciated by his local amateur radio community, with call sign WI6X. He left behind family, friends, and one son.

  9. the watershed case of richard steele

    African Journals Online (AJOL)

    whom the government had forcibly removed from other urban areas. This was a graphic indictment of the ... In a matter of days the blatantly interracial clash stripped away the tranquil veneer of black and white ... of its first actions came in response to a threatened removal of squat- ters near Cape Town. Steele went to the ...

  10. Research Capabilities

    Science.gov (United States)

    ; Sponsored Work Regional Economic Development Technology Opportunities User Facilities About Us Metrics In Search Site submit About Us Los Alamos National LaboratoryRichard P. Feynman Center for Innovation Innovation protecting tomorrow Los Alamos National Laboratory The Richard P. Feynman Center for Innovation

  11. NASA/DoD Aerospace Knowledge Diffusion Research Project. Report Number 6. The Relationship between the Use of U.S. Government Technical Reports by U.S. Aerospace Engineers and Scientists and Selected Institutional and Sociometric Variables

    Science.gov (United States)

    1991-01-01

    Peter R.; James D. Schriner; Bettie F. Farace ; and Richard V. Farace . The Assessment of NASA Technical Information. NASA CR-181367. Washington, DC... Farace ; and Richard V. Farace . The Assessment of NASA Technical Information. NASA CR-181367. Washington, DC: National Aeronautics and Space

  12. Developments in diagnosis and treatment of obstructive sleep apnea syndrome

    NARCIS (Netherlands)

    Richard, W.

    2012-01-01

    Wietske Richard beschrijft de ontwikkelingen in diagnose en behandeling van het obstructief slaapapneu-syndroom (OSAS). Richard ging na of verbeteringen in de technologie van beademingsmachines hebben geleid tot een beter gebruik. Verder onderzocht ze de positietherapie waarbij de apneu-patiënt

  13. V.I.T.A.L. (Vanguard Investigations of Therapeutic Approaches to Lung Cancer)

    Science.gov (United States)

    2011-01-01

    provided by Dr. Richard Pestell at the Thomas Jefferson University) and Renilla luciferase control vector using Lipofectamin 2000 (Invitrogen). After 24 h...Acknowledgements We thank Dr. Richard Pestell (Thomas Jefferson University, Philadelphia, PA) for the gift of cyclin D1 luciferase vectors

  14. The outlook for the freight market in 2002

    Energy Technology Data Exchange (ETDEWEB)

    Cherrett, D. [H. Clarkson (United Kingdom)

    2001-07-01

    A series of charts (presented as overheads/slides) show the trends in the Capesize (Richards Bay to Rotterdam), Panamax (Richards Bay to Spain/Mediterranean) and Handymax (Newcastle, Australia to Japan) markets from 1992 to date. Factors affecting the freight rates are discussed.

  15. Pallaslaste maalikunst rahvusraamatukogus / Jüri Hain

    Index Scriptorium Estoniae

    Hain, Jüri, 1941-

    2008-01-01

    Näitus "Pallaslaste maalikunst Eesti Rahvusraamatukogus" rahvusraamatukogu peanäitusesaalis kuni 6. XII. Andrus Johani, Valdemar Väli, Juhan Nõmmiku, Eerik Haameri, Endel Kõksi, Ene Falkenbergi, Silvia Leitu, Olev Mikiveri, Richard Sagritsa, Richard Uutmaa, Valerian Loigu ja Elmar Kitse töödest

  16. REAL-LIFE ACTIVITIES: BOOSTING MY STUDENTS’ AWARENESS OF HONESTY IN CREATING GENRE

    Directory of Open Access Journals (Sweden)

    Rr. Dewi Wahyu Mustikasari

    2017-04-01

    Full Text Available My students was strugled to write genre without copypasting sentences or texts from the internet. On the other hand, it was a huge challange for me to teach five big writing classes. Each class consisted of 25-30 students who tended (mostly collecting unoriginal writing works. This paper discusses the real-life activities that can be used to enhance my students’ aweareness of honesty in creating genre. My students must write some genres namely recount, descriptive (optional, spoof (optional, procedure, hortatory (optional and analytical exposition (optional text. I also took some benefits of ICT to equip the learning process. Browsing and experiencing the menu of premierskills.britishcouncil.org were the real-life activities that explore their personal memories to be told as the recount text. Then they defined the feature of one of the menu of the previous website to be informed as the descriptive text. Furthermore, they wrote their personal funny experiences which were related to the Indonesian culture as the spoof text. The procedure text can be produced by exploring the daily activities in the pictures such as how to make a cup of tea/coffee, cook a sunny side-up egg, insert sim card into mobile phone, etc. Next, my students visited the tourism and public places in Salatiga, and they observed the strength and weekness of those places as the production of hortatory or analytical exposition text. The real-life activities were able to foster my students’ awareness of honesty. It was fantastic that my students were able to create the genre honestly.

  17. Social wasp species of Mischocyttarus (Phi related to M. alfkenii (Ducke and M. paraguayensis Zikán (Hymenoptera, Vespidae, Polistinae

    Directory of Open Access Journals (Sweden)

    Orlando Tobias Silveira

    2013-06-01

    Full Text Available Social wasp species of Mischocyttarus (Phi related to M. alfkenii (Ducke and M. paraguayensis Zikán (Hymenoptera, Vespidae, Polistinae. A revision of the taxonomic status and an identification key are presented for species of the genus Mischocyttarus related to M. alfkenii (Ducke and M. paraguayensis Zikán. Seven new species are proposed in the alfkenii and basimacula groups (M. achagua sp. nov.; M. arawak sp. nov.; M. awa sp. nov.; M. embera sp. nov.; M. muisca sp. nov.; M. uniformis sp. nov.; M. waunan sp. nov., with five new synonymies [M. mamirauae Raw = M. alfkenii (Ducke; M. alfkenii excrucians Richards = M. flavicornis nigricornis Zikán = M. flavicornis Zikán; M. basimacula superpictus Richards = M. basimacula (Cameron]. Specific status is also newly recognized for M. trinitatis Richards. Two new species are described in the paraguayensis and bahiae group (M. suzannae sp. nov.; M. tayacaja sp. nov., while fifteen new synonymies are proposed (M. aracatubaensis Zikán = M. araujoi Zikán = M. costalimai Zikán = M. gilvus Zikán = M. infrastrigatoides Zikán = M. infrastrigatus Zikán = M. infrastrigatus Zikán = M. ornatulus Zikán = M. riograndensis Richards = M. rivulorum Richards = M. schrottkyi Zikán = M. scitulus Zikán = M. similaris Zikán = M. similatus Zikán = M. paraguayensis Zikán. These numbers change the picture of diversity in these species groups, as partly found in Richards's revision, published in 1978, reflecting higher diversity in northern Andean areas than in the Brazilian Atlantic region.

