WorldWideScience

Sample records for surfaces exploiting flow-based

  1. Recent developments in automatic solid-phase extraction with renewable surfaces exploiting flow-based approaches

    DEFF Research Database (Denmark)

    Miró, Manuel; Hartwell, Supaporn Kradtap; Jakmunee, Jaroon

    2008-01-01

    Solid-phase extraction (SPE) is the most versatile sample-processing method for removal of interfering species and/or analyte enrichment. Although significant advances have been made over the past two decades in automating the entire analytical protocol involving SPE via flow-injection approaches...

  2. Numerical study of chemical reactions in a surface microdischarge tube with mist flow based on experiment

    International Nuclear Information System (INIS)

    Shibata, T; Nishiyama, H

    2014-01-01

    Recently, a water treatment method of spraying solution into a discharge region has been developed and shows high energy efficiency. In this study, a simulation model of a water treatment method using a surface microdischarge (SMD) tube with mist flow is proposed for further understanding the detailed chemical reactions. Our model has three phases (plasma, gas and liquid) and three simulation steps. The carrier gas is humid air including 2% or 3% water vapour. The chemical species diffusion characteristics in the SMD tube and the concentrations in a droplet are clarified in a wide pH interval. The simulation results show that the chemical species generated on the SMD tube inner wall are diffused to the central axis and dissolved into fine droplets. Especially, OH radicals dissolve into droplets a few mm away from the SMD tube wall because of acidification of the droplets. Furthermore, the hydrogen peroxide density, which is the most important indicator of a radical reaction in water, is influenced by the initial solution pH. This pH dependence results from ozone self-decomposition in water. (paper)

  3. Numerical study of chemical reactions in a surface microdischarge tube with mist flow based on experiment

    Science.gov (United States)

    Shibata, T.; Nishiyama, H.

    2014-03-01

    Recently, a water treatment method of spraying solution into a discharge region has been developed and shows high energy efficiency. In this study, a simulation model of a water treatment method using a surface microdischarge (SMD) tube with mist flow is proposed for further understanding the detailed chemical reactions. Our model has three phases (plasma, gas and liquid) and three simulation steps. The carrier gas is humid air including 2% or 3% water vapour. The chemical species diffusion characteristics in the SMD tube and the concentrations in a droplet are clarified in a wide pH interval. The simulation results show that the chemical species generated on the SMD tube inner wall are diffused to the central axis and dissolved into fine droplets. Especially, OH radicals dissolve into droplets a few mm away from the SMD tube wall because of acidification of the droplets. Furthermore, the hydrogen peroxide density, which is the most important indicator of a radical reaction in water, is influenced by the initial solution pH. This pH dependence results from ozone self-decomposition in water.

  4. Determination of Elastic Parameters of Near-Surface Layers Over Subsidence Trough Development During Longwall Exploitation

    Science.gov (United States)

    Mendecki, Maciej J.; Jochymczyk, Krzysztof; Zuberek, Wacław M.; Tomaszewska, Radosława

    2017-12-01

    Seismic and geodetic studies were carried out before, during, and after underground exploitation of a coal bed in Katowice - Kleofas Coal Mine, located in the Upper Silesia Coal Basin, Poland. Development of a subsidence trough was completed approximately 3 months after passage of a longwall exploitation in the coal seam. This was the time required for the subsidence trough to appear on the surface, which was confirmed by levelling measurements. Sharp changes in the elastic parameters were observed on each profile during subsidence trough development. This observation can result from changing tension and compression forces caused by increase and/or decrease of the elastic parameters of the rock mass. After completion of subsidence trough development, the rock mass appeared to return to its isotropic state and the observed changes ceased. Some minor fluctuations were noted, but they probably resulted from changes in groundwater levels, which might have affected the measured parameters.