  18. George C. Marshalli Keskuse NATO ja Euroopa kaitsepoliitika uuringute professori hr. Richard Cohen'i ettekanne / Richard Cohen

    Index Scriptorium Estoniae

    Cohen, Richard

    2002-01-01

    Ilmunud ka: Proceedings of the 8th International conference Estonia and the European Union : Estonia on its way to a changing Europe : October 31-November 2, 2001. - Tallinn, lk. 93-97. Parlament on kõige parem töövahend tegelemaks küsimustega, mis on seotud Euroopa julgeoleku- ja kaitsepoliitikaga laiemas mõttes

  19. CHIMAMANDA NGOZI ADICHIE'S HALF OF A YELLOW SUN: A ...

    African Journals Online (AJOL)

    Dean SPGS NAU

    forefront of crying for their beloved country and telling Europe to let their people go. ... A tripartite consideration of this fall will run thus: Richard and. Kainene in pre-war .... touched his nose, there was blood on his fingers …. Richard dabbed at ...

  20. Fusion Nodes: The Next Step in Combating the Global Terrorist Threat

    Science.gov (United States)

    2011-12-01

    Answer,” Organizational Dynamics, Winter 1979: 429. 151 Richard L. Daft , Organization Theory and Design, 9th Edition (Mason, OH: Thompson: South...Morning America, 9 June 2006. Accessed 29 September 2011, http://abcnews.go.com/GMA/Terrorism/story?id=2056386&page=1. Daft , Richard L

  1. Problems of Metaphor, Film, and Perception

    DEFF Research Database (Denmark)

    Langkjær, Birger

    2015-01-01

    of happy extra trick with words” (Richards 1972 [1936], 90); in the modern view it is creative, interactive, and also part of everyday language (Richards 1972 [1936]; Black 1962). Despite these differences, both decorative and creative views conceive metaphors as specific and manifest stylistic features...

  2. Balancing Act: The U. S. Military’s Reliance on Contractors to Fulfill Operational-Level Logistical Requirements

    Science.gov (United States)

    2014-05-15

    Military Sealift Command. Combat Logistics Force (PM1), 1. 40 Ibid. 41 Michael Marquez, Richard Rayos, and John Mercado . Standard Port-Visit Forecasting...Series no. 8 (2012). Marquez, Michael, John Mercado , and Richard Rayos. Standard Port-Visit Forecasting Model for U.S. Navy Husbanding

  3. High-Performance Government: Structure, Leadership, Incentives

    Science.gov (United States)

    2005-01-01

    serves on several corporate boards. Richard Ravitch Richard Ravitch is the Co-Chair of the bipartisan Millennial Housing Commission, a congressionally...business schools, and a few venturesome public policy schools. Yet if leaders, like entrepreneurs (not to mention scholars), are partly born, they are

  4. A review and analysis of Easter Island's traditional and artisan fisheries

    Directory of Open Access Journals (Sweden)

    Juan Carlos Castilla

    2014-10-01

    Full Text Available Based on a review of published and unpublished reports we analyzed Rapa Nui's (Easter Island traditional and artisan fisheries. We include information from 2000-2009 on landings, species, fishing grounds, fleet and number of fisherfolks according to the Servicio Nacional de Pesca (SERNAPESCA and personal communication with SERNAPESCA officials. Presently, 29 species of fishes and two invertebrates are fished (along with a group of species reported as "non-identified", primarily from the 10 main fishing grounds within 5 nm from the shore. Sporadic fishing trips reach areas up to 25 nm offshore. Statistics about the artisan fleet and number of operative fishers is spotty and unreliable. In 2011 SERNAPESCA reported 123 artisan fishers and 31 boats for the island. Landings occur in five coves, of which Hanga Piko and Hanga Roa are the most important. Between 2000-2009 the mean annual landing ranged between 109-171 ton. The main exploited resources during this period were yellowfin tuna, snoek, Pacific rudderfin, rainbow runner, glasseye, oilfish, deep-water jack and swordfish. We highlight the urgent need to improve fisheries statistics (catch, effort, fishing grounds in order to develop a science-fishery management and conservation plan, particularly linked with artisan fishery activities. Globally, we identify the need to integrate across fields (i.e., ecology, conservation, fisheries, education, outreach more broadly in the national research system, to improve the management and conservation of Easter Island's unique marine environment. Within this framework, we identify an urgent need to create a research marine station on the island with permanent personnel, which can focus on this fragile oligotrophic ecosystem.