  5. Exploiting coastal altimetry to improve the surface circulation scheme over the central Mediterranean Sea

    Science.gov (United States)

    Jebri, Fatma; Birol, Florence; Zakardjian, Bruno; Bouffard, Jérome; Sammari, Cherif

    2016-07-01

    This work is the first study exploiting along track altimetry data to observe and monitor coastal ocean features over the transition area between the western and eastern Mediterranean Basins. The relative performances of both the AVISO and the X-TRACK research regional altimetric data sets are compared using in situ observations. Both products are cross validated with tide gauge records. The altimeter-derived geostrophic velocities are also compared with observations from a moored Acoustic Doppler Current Profiler. Results indicate the good potential of satellite altimetry to retrieve dynamic features over the area. However, X-TRACK shows a more homogenous data coverage than AVISO, with longer time series in the 50 km coastal band. The seasonal evolution of the surface circulation is therefore analyzed by conjointly using X-TRACK data and remotely sensed sea surface temperature observations. This combined data set clearly depicts different current regimes and bifurcations, which allows us to propose a new seasonal circulation scheme for the central Mediterranean. The analysis shows variations of the path and temporal behavior of the main circulation features: the Atlantic Tunisian Current, the Atlantic Ionian Stream, the Atlantic Libyan Current, and the Sidra Gyre. The resulting bifurcating veins of these currents are also discussed, and a new current branch is observed for the first time.

  6. Understanding and exploiting nanoscale surface heterogeneity for particle and cell manipulation

    Science.gov (United States)

    Kalasin, Surachate

    signatures. Following the approach taken by biophysicists for describing the interactions of leukocytes with the endothelial vasculature near an injury, the state spaces in this thesis map regimes of free particle motion, immediate firm arrest, and persistent rolling against macroscopic average patch density, Debye length, particle size, and shear rate. Surprisingly, the electrostatic heterogeneity state space resembles that for selectin-mediated leukocyte motion, and reasons are put forth. This finding is important because it demonstrates how synthetic nanoscale constructs can be exploited to achieve the selective cell capture mechanism previously attributed only to specialized cell adhesion molecules. This thesis initiates studies that extend these fundamental principles, developed for a tunable and well-characterized synthetic model to biological systems. For instance, it is demonstrated that general behaviors seen with the electrostatic model are observed when fibrinogen proteins are substituted for the electrostatic patches. This shows that the nature of the attractions is immaterial to adhesion, and that the effect of added salt primarily alters the range of the electrostatic repulsion and, correspondingly, the contact area. Also, studies with Staphylococcus aureus run parallel to those employing 1 mum silica spheres, further translating the concepts. Inaugural studies with mammalian cells, in the future work section, indicate that application of the surface heterogeneity approach to cell manipulation holds much future promise.

  7. Flow-Based Provenance

    Directory of Open Access Journals (Sweden)

    Sabah Al-Fedaghi

    2017-02-01

    Full Text Available Aim/Purpose: With information almost effortlessly created and spontaneously available, current progress in Information and Communication Technology (ICT has led to the complication that information must be scrutinized for trustworthiness and provenance. Information systems must become provenance-aware to be satisfactory in accountability, reproducibility, and trustworthiness of data. Background:\tMultiple models for abstract representation of provenance have been proposed to describe entities, people, and activities involved in producing a piece of data, including the Open Provenance Model (OPM and the World Wide Web Consortium. These models lack certain concepts necessary for specifying workflows and encoding the provenance of data products used and generated. Methodology: Without loss of generality, the focus of this paper is on OPM depiction of provenance in terms of a directed graph. We have redrawn several case studies in the framework of our proposed model in order to compare and evaluate it against OPM for representing these cases. Contribution: This paper offers an alternative flow-based diagrammatic language that can form a foundation for modeling of provenance. The model described here provides an (abstract machine-like representation of provenance. Findings: The results suggest a viable alternative in the area of diagrammatic representation for provenance applications. Future Research: Future work will seek to achieve more accurate comparisons with current models in the field.

  8. Mineral exploitation by surface mining and environmental restoration. Explotacion minera a cielo abierto y restauracion ambiental

    Energy Technology Data Exchange (ETDEWEB)

    1992-09-01

    The subject of environmental restoration of zones affected by the opencast exploitation of coal, is one of the most interesting for mineral zones since at the end of the industrial process the reclaimed land is appropriate for subsequent use. In all, HUNOSA has restored more than 1000 Ha of pasture. 1 fig.