  5. Cannes : türgi eksistentsialism ja ameerika kiirtoit / Annika Koppel

    Index Scriptorium Estoniae

    Koppel, Annika

    2006-01-01

    Cannes'i filmifestival. Nähtud filmidest : türklase Nuri Bilge Ceylani "Kliima", soomlase Aki Kaurismäki "Äärelinna tuled", inglase Andrea Arnoldi "Punane tänav" ("Red Road"), ameeriklase Richard Linklateri "Kiirtoidurahvas" ("Fast Food Naton") ja samuti ameeriklase Richard Kelly "Lõuna jutud" ("Southland Tales")

  6. Naval Sea Systems Command > Home > Warfare Centers > NSWC Corona

    Science.gov (United States)

    . Richard A. Braunbeck III Capt. Stephen H. Murray, left, salutes his relief, Capt. Richard A. Braunbeck III -321 NORCO, Calif. (Dec. 7, 2016) Capt. Stephen H. Murray, commanding officer of Naval Surface... https ): Dewin Andujar (Virtual Reality); Nicholas Manning (Maritime Capture the Flag); Stephen O'Grady

  7. Implementation of a physically based water percolation routine in the Crocus/SURFEX (V7.3 snowpack model

    Directory of Open Access Journals (Sweden)

    C. J. L. D'Amboise

    2017-09-01

    Full Text Available We present a new water percolation routine added to the one-dimensional snowpack model Crocus as an alternative to the empirical bucket routine. This routine solves the Richards equation, which describes flow of water through unsaturated porous snow governed by capillary suction, gravity and hydraulic conductivity of the snow layers. We tested the Richards routine on two data sets, one recorded from an automatic weather station over the winter of 2013–2014 at Filefjell, Norway, and the other an idealized synthetic data set. Model results using the Richards routine generally lead to higher water contents in the snow layers. Snow layers often reached a point at which the ice crystals' surface area is completely covered by a thin film of water (the transition between pendular and funicular regimes, at which feedback from the snow metamorphism and compaction routines are expected to be nonlinear. With the synthetic simulation 18 % of snow layers obtained a saturation of  >  10 % and 0.57 % of layers reached saturation of  >  15 %. The Richards routine had a maximum liquid water content of 173.6 kg m−3 whereas the bucket routine had a maximum of 42.1 kg m−3. We found that wet-snow processes, such as wet-snow metamorphism and wet-snow compaction rates, are not accurately represented at higher water contents. These routines feed back on the Richards routines, which rely heavily on grain size and snow density. The parameter sets for the water retention curve and hydraulic conductivity of snow layers, which are used in the Richards routine, do not represent all the snow types that can be found in a natural snowpack. We show that the new routine has been implemented in the Crocus model, but due to feedback amplification and parameter uncertainties, meaningful applicability is limited. Updating or adapting other routines in Crocus, specifically the snow compaction routine and the grain metamorphism routine, is needed

  8. Telehealth in the Developing World | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Telehealth in the Developing World. Couverture du livre Telehealth in the Developing World. Directeur(s) : Richard Wootton, Nivritti G. Patil, Richard E. Scott, et Kendall Ho. Maison(s) d'édition : Royal Society of Medicine Press, CRDI. 24 février 2009. ISBN : 9781853157844. 324 pages. e-ISBN : 9781552503966.

  9. Transforming Higher Education in the Information Age: Presidents Respond.

    Science.gov (United States)

    Breslin, Richard D.; And Others

    1991-01-01

    College presidents respond to an article by Richard Nolan challenging college and university presidents and chancellors to transform their campuses for survival and competitive advantage in the information age. Respondents include Richard D. Breslin, David M. Clarke, Joseph Cronin, Thomas Ehrlich, Donald N. Langenberg, Harold McAninch, and Donald…

  10. Trochanteric fractures

    International Nuclear Information System (INIS)

    Herrlin, K.; Stroemberg, T.; Lidgren, L.; Walloee, A.; Pettersson, H.; Lund Univ.

    1988-01-01

    Four hundred and thirty trochanteric factures operated upon with McLaughlin, Ender or Richard's osteosynthesis were divided into 6 different types based on their radiographic appearance before and immediately after reposition with special reference to the medial cortical support. A significant correlation was found between the fracture type and subsequent mechanical complications where types 1 and 2 gave less, and types 4 and 5 more complications. A comparison of the various osteosyntheses showed that Richard's had significantly fewer complications than either the Ender or McLaughlin types. For Richard's osteosynthesis alone no correlation to fracture type could be made because of the small number of complications in this group. (orig.)

  11. Integrated Program on Malaria in sub-Saharan Africa (IPMA) : Call ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Chargé(e) de projet. Wolfgang Richard Mukabana. Chargé(e) de projet. Prof. Richard Mukabana. Institution. International Centre of Insect Physiology and Ecology. Pays d' institution. Kenya. Site internet. http://nbo.icipe.org/. Chargé(e) de projet. Omer Hema. Institution. Institut de l'environnement et de recherches agricoles.

  12. Management of the Air Force Backlog of Maintenance and Repair.

    Science.gov (United States)

    1983-09-01

    1. Chase, Richard B., and Nicholas J. Aquilano. Production and Operations Management. Homewood IL: Richard D. Irwin, Inc., 1981. - 2. Descartes , Rene ...addition to the request, the apparently out-of-control growth of the BMAR is in itself worthy of study. Descartes said, "The end of study should be to

  13. NASA/DoD Aerospace Knowledge Diffusion Research Project, Paper Eleven: The Voice of the User-How U.S. Aerospace Engineers and Scientists View DoD Technical Reports

    Science.gov (United States)

    1991-05-01

    34 (May/June 1981): 331-339. Technical Writing Teacher 4:3 (Spring 1977): 83-88. Monge, Peter R.; James D. Schriner; Bettie F. Farace ; and Dewhirst, H...Dudley; Richard D. Avery; and Edward Richard V. Farace . The Assessment of NASA Tech- M. Brown. "Satisfaction and Performance in Re- nical

  14. Testing Testing Testing.

    Science.gov (United States)

    Deville, Craig; O'Neill, Thomas; Wright, Benjamin D.; Woodcock, Richard W.; Munoz-Sandoval, Ana; Gershon, Richard C.; Bergstrom, Betty

    1998-01-01

    Articles in this special section consider (1) flow in test taking (Craig Deville); (2) testwiseness (Thomas O'Neill); (3) test length (Benjamin Wright); (4) cross-language test equating (Richard W. Woodcock and Ana Munoz-Sandoval); (5) computer-assisted testing and testwiseness (Richard Gershon and Betty Bergstrom); and (6) Web-enhanced testing…

  15. Better Bankers Book Symposium

    DEFF Research Database (Denmark)

    Ringe, Georg

    2016-01-01

    Book review of: "Better Bankers, Better Banks: Promoting Good Business Through Contractual Commitment" by: Claire A Hill and Richard W. Painter (University of Chicago Press, 2015).......Book review of: "Better Bankers, Better Banks: Promoting Good Business Through Contractual Commitment" by: Claire A Hill and Richard W. Painter (University of Chicago Press, 2015)....