  9. Solution of underground mine gas emissions on surface of abandoned mining sites where steep deposited coal seams have been exploited

    Energy Technology Data Exchange (ETDEWEB)

    Takla, G.; Froml, K. [OKD, DPB, Paskov (Czech Republic)

    2005-07-01

    The solution of uncontrolled gas emissions from abandoned underground coal mine sites in Ostrava-Karvina coal-field to surface ground in connection with old mine shafts and drifts and with old mining workings in horizontal and inclined coal seams has many forms. It varies according to geological and mining conditions and the disposition of the site surface. Since four years the gas emission risk has appeared in the area of former exploited vertical coal seams within the historical centre of Orlova town, which is protected by State Monument Protection office. A project based on such special nature of mining-geological and urban conditions was elaborated and already implemented. (authors)

  10. Solution of underground mine gas emissions on surface of abandoned mining sites where steep deposited coal seams have been exploited

    International Nuclear Information System (INIS)

    Takla, G.; Froml, K.

    2005-01-01

    The solution of uncontrolled gas emissions from abandoned underground coal mine sites in Ostrava-Karvina coal-field to surface ground in connection with old mine shafts and drifts and with old mining workings in horizontal and inclined coal seams has many forms. It varies according to geological and mining conditions and the disposition of the site surface. Since four years the gas emission risk has appeared in the area of former exploited vertical coal seams within the historical centre of Orlova town, which is protected by State Monument Protection office. A project based on such special nature of mining-geological and urban conditions was elaborated and already implemented. (authors)

  11. Exploiting the flexibility and the polarization of ferroelectric perovskite surfaces to achieve efficient photochemistry and enantiospecificity

    Energy Technology Data Exchange (ETDEWEB)

    Rappe, Andrew [Univ. of Pennsylvania, Philadelphia, PA (United States)

    2017-01-06

    This research project explored the catalytic properties of complex surfaces of functional materials. The PI used first-principles density functional theory (DFT) calculations to explore a tightly integrated set of properties. The physical properties of complex functional materials that influence surface chemistry were explored, including bulk and surface electric dipoles, and surface conductivity. The energetic, compositional, electronic, and chemical properties of the surfaces of these materials were explored in detail, and connections between material properties and chemical reactivity were established. This project led to 28 publications, including Nat. Comm., JACS, 3 PRL, 7 PRB, 2 ACS Nano, 2 Nano Lett., 4 JPCL, 2 JCP, Chem. Mater., ACS Appl. Mater. Interfaces, Phys. Rev. Appl., and a U.S. Patent on surface catalysts. The key accomplishments in this project involved work in six coordinated areas: pioneering ways to control bulk dipoles in order to dynamically affect catalysis, exploring novel ways of bringing charge to the surface for redox catalysis, nonstoichiometric surfaces offering new sites for heterogeneous catalysis, illustrating how surface catalysis responds to applied pressure, catalytic growth of carbon-based materials, and new computational methods allowing more accurate exploration of molecule-surface interactions

  12. Thiol-ene thermosets exploiting surface reactivity for layer-by-layer structures and control of penetration depth for selective surface reactivity

    DEFF Research Database (Denmark)

    Daugaard, Anders Egede; Westh, Andreas; Pereira Rosinha Grundtvig, Ines

    Thiol-ene thermosets have been shown to be an efficient platform for preparation of functional polymer surfaces. Especially the effectiveness and versatility of the system has enabled a large variety of network properties to be obtained in a simple and straight-forward way. Due to its selectivity...... groups in thµe surface of thiol-ene thermosets, it is possible to prepare surface functional thermosets or to exploit the reactive groups for modular construction and subsequent chemical bonding. Here a different approach preparing monolithic layer-by-layer structures with controlled mechanical...... in controlling the penetration depth and surface grafting. The methodology was used for surface immobilization of enzymes providing a direct link between the distribution of enzymes on the surface and the activity of the reactor....

  13. Adaptive photonic meta-surfaces exploiting interfacial phase change in elemental gallium

    OpenAIRE

    Waters, Robin F.; MacDonald, K.F.; Hobson, P.A.; Zheludev, N.I.

    2014-01-01

    Surface-driven metallization in a nanoscale layer of elemental gallium forming the backplane of a photonic metamaterial absorber provides a mechanism for reversible all-optical and thermo-optical tuning of resonant response.