  16. Kommunikation og sprog

    DEFF Research Database (Denmark)

    Togeby, Ole

    2009-01-01

    Oversigt over hvilke modeller der findes for sprogets rolle i kommunikation: Shannon og Weaver, Saussure, Peirce, Austin, Searle, Grice, Bloomfield, Ogden & Richards, Bateson, Watzlawick, Roman Jakobson,......Oversigt over hvilke modeller der findes for sprogets rolle i kommunikation: Shannon og Weaver, Saussure, Peirce, Austin, Searle, Grice, Bloomfield, Ogden & Richards, Bateson, Watzlawick, Roman Jakobson,...

  17. Kommunikation og sprog

    DEFF Research Database (Denmark)

    Togeby, Ole

    2016-01-01

    Oversigt over hvilke modeller der findes for sprogets rolle i kommunikation: Shannon og Weaver, Saussure, Peirce, Austin, Searle, Grice, Bloomfield, Ogden & Richards, Bateson, Watzlawick, Roman Jakobson,......Oversigt over hvilke modeller der findes for sprogets rolle i kommunikation: Shannon og Weaver, Saussure, Peirce, Austin, Searle, Grice, Bloomfield, Ogden & Richards, Bateson, Watzlawick, Roman Jakobson,...

  18. Dawkins' Udvalg

    DEFF Research Database (Denmark)

    Hansen, Brian

    2008-01-01

    Om antologien The Oxford Book of Modern Science Writing, hvor et udvalg af de dygtigste formidlere af naturvidenskab er samlet. Bogen er redigeret af Richard Dawkins.......Om antologien The Oxford Book of Modern Science Writing, hvor et udvalg af de dygtigste formidlere af naturvidenskab er samlet. Bogen er redigeret af Richard Dawkins....

  19. Distribution and Abundance of the Interior Population of the Least Tern (Sternula Antillarum), 2005; A Review of the First Complete Range-Wide Survey in the Context of Historic and Ongoing Monitoring Efforts

    Science.gov (United States)

    2006-11-01

    Richard A. Fischer and Michael P. Guilfoyle (ERDC-EL). When this study was performed, COL Richard B. Jenkins was Commander and Executive Director of ERDC...Engineers, Tulsa District. 65 pp. Haig, S. M., C. L. Ferland, R. J. Cuthbert, J. Dingledine, J. P. Goossen , A. Hecht, and N. McPhillips. 2005. A

  20. Skalak's extended theory of water hammer

    NARCIS (Netherlands)

    Tijsseling, A.S.; Lambert, M.F.; Simpson, A.R.; Stephens, M.L.; Vítkovský, J.P.; Bergant, A.

    2008-01-01

    Half a century ago Richard Skalak [see T.C. Skalak, A dedication in memoriam of Dr. Richard Skalak, Annual Review of Biomedical Engineering 1 (1999) 1–18] published a paper with the title "An extension of the theory of water hammer" [R. Skalak, An Extension of the Theory of Water Hammer, PhD Thesis,

  1. Telehealth in the Developing World | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Telehealth in the Developing World. Book cover Telehealth in the Developing World. Directeur(s) : Richard Wootton, Nivritti G. Patil, Richard E. Scott, and Kendall Ho. Maison(s) d'édition : Royal Society of Medicine Press, IDRC. 24 février 2009. ISBN : 9781853157844. 324 pages. e-ISBN : 9781552503966. Téléchargez le ...

  2. FOREWORD: Foreword from Peter Adams Foreword from Peter Adams

    Science.gov (United States)

    Adams, Peter D.

    2009-11-01

    As part of this twentieth anniversary special issue I was asked to write a few words about Richard Palmer, the one permanent fixture on the journal over its twenty year history. Richard and I go back a (very) long way! He began his career at IOP Publishing in Bristol in 1971 while my publishing career with the American Physical Society began a little earlier, located at Brookhaven National Laboratory on Long Island NY. Since then, and for nearly forty years we have met often, if irregularly, at many locations throughout the world. As members of two very strong physics organizations we were clearly in competition with each other to seek out and publish the best physics research. At the same time we frequently exchanged experiences and policy ideas for dealing with serious violations of scientific ethical standards and how academic society-run journals can best serve the general scientific community. Overall my relationship with Richard has been a most rewarding one and I shall miss his opinions and sage advice. Richard: Compatriot; competitor; collaborator; I salute you!

  3. Terahertz plasmonic Bessel beamformer

    International Nuclear Information System (INIS)

    Monnai, Yasuaki; Shinoda, Hiroyuki; Jahn, David; Koch, Martin; Withayachumnankul, Withawat

    2015-01-01

    We experimentally demonstrate terahertz Bessel beamforming based on the concept of plasmonics. The proposed planar structure is made of concentric metallic grooves with a subwavelength spacing that couple to a point source to create tightly confined surface waves or spoof surface plasmon polaritons. Concentric scatterers periodically incorporated at a wavelength scale allow for launching the surface waves into free space to define a Bessel beam. The Bessel beam defined at 0.29 THz has been characterized through terahertz time-domain spectroscopy. This approach is capable of generating Bessel beams with planar structures as opposed to bulky axicon lenses and can be readily integrated with solid-state terahertz sources

  4. Optimised quantum hacking of superconducting nanowire single-photon detectors.

    Science.gov (United States)

    Tanner, Michael G; Makarov, Vadim; Hadfield, Robert H

    2014-03-24

    We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.

  5. Optimised quantum hacking of superconducting nanowire single-photon detectors

    Science.gov (United States)

    Tanner, Michael G.; Makarov, Vadim; Hadfield, Robert H.

    2014-03-01

    We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.