  14. Reduction of surface subsidence risk by fly ash exploitation as filling material in deep mining areas

    Czech Academy of Sciences Publication Activity Database

    Trčková, Jiřina; Šperl, Jan

    2010-01-01

    Roč. 53, č. 2 (2010), s. 251-258 ISSN 0921-030X Institutional research plan: CEZ:AV0Z30460519 Keywords : undermining * subsidence of the surface * impact reduction Subject RIV: DO - Wilderness Conservation Impact factor: 1.398, year: 2010 www.springerlink.com/content/y8257893528lp56w/

  15. Membrane Surface Nanostructures and Adhesion Property of T Lymphocytes Exploited by AFM

    Directory of Open Access Journals (Sweden)

    Lu Hongsong

    2009-01-01

    Full Text Available Abstract The activation of T lymphocytes plays a very important role in T-cell-mediated immune response. Though there are many related literatures, the changes of membrane surface nanostructures and adhesion property of T lymphocytes at different activation stages have not been reported yet. However, these investigations will help us further understand the biophysical and immunologic function of T lymphocytes in the context of activation. In the present study, the membrane architectures of peripheral blood T lymphocytes were obtained by AFM, and adhesion force of the cell membrane were measured by acquiring force–distance curves. The results indicated that the cell volume increased with the increases of activation time, whereas membrane surface adhesion force decreased, even though the local stiffness for resting and activated cells is similar. The results provided complementary and important data to further understand the variation of biophysical properties of T lymphocytes in the context of in vitro activation.

  16. On the exploitation of mode localization in surface acoustic wave MEMS

    Science.gov (United States)

    Hanley, T. H.; Gallacher, B. J.; Grigg, H. T. D.

    2017-05-01

    Mode localization sensing has been recently introduced as an alternative resonant sensing protocol. It has been shown to exhibit several advantages over other resonant methods, in particular a potential for higher sensitivity and rejection of common mode noise. This paper expounds the principles of utilising surface acoustic waves (SAW) to create a mode localization sensor. A generalised geometry consisting of a pair of coupled resonant cavities is introduced and an analytical solution found for the displacement fields within the cavities. The solution is achieved by coupling the internal cavity solutions using a ray tracing method. The results of the analytical solution are compared to a numerical solution found using commercial finite element method (FEM) software; exact agreement is found between the two solutions. The insight gained from the analytical model enables the determination of critical design parameters. A brief analysis is presented showing analogous operation to previous examples of mode localization sensors. The sensitivity of the device is shown to depend nonlinearly on the number of periods in the array coupling the two cavities.

  17. Enhanced absorption in Au nanoparticles/a-Si:H/c-Si heterojunction solar cells exploiting Au surface plasmon resonance

    Energy Technology Data Exchange (ETDEWEB)

    Losurdo, Maria; Giangregorio, Maria M.; Bianco, Giuseppe V.; Sacchetti, Alberto; Capezzuto, Pio; Bruno, Giovanni [Institute of Inorganic Methodologies and of Plasmas, IMIP-CNR, via Orabona 4, 70126 Bari (Italy)

    2009-10-15

    Au nanoparticles (NPs)/(n-type)a-Si:H/(p-type)c-Si heterojunctions have been deposited combining plasma-enhanced chemical-vapour deposition (PECVD) with Au sputtering. We demonstrate that a density of {proportional_to}1.3 x 10{sup 11} cm{sup -2} of Au nanoparticles with an approximately 20 nm diameter deposited onto (n-type)a-Si:H/(p-type)c-Si heterojunctions enhance performance exploiting the improved absorption of light by the surface plasmon resonance of Au NPs. In particular, Au NPs/(n-type)a-Si:H/(p-type)c-Si show an enhancement of 20% in the short-circuit current, J{sub SC}, 25% in the power output, P{sub max} and 3% in the fill factor, FF, compared to heterojunctions without Au NPs. Structures have been characterized by spectroscopic ellipsometry, atomic force microscopy and current-voltage (I-V) measurements to correlate the plasmon resonance-induced enhanced absorption of light with photovoltaic performance. (author)

  18. Generation of Digital Surface Models from satellite photogrammetry: the DSM-OPT service of the ESA Geohazards Exploitation Platform (GEP)

    Science.gov (United States)

    Stumpf, André; Michéa, David; Malet, Jean-Philippe

    2017-04-01

    The continuously increasing fleet of agile stereo-capable very-high resolution (VHR) optical satellites has facilitated the acquisition of multi-view images of the earth surface. Theoretical revisit times have been reduced to less than one day and the highest spatial resolution which is commercially available amounts now to 30 cm/pixel. Digital Surface Models (DSM) and point clouds computed from such satellite stereo-acquisitions can provide valuable input for studies in geomorphology, tectonics, glaciology, hydrology and urban remote sensing The photogrammetric processing, however, still requires significant expertise, computational resources and costly commercial software. To enable a large Earth Science community (researcher and end-users) to process easily and rapidly VHR multi-view images, the work targets the implementation of a fully automatic satellite-photogrammetry pipeline (i.e DSM-OPT) on the ESA Geohazards Exploitation Platform (GEP). The implemented pipeline is based on the open-source photogrammetry library MicMac [1] and is designed for distributed processing on a cloud-based infrastructure. The service can be employed in pre-defined processing modes (i.e. urban, plain, hilly, and mountainous environments) or in an advanced processing mode (i.e. in which expert-users have the possibility to adapt the processing parameters to their specific applications). Four representative use cases are presented to illustrate the accuracy of the resulting surface models and ortho-images as well as the overall processing time. These use cases consisted of the construction of surface models from series of Pléiades images for four applications: urban analysis (Strasbourg, France), landslide detection in mountainous environments (South French Alps), co-seismic deformation in mountain environments (Central Italy earthquake sequence of 2016) and fault recognition for paleo-tectonic analysis (North-East India). Comparisons of the satellite-derived topography to airborne

  19. Surface damage mitigation of TC4 alloy via micro arc oxidation for oil and gas exploitation application: Characterizations of microstructure and evaluations on surface performance

    Science.gov (United States)

    Xie, Ruizhen; Lin, Naiming; Zhou, Peng; Zou, Jiaojuan; Han, Pengju; Wang, Zhihua; Tang, Bin

    2018-04-01

    Because of its excellent corrosion resistance, high specific strength and high tensile strength, TC4 titanium alloys used as petroleum tubes have received wide interest from material engineers after many technical investigations and estimations. However, because of its low surface hardness values, high coefficient of friction and poor wear resistance, the TC4 alloy is seldom adopted in tribological-related engineering components. In this work, micro-arc oxidation (MAO) coatings were fabricated on TC4 alloys in NaAlO2 and (NaPO3)6 electrolytes with and without ultrasonic assistance. The microstructural characterizations of the produced MAO coatings were investigated. Comparative estimations of electrochemical corrosion in CO2-saturated simulated oilfield brine and tribological behaviours on MAO coatings and TC4 alloys were conducted. The results showed that the introduction of ultrasound increased the thickness of the MAO coatings. The thickness increased by 34% and 15% in the NaAlO2 and (NaPO3)6 electrolytes, respectively. There was no significant discrepancy in phase constitutions when the MAO processes were conducted with and without ultrasonic assistance. Both MAO coatings obtained with and without ultrasonic assistance were found to improve the corrosion and wear resistance of the TC4 alloy. MAO treatments made it possible to ensure the working surface of a TC4 alloy with an enhanced surface performance for oil and gas exploitation applications.

  20. Redefining Exploitation

    DEFF Research Database (Denmark)

    Agarwala, Rina

    2016-01-01

    This article examines how self-employed workers are organizing in the garments and waste collection industries in India. Although the question of who is profiting from self-employed workers’ labor is complex, the cases outlined in this paper highlight telling instances of how some self......-employed workers are organizing as workers. They are fighting labor exploitation by redefining the concept to include additional exploitation axes (from the state and middle class) and forms (including sexual). In doing so, they are redefining potential solutions, including identities and material benefits, to fit...