  6. Salome/Salomé

    DEFF Research Database (Denmark)

    Hallbäck, Geert

    2016-01-01

    En sammenligning af teksten til Oscar Wildes teaterstykke Salome med Richard Strauss libretto til operaen Salomé. Librettoen er baseret på teaterteksten, men forkortet med ca. 50%.......En sammenligning af teksten til Oscar Wildes teaterstykke Salome med Richard Strauss libretto til operaen Salomé. Librettoen er baseret på teaterteksten, men forkortet med ca. 50%....

  7. The Conflict Pyramid: A Holistic Approach to Structuring Conflict Resolution in Schools

    Science.gov (United States)

    Hakvoort, Ilse

    2010-01-01

    This paper examines how the conflict pyramid, originally defined and used by Richard Cohen, can be used as a model to describe the relations between different conflict resolution education programs and activities included in the programs. The central questions posed in the paper are: How can Richard Cohen's conflict pyramid be used as a model for…

  8. OBITUARY

    African Journals Online (AJOL)

    It is with great sadness that I report the death of my friend and colleague, Richard Anthony Venniker, on 27 October. 2017. Richard, the son of Tony Venniker, a well-known radio doctor and Durban-based family practitioner, was born in. London on 2 July 1948. He was educated at the Convent. School in Barkly East, De La ...

  9. Avoiding a Din at Dinner or, Teaching Students to Argue for Themselves: Year 13 Plan a Historians' Dinner Party

    Science.gov (United States)

    Richards, Keeley

    2012-01-01

    Keeley Richards secured a fundamental shift in some of her Year 13 students' ability to argue. She did it by getting them to engage more fully with the practice of argument itself, as enacted by four historians. At the centre of her lesson sequence was an original activity: the historians' dinner party. Richards uses this activity to point to…

  10. Kättpidi Veneetsias / Karin Paulus

    Index Scriptorium Estoniae

    Paulus, Karin, 1975-

    2006-01-01

    Muljeid X rahvusvaheliselt Veneetsia arhitektuuribiennaalilt "Linnad. Arhitektuur ja ühiskond", kuraator Richard Burdett. Ülar Margi kureeritud projektist "Joint Space", kommenteerib Rein Ahas. Väljavõtteid Rem Koolhaasi ja Jacques Herzogi esinemisest Arsenales. Andres Sevtshuki kureeritud projektist. Kuldlõvi auhinna pälvis inglise arhitekt Richard Rogers (sünd. 1933). Bernard Tschumi elliptilise linna projekti kommenteerib Kaja Pae

  11. Autor pole kapten Corelliga rahul / Richard Brooks

    Index Scriptorium Estoniae

    Brooks, Richard

    2001-01-01

    Menuromaani "Kapten Corelli mandoliin" autori Louis de Bernieres'i hinnanguid samanimelise filmi kohta : "Captain Corelli's Mandolin" : režissöör John Madden : Suurbritannia-Prantsusmaa-Ameerika Ühendriigid 2001

  12. Economic Thinking from Hesiod to Richard Cantillon

    Directory of Open Access Journals (Sweden)

    Gina Ioan

    2016-05-01

    Full Text Available The paper makes an analysis between the two effects, considering the general case of an Allen utility function. We can say that about economics that it is a relatively young science, economic and social phenomena we find debated in philosophical thinking of Hesiod Xenophon, Plato, Aristotle. These phenomena were only economic management rules of common affairs of the city. Thus, the study of the economy began to emerge timidly, gaining not only the form that we know it today, but also the importance for a developed society, the very cornerstone of its.

  13. Richards-like two species population dynamics model.

    Science.gov (United States)

    Ribeiro, Fabiano; Cabella, Brenno Caetano Troca; Martinez, Alexandre Souto

    2014-12-01

    The two-species population dynamics model is the simplest paradigm of inter- and intra-species interaction. Here, we present a generalized Lotka-Volterra model with intraspecific competition, which retrieves as particular cases, some well-known models. The generalization parameter is related to the species habitat dimensionality and their interaction range. Contrary to standard models, the species coupling parameters are general, not restricted to non-negative values. Therefore, they may represent different ecological regimes, which are derived from the asymptotic solution stability analysis and are represented in a phase diagram. In this diagram, we have identified a forbidden region in the mutualism regime, and a survival/extinction transition with dependence on initial conditions for the competition regime. Also, we shed light on two types of predation and competition: weak, if there are species coexistence, or strong, if at least one species is extinguished.

  14. August Kingu reisikaaslane Richard Vilmansen / Rein Saukas

    Index Scriptorium Estoniae

    Saukas, Rein, 1947-

    2008-01-01

    Bibl. lk. 212. Ette kantud 25. oktoobril 2007 Akadeemilise Rahvaluule Seltsi kogumiskonverentsil "Võõrsil ja kodus". R. Vilmansen osales ühel rahvaluule kogumismatkal - koos August Kinguga Vaivara kihelkonnas 1913. a. kevadsuvel

  15. 78 FR 13068 - Richard Stowell: Debarment Order

    Science.gov (United States)

    2013-02-26

    ... three felony counts under Federal law for conduct relating to the importation into the United States of... to commit an offense against the United States. Specifically, Mr. Stowell's company United purchased... of Malaysia,'' and ``Shrimp, Product of Indonesia.'' Mr. Stowell then sent the shrimp to another...

  16. Benefits, Harms, and Costs of Osteoporosis Screening in Male Veterans

    Science.gov (United States)

    2016-10-01

    fall -related co- morbidities, medications, and glycemic control . Significant results, Major Findings. Full copies of published papers are also...Research Annual Meeting, September 2016 Background Older adults develop age-related decline in kidney function and are increasingly diagnosed with...Type 2 Diabetes, Glycemic Control , and Fracture Risk among Older Male Veterans. Richard Lee, Richard Sloane, Carl Pieper, Cathleen Colón-Emeric

  17. Smart and intelligent sensor payload project

    Science.gov (United States)

    2009-01-01

    Engineers working on the smart and intelligent sensor payload project include (l to r): Ed Conley (NASA), Mark Mitchell (Jacobs Technology), Luke Richards (NASA), Robert Drackett (Jacobs Technology), Mark Turowski (Jacobs Technology) , Richard Franzl (seated, Jacobs Technology), Greg McVay (Jacobs Technology), Brianne Guillot (Jacobs Technology), Jon Morris (Jacobs Technology), Stephen Rawls (NASA), John Schmalzel (NASA) and Andrew Bracey (NASA).