  1. Concentration and distribution of heavy metals and radionuclides in topsoils from Middle Jiu Valley surface coal exploitations sourrounding area (Gorj County, Romania)

    Science.gov (United States)

    Corneanu, Mihaela; Corneanu, Gabriel; Lacatusu, Anca-Rovena; Cojocaru, Luminita; Butnariu, Monica

    2013-04-01

    Middle Jiu Valley is one of the largest surface coal exploitation area in Romania. The coal exploitation area is a dense populated one, along the valleys are villages and the inhabitants produce for their own consumption fruits and vegetables, in their personal gardens, or cereals in the fields, nearby the villages. There was considered to be of great interest to investigate the heavy metals and radionuclides content in gardens and cropfield soils from the villages sourrounding the Thermo Electric Power Plants (TEPP) and coal surface exploitation, as well as in crude /cultivated sterile soil or ash. The topsoil samples (104) were harvested from population gardens (58), cropfields sourronding Thermo Electric Power Plants (24), crude sterile dumps (7), cultivated sterile dumps (9) and ash dumps (6). The content in radionuclides in soil was performed by Duggan (1988) method. Radionuclide activity was expressed in Bqkg-1, confidence level 95%. The total content of heavy metals in soil (Zn, Cu, Fe, Mn, Pb, Cd, Ni, Cr, Co) was measured with flame atomic mass spectrometry. The content in heavy metals was expressed in mgkg-1. Soil analysis revealed the presence of natural radionuclides, beloging from ash and coal dust, as well as of Cs-137, of Cernobal provenance. In the cropfields radionuclides content in topsoil is lower than in gardens, due to the deepper soil mobilisation. Radionuclides content over the normal limits for Romania were registered for Th-234, Pb-210, U-235 and in few locations for Ra-226. The soil content for all analysed metals was over the normal limits in most samples, in few cases with values close to allert limits. Concentrations between allert and intervention limits were registered in samples collected from 15-20 km North of TEPP Turceni, in population gardens.

  2. Detection of low-concentration contaminants in solution by exploiting chemical derivatization in surface-enhanced Raman spectroscopy.

    Science.gov (United States)

    Hardy, Mike; Doherty, Matthew D; Krstev, Igor; Maier, Konrad; Möller, Torgny; Müller, Gerhard; Dawson, Paul

    2014-09-16

    A simple derivatization methodology is shown to extend the application of surface-enhanced Raman spectroscopy (SERS) to the detection of trace concentration of contaminants in liquid form. Normally in SERS the target analyte species is already present in the molecular form in which it is to be detected and is extracted from solution to occupy sites of enhanced electromagnetic field on the substrate by means of chemisorption or drop-casting and subsequent evaporation of the solvent. However, these methods are very ineffective for the detection of low concentrations of contaminant in liquid form because the target (ionic) species (a) exhibits extremely low occupancy of enhancing surface sites in the bulk liquid environment and (b) coevaporates with the solvent. In this study, the target analyte species (acid) is detected via its solid derivative (salt) offering very significant enhancement of the SERS signal because of preferential deposition of the salt at the enhancing surface but without loss of chemical discrimination. The detection of nitric acid and sulfuric acid is demonstrated down to 100 ppb via reaction with ammonium hydroxide to produce the corresponding ammonium salt. This yields an improvement of ~4 orders of magnitude in the low-concentration detection limit compared with liquid phase detection.

  3. Exploiting Surface Plasmon Resonance (SPR Technology for the Identification of Fibroblast Growth Factor-2 (FGF2 Antagonists Endowed with Antiangiogenic Activity

    Directory of Open Access Journals (Sweden)

    Marco Presta

    2009-08-01

    Full Text Available Angiogenesis, the process of new blood vessel formation, is implicated in various physiological/pathological conditions, including embryonic development, inflammation and tumor growth. Fibroblast growth factor-2 (FGF2 is a heparin-binding angiogenic growth factor involved in various physiopathological processes, including tumor neovascularization. Accordingly, FGF2 is considered a target for antiangiogenic therapies. Thus, numerous natural/synthetic compounds have been tested for their capacity to bind and sequester FGF2 in the extracellular environment preventing its interaction with cellular receptors. We have exploited surface plasmon resonance (SPR technique in search for antiangiogenic FGF2 binders/antagonists. In this review we will summarize our experience in SPR-based angiogenesis research, with the aim to validate SPR as a first line screening for the identification of antiangiogenic compounds.