  18. Semiannual Report, April 1 1999 through September 30, 1999.

    Science.gov (United States)

    1999-11-01

    Nonlinear Difference Equation Models from Data for Flow Control Richard Longman Modern feedback control system design methods usually make use of a...Layer" Goossens , Serge, Katholieke Universitaeit, Belgium July 22 "Two-level Algorithms for Overlapping Composite Mesh Difference Methods" Taft, James...Physical Sciences - Flow Control Llorente, Ignacio Applied & Numerical Math Longman, Richard Physical Sciences - Flow Control University of Paris

  19. Book review: Foundations of wildlife diseases

    Science.gov (United States)

    van Riper, Charles

    2016-01-01

    A new textbook for practitioners and students of wildlife disease is available. Rick Botzler and Richard Brown have provided an excellent addition to the wildlife disease literature with Foundations of Wildlife Diseases. It has been 8 years since the last major wildlife disease book (Wobeser 2006), and over 40 years since the first major wildlife disease compilation (Page 1975), an edited summary of the 3rd International Wildlife Disease meeting in Munich, Germany. Many people interested in wildlife diseases have waited eagerly for this book, and they will not be disappointed.Book information: Foundations of Wildlife Diseases. By Richard G. Botzler and Richard N. Brown. University of California Press, Oakland, California, USA. 2014. 429 pp., viii preface material. ISBN: 9780520276093. 

  20. Co-payments in the NHS: an analysis of the normative arguments.

    Science.gov (United States)

    Weale, Albert; Clark, Sarah

    2010-04-01

    During 2008, some forms of patient co-payments - in particular, patients paying privately for additional medicines as part of an episode of care in the National Health Service - became controversial in political and policy terms in the UK. In response, the UK Government published a report, the Richards' Review, examining the issues. Richards offered a particular policy solution, but also touched on fundamental principles of social value. Using the methods of normative policy analysis, we seek to understand these principles of social value, accepting the Richards' framework according to which the relevant arguments can be grouped under the broad headings of equity and autonomy. None of the arguments on either side are decisive, and, in part, the policy decision turns on uncertain empirical conjectures.

  1. Launching biosimilar rituximab: an industry opinion on biosimilar uptake in Europe.

    Science.gov (United States)

    Trollope, Richard; Johnson, Sue; Ireland, Henry

    2017-06-01

    Richard Trollope and Sue Johnson talk with Henry Ireland, Senior Editor about the recent approval of biosimilar rituximab (Truxima ® ) & the current state of biosimilar uptake across Europe Richard Trollope, Head of Biosimilars, Mundipharma International Limited, qualified as a biochemist before joining Wyeth's commercial operations, prior to its acquisition by Pfizer. Richard later joined Yamanouchi Pharmaceuticals (now Astellas Pharma). His fascination with oncology led him to join Mundipharma in Europe and after joining the company's UK arm (Napp Pharmaceuticals Limited), Richard began his journey in biosimilars. He now heads up the biosimilar franchise at Mundipharma International as it launches biosimilar rituximab (Truxima ® ) - the first biosimilar monoclonal antibody for the treatment of cancer, which will be distributed by Napp Pharmaceuticals in the UK. Sue Johnson, PhD, Medical Insights at Mundipharma International Limited, is a scientist by background and completed her postdoc fellowship at Harvard Medical School. On returning to the UK, she began her career in the pharmaceutical industry, working in UK Medical Affairs before transitioning to a European role with Mundipharma 2 years ago, where she leads on Medical Insights for the biosimilars franchise.

  2. Vectors and Rotations in 3-Dimensions: Vector Algebra for the C++ Programmer

    Science.gov (United States)

    2016-12-01

    release; distribution is unlimited. 1. Introduction This report describes 2 C++ classes: a Vector class for performing vector algebra in 3-dimensional...ARL-TR-7894•DEC 2016 US Army Research Laboratory Vectors and Rotations in 3-Dimensions:Vector Algebra for the C++ Programmer by Richard Saucier...Army Research Laboratory Vectors and Rotations in 3-Dimensions:Vector Algebra for the C++ Programmer by Richard Saucier Survivability/Lethality

  3. The relationship between ethics and human rights in the thought of Richard Rorty

    Directory of Open Access Journals (Sweden)

    Mohammad Taghi Qezelsofla

    2014-04-01

    Full Text Available In general, two theories or school of thoughts had been prevailed in modern moral philosophies until recently. Ethical school of thought of "task-oriented", in which the emphasis is on the nature of the action. At first, this school of thought was considered by Immanuel Kant. Accordingly, doing or will to do every action should be such that become a universal moral law. In contrast, another ethical school of thought known as "utilitarianism ethics" was introduced by Jeremy Bentham and John Stuart Mill. Here, we give priority to those moral actions that can bring the greatest happiness for most people. In three or four recent decades, coinciding with the linguistic and cognitive turn, which has become known as the transition from positivism to post-positivism, another challenge has been raised in discussing philosophy of ethics by Richard Rorty which is related to his claim regarding the requirements of the current multiple world. This claim can make a new relation between morality and human rights. Hence, the main hypothesis of this paper is to clarify the point that Rorty has raised his claim by combining the theory of pragmatism and postmodern Ethics. To prove this hypothesis, this article has been set in two sections, in the first section in order to become familiar with Rorty's creed-breaker thought, the foundations of the philosophy of ethics is discussed. In the second section and under the discussion of ethics based on the rights of human, some of its characteristics will be analyzed. This article has been prepared by a descriptive method through the content analysis of various works of Rorty. Theoretical support for this article is a critical-normative approach. به طور کلی در فلسفه‌های اخلاق مدرن تا این اواخر دو نگره یا مکتب حاکم بوده است. مکتب اخلاق «وظیفه‌گرا»که در آن بر ماهیت کنش تأکید می‌شود. این مکتب ابتدا

  4. Guiding, bending, and splitting of coupled defect surface modes in a surface-wave photonic crystal

    Energy Technology Data Exchange (ETDEWEB)

    Gao, Zhen; Gao, Fei [Division of Physics and Applied Physics, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore, Singapore 637371 (Singapore); Zhang, Baile, E-mail: blzhang@ntu.edu.sg [Division of Physics and Applied Physics, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore, Singapore 637371 (Singapore); Centre for Disruptive Photonic Technologies, Nanyang Technological University, Singapore, Singapore 637371 (Singapore)

    2016-01-25

    We experimentally demonstrate a type of waveguiding mechanism for coupled surface-wave defect modes in a surface-wave photonic crystal. Unlike conventional spoof surface plasmon waveguides, waveguiding of coupled surface-wave defect modes is achieved through weak coupling between tightly localized defect cavities in an otherwise gapped surface-wave photonic crystal, as a classical wave analogue of tight-binding electronic wavefunctions in solid state lattices. Wave patterns associated with the high transmission of coupled defect surface modes are directly mapped with a near-field microwave scanning probe for various structures including a straight waveguide, a sharp corner, and a T-shaped splitter. These results may find use in the design of integrated surface-wave devices with suppressed crosstalk.

  5. Current and Ongoing Internet Crime Tendencies and Techniques. Preventive Legislation Measures in Romania

    Directory of Open Access Journals (Sweden)

    Florin Postolache

    2010-06-01

    Full Text Available Internet crime techniques that pilfer from victims millions each year continue to plague the Internet through a range of methods. Trends and techniques identified by many organizations along with itsdescription are followed by preventative measures that will support you in being informed prior to entering into dealings and transactions over the Internet. Techniques as Auction Fraud, Counterfeit Cashier's Check, Credit Card Fraud, Debt Elimination, Parcel Courier Email Scheme, Employment/Business Opportunities,Escrow Services Fraud, Identity Theft, Internet Extortion, Investment Fraud, Lotteries, Nigerian Letter or "419", Phishing/Spoofing, Ponzi/Pyramid, Reshipping, Spam, Third Party Receiver of Funds are clarified in this paper and, also the internet crime prevention and legislative measures are treated, too.

  6. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2013-01-01

    Full Text Available We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP, Diffie-Hellman problem (DHP, and the one-way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.

  7. Biometric security and privacy opportunities & challenges in the big data era

    CERN Document Server

    Al-maadeed, Somaya; Bouridane, Ahmed; Crookes, Prof; Beghdadi, Azeddine

    2017-01-01

    This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as quality issue, biometric template protection, and anti-spoofing. The book also focuses on several emerging topics such as big data issues, mobile biometrics and multispectral biometrics, and includes a number of new biometrics such as vein pattern, acoustic biometrics, eye-blinking EOG, ECG, gait and handwriting. Authors also show how to use biometrics in cyber security applications and its relevant legal matters under EU legislation. The contributors cover the topics, their methods, and their applications in depth.

  8. Directional antenna array (DAA) for communications, control, and data link protection

    Science.gov (United States)

    Molchanov, Pavlo A.; Contarino, Vincent M.

    2013-06-01

    A next generation of Smart antennas with point-to-point communication and jam, spoof protection capability by verification of spatial position is offered. A directional antenna array (DAA) with narrow irradiation beam provides counter terrorism protection for communications, data link, control and GPS. Communications are "invisible" to guided missiles because of 20 dB smaller irradiation outside the beam and spatial separation. This solution can be implemented with current technology. Directional antennas have higher gain and can be multi-frequency or have wide frequency band in contrast to phase antenna arrays. This multi-directional antenna array provides a multi-functional communication network and simultaneously can be used for command control, data link and GPS.

  9. Guiding, bending, and splitting of coupled defect surface modes in a surface-wave photonic crystal

    International Nuclear Information System (INIS)

    Gao, Zhen; Gao, Fei; Zhang, Baile

    2016-01-01

    We experimentally demonstrate a type of waveguiding mechanism for coupled surface-wave defect modes in a surface-wave photonic crystal. Unlike conventional spoof surface plasmon waveguides, waveguiding of coupled surface-wave defect modes is achieved through weak coupling between tightly localized defect cavities in an otherwise gapped surface-wave photonic crystal, as a classical wave analogue of tight-binding electronic wavefunctions in solid state lattices. Wave patterns associated with the high transmission of coupled defect surface modes are directly mapped with a near-field microwave scanning probe for various structures including a straight waveguide, a sharp corner, and a T-shaped splitter. These results may find use in the design of integrated surface-wave devices with suppressed crosstalk

  10. Qualitative Considerations of Nuclear Forces at Lower Numbers and Implications for Future Arms Control Negotiations

    Science.gov (United States)

    2012-07-01

    source of dangerous and confused policy guidance. Pifer, Steven, Richard C. Bush, Vanda Felbab- Brown , Martin S. Indyk, Michael O’Hanlon and Kenneth M...Japanese hedging option, while progressives, including Gareth Evans, are committed to global reductions of nuclear weapons. South Korea is primarily...September 2009. http://www.mda.mil/global/documents/pdf/paa.pdf Pifer, Steven, Richard C. Bush, Vanda Felbab- Brown , Martin S. Indyk, Michael E

  11. A Measurement of Charged and Neutral Elementary Particles Emitted from Antiproton Annihilation at Rest in Heavy Nuclei

    Science.gov (United States)

    1989-06-15

    The Pennsylvania State University 2 1. Smith. G.A.: The elementary structure of matter. Richard, J.-M.. College of Science Aslanides . E., Boccara. N...1987) J.-M. Richard, E. Aslanides and N. Boccara, Springer p. 149. ~ il - c r D f C Z o C- S C W 3: c x 2 0 a : at~ a ,a TC jc g, cm m, 0 a, w 0 0C C