  4. Flow-Based Network Analysis of the Caenorhabditis elegans Connectome.

    Science.gov (United States)

    Bacik, Karol A; Schaub, Michael T; Beguerisse-Díaz, Mariano; Billeh, Yazan N; Barahona, Mauricio

    2016-08-01

    We exploit flow propagation on the directed neuronal network of the nematode C. elegans to reveal dynamically relevant features of its connectome. We find flow-based groupings of neurons at different levels of granularity, which we relate to functional and anatomical constituents of its nervous system. A systematic in silico evaluation of the full set of single and double neuron ablations is used to identify deletions that induce the most severe disruptions of the multi-resolution flow structure. Such ablations are linked to functionally relevant neurons, and suggest potential candidates for further in vivo investigation. In addition, we use the directional patterns of incoming and outgoing network flows at all scales to identify flow profiles for the neurons in the connectome, without pre-imposing a priori categories. The four flow roles identified are linked to signal propagation motivated by biological input-response scenarios.

  5. An improved approach for flow-based cloud point extraction.

    Science.gov (United States)

    Frizzarin, Rejane M; Rocha, Fábio R P

    2014-04-11

    Novel strategies are proposed to circumvent the main drawbacks of flow-based cloud point extraction (CPE). The surfactant-rich phase (SRP) was directly retained into the optical path of the spectrophotometric cell, thus avoiding its dilution previously to the measurement and yielding higher sensitivity. Solenoid micro-pumps were exploited to improve mixing by the pulsed flow and also to modulate the flow-rate for retention and removal of the SRP, thus avoiding the elution step, often carried out with organic solvents. The heat released and the increase of the salt concentration provided by an on-line neutralization reaction were exploited to induce the cloud point without an external heating device. These innovations were demonstrated by the spectrophotometric determination of iron, yielding a linear response from 10 to 200 μg L(-1) with a coefficient of variation of 2.3% (n=7). Detection limit and sampling rate were estimated at 5 μg L(-1) (95% confidence level) and 26 samples per hour, respectively. The enrichment factor was 8.9 and the procedure consumed only 6 μg of TAN and 390 μg of Triton X-114 per determination. At the 95% confidence level, the results obtained for freshwater samples agreed with the reference procedure and those obtained for digests of bovine muscle, rice flour, brown bread and tort lobster agreed with the certified reference values. The proposed procedure thus shows advantages in relation to previously proposed approaches for flow-based CPE, being a fast and environmental friendly alternative for on-line separation and pre-concentration. Copyright © 2014 Elsevier B.V. All rights reserved.

  6. Nanostructured Basaltfiberconcrete Exploitational Characteristics

    Science.gov (United States)

    Saraykina, K. A.; Shamanov, V. A.

    2017-11-01

    The article demonstrates that the mass use of basalt fiber concrete (BFC) is constrained by insufficient study of their durability and serviceability in a variety of environments. This research is aimed at the study of the basalt fiber corrosion processes in the cement stone of BFC, the control of the new products structure formation in order to protect the reinforcing fiber from alkaline destruction and thereby improve the exploitational characteristics of the composite. The research result revealed that the modification of basaltfiber concrete by the dispersion of MWNTs contributes to the directional formation of new products in the cement matrix. The HAM additive in basaltfiberconcrete provides for the binding of portlandite to low-basic calcium hydroaluminosilicates, thus reducing the aggressive effect of the cement environment on the reinforcing fibers properties. The complex modification of BFC with nanostructured additives provides for an increase in its durability and exploitational properties (strength, frost resistance and water resistance) due to basalt fiber protection from alkali corrosion on account of the compacting of the contact zone “basalt fiber - cement stone” and designing of the new products structure and morphology of cement matrix over the fiber surface.

  7. The Ethics of Exploitation

    Directory of Open Access Journals (Sweden)

    Paul McLaughlin

    2008-11-01

    Full Text Available Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to demonstrate the moral complexity of exploitation. We contend, moreover, that moral evaluation of exploitation is only possible once we abandon a strictly Marxian framework and attempt, in the long run, to develop an integral ethic along Godwinian lines.

  8. Exploitability Assessment with TEASER

    Science.gov (United States)

    2017-05-01

    2.2 Crash Triaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.3 Automated Exploit Generation...Acronyms AEG Automated Exploit Generation: Technique for automating the construction of Proofs of Con- cepts, or exploits. ASan Address Sanitizer: Fine...Global Offset Table: Table of pointers from a dynamic symbol to its resolution in a shared library . IOT Internet of Things: Embedded hardware devices that

  9. Exploit Kit traffic analysis

    OpenAIRE

    Καπίρης, Σταμάτης; Kapiris, Stamatis

    2017-01-01

    Exploit kits have become one of the most widespread and destructive threat that Internet users face on a daily basis. Since the first actor, which has been categorized as exploit kit, namely MPack, appeared in 2006, we have seen a new era on exploit kit variants compromising popular websites, infecting hosts and delivering destructive malware, following an exponentially evolvement to date. With the growing threat landscape, large enterprises to domestic networks, have starte...