  12. MATLAB algorithm to implement soil water data assimilation with the Ensemble Kalman Filter using HYDRUS.

    Science.gov (United States)

    Valdes-Abellan, Javier; Pachepsky, Yakov; Martinez, Gonzalo

    2018-01-01

    Data assimilation is becoming a promising technique in hydrologic modelling to update not only model states but also to infer model parameters, specifically to infer soil hydraulic properties in Richard-equation-based soil water models. The Ensemble Kalman Filter method is one of the most widely employed method among the different data assimilation alternatives. In this study the complete Matlab© code used to study soil data assimilation efficiency under different soil and climatic conditions is shown. The code shows the method how data assimilation through EnKF was implemented. Richards equation was solved by the used of Hydrus-1D software which was run from Matlab. •MATLAB routines are released to be used/modified without restrictions for other researchers•Data assimilation Ensemble Kalman Filter method code.•Soil water Richard equation flow solved by Hydrus-1D.

  13. A Model for the Ordering and Distribution of the Influenza Vaccine

    Science.gov (United States)

    2006-06-01

    virus. The three types of human influenza viruses are H1N1, H1N2 , and H3N2. Influenza type A viruses are constantly changing and this requires...ORDERING AND DISTRIBUTION OF THE INFLUENZA VACCINE by James Richard Gurr June 2006 Thesis Advisor: Walter Owen Second Reader: Moshe...Ordering and Distribution of the Influenza Vaccine 6. AUTHOR(S) James Richard Gurr 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME(S) AND

  14. Detect and Defeat - The Complexities of Accomplishing the HLS Mission with Existing Intelligence Collection Practices

    Science.gov (United States)

    2007-09-01

    Community’s Five Year: Strategic Human Capital Plan (Washington, D.C.: Government Printing Office, 2006), 5-6, 8. 13 Richard Posner, Not a Suicide Pact... overworked Border Patrol agents, and have added the movement of personnel into the United States by means of ground transportation and human smugglers to...last accessed 5 July 2007]. Posner, Richard. Not a Suicide Pact: The Constitution in a Time of National Emergency. New York, NY: Oxford

  15. Scalable Biomarker Discovery for Diverse High-Dimensional Phenotypes

    Science.gov (United States)

    2015-11-23

    William D. Shannon, Richard R. Sharp, Thomas J. Sharpton, Narmada Shenoy, Nihar U. Sheth, Gina A. Simone, Indresh Singh, Chris S. Smillie, Jack D... William D. Shannon, Richard R. Sharp, Thomas J. Sharpton, Narmada Shenoy, Nihar U. Sheth, Gina A. Simone, Indresh Singh, Christopher S. Smillie, Jack D...Susanne J. Szabo, Jeff Porter, Harri Lähdesmäki, Curtis Huttenhower, Dirk Gevers, Thomas W. Cullen , Mikael Knip, on behalf of the DIABIMMUNE Study Group

  16. Women in Combat: The Case for Combat Exclusion

    Science.gov (United States)

    1993-03-03

    Bass, 1978), p. 186. Quoting R. Lewontin. 8. See Richard Dawkins , The Selfish Gene (New York: Oxford University Press, 1989), Chapter 9. 9. Mauck, p...Howard and Peter Paret. Princeton, NJ: Princeton University Press, 1976. Dawkins , Richard. The Selfish Gene . New York: The Oxford University Press...aggression in men to a biological predisposition" and note that male visual-spatial ability may be linked to a "recessive sex linked gene .൵ Though their

  17. Civilian Protection in the Eastern DRC: Evaluation of the MONUSCO Peacekeeping Operation

    Science.gov (United States)

    2012-03-01

    Richard Shelly Hartigan, Civilian Victims in War: A Political History (Chicago: Precedent Publishers, 2010), 5–6. 32 Ibid., 7. 33 Martha Finnemore...in the DRC, and also because it casts light on the convoluted reality of violence in the eastern Congo. That is, it presents a visceral example of how...be Anonymous,’” National Public Radio World News, 6 April 2011. Hartigan, Richard Shelly . Civilian Victims in War: A Political History. Chicago

  18. Automatic Design of a Maglev Controller in State Space

    Science.gov (United States)

    1991-12-01

    Design of a Maglev Controller in State Space Feng Zhao Richard Thornton Abstract We describe the automatic synthesis of a global nonlinear controller for...the global switching points of the controller is presented. The synthesized control system can stabilize the maglev vehicle with large initial displace...NUMBERS Automation Desing of a Maglev Controller in State Space N00014-89-J-3202 MIP-9001651 6. AUTHOR(S) Feng Zhao and Richard Thornton 7. PERFORMING

  19. The Process of Technology Transfer: A Case Study of the National Aero-Space Plane Program.

    Science.gov (United States)

    1995-09-01

    often characterize qualitative research ( Bryman , 1989:173,178). A final advantage of the case study method is that it is used to develop hypotheses for...November 1992). Bryman , Alan. Research Methods and Organizational Studies. Winchester MA: Unwin Hyman Inc., 1989. Chapman, Richard L. "The Federal...and C. William Emory. Business Research Methods . Chicago: Richard D. Irwin Inc., 1995. Creighton, J.W., J.A. Jolly, and T.A. Buckles. "The Manager’s

  20. New urban theory

    DEFF Research Database (Denmark)

    Grønlund, Bo

    2002-01-01

    Concept of urbanity, urban theory a short overview, Johan Asplund, William Whyte, Henri Lefebvre, Richard Serenelt, Bill Hillrer and Spree Syntax Analyses. Forelæsningsnoter til kursus 3.314 i 2001 og 3.308 i 2002.......Concept of urbanity, urban theory a short overview, Johan Asplund, William Whyte, Henri Lefebvre, Richard Serenelt, Bill Hillrer and Spree Syntax Analyses. Forelæsningsnoter til kursus 3.314 i 2001 og 3.308 i 2002....