  10. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  11. Surface deformation due to the M6.5 Lefkada earthquake (17 November 2015) exploiting SENTINEL-1 and GNSS observations. Implications for seismic hazard.

    Science.gov (United States)

    Elias, Panagiotis; Ganas, Athanassios; Briole, Pierre; Parcharidis, Isaak; Avallone, Antonio; Roukounakis, Nikos; Argyrakis, Panagiotis; Roger, Marine; Cheloni, Daniele; Tolomei, Cristiano; Mendonidis, Evangelos; Moraitini, Evelyn; Papanikolaou, Marios; Papastergios, Asterios

    2017-04-01

    The 17 November 2015 M=6.5 Lefkada earthquake in the Ionian sea, Greece, produced tens of centimetres of co-seismic motion in both Lefkada and Cephalonia islands. We present the full picture of the co-seismic displacements as mapped by space geodetic techniques, Sentinel 1A INSAR and permanent GNSS stations. We use this data together with the constraints from seismology to invert for fault localisation , size and slip distribution. We observed post-seismic displacements throughout most of southern Lefkada and northern Cephalonia islands recorded at the two NOA GNSS stations of PONT and SPAN and four additional permanent and six campaign GNSS stations established after the earthquake. Those displacements range from a few centimetres near the epicentre to a few millimetres far from the fault. We model the post-seismic displacements as due to uniform slip on the same fault plane that ruptured during the main event. The model shows a right-lateral afterslip along the fault but with slightly larger extension in comparison to the co-seismic slip, less shallow and deeper. This transient strain followed the main event during a short period of 80 days as modelled with an exponential law. Currently, the post-seismic deformation is being investigated by exploiting multi-temporal Sentinel 1A/B InSAR processed among others with ESA's Geohazards Exploitation Platform and SNAP software. The first challenging issue is the coherence which is not high in the area due to the vegetation cover. The second one is the correction of the tropospheric component. We estimate it using the tropospheric delay at the permanent GNSS stations and by using an meteorological model based on the WRF refined at the spatial resolution of 1 km. The earthquakes occurred in the Central Ionian area since 1983, studied both by seismology and space geodesy imply a seismic gap offshore NW Cephalonia that needs to be monitored.

  12. Exploiting VM/XA

    International Nuclear Information System (INIS)

    Boeheim, C.

    1990-03-01

    The Stanford Linear Accelerator Center has recently completed a conversion to IBM's VM/XA SP Release 2 operating system. The primary physics application had been constrained by the previous 16 megabyte memory limit. Work is underway to enable this application to exploit the new features of VM/XA. This paper presents a brief tutorial on how to convert an application to exploit VM/XA and discusses some of the SLAC experiences in doing so. 13 figs

  13. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  14. Dissemination and Exploitation Strategy

    DEFF Research Database (Denmark)

    Badger, Merete; Monaco, Lucio; Fransson, Torsten

    of Technology in Sweden, Politecnico di Torino in Italy, and Eindhoven University of Technology in the Netherlands. The project is partially funded by the European Commission under the 7th Framework Programme (project no. RI-283746). This report describes the final dissemination and exploitation strategy...... for project Virtual Campus Hub. A preliminary dissemination and exploitation plan was setup early in the project as described in the deliverable D6.1 Dissemination strategy paper - preliminary version. The plan has been revised on a monthly basis during the project’s lifecycle in connection with the virtual...

  15. Towards the development of cascaded surface plasmon resonance POF sensors exploiting gold films and synthetic recognition elements for detection of contaminants in transformer oil

    Directory of Open Access Journals (Sweden)

    M. Pesavento

    2017-04-01

    Full Text Available The possibility of developing a multichannel optical chemical sensor, based on molecularly imprinted polymers (MIPs and surface plasmon resonance (SPR in a D-shaped multimode plastic optical fiber (POF, is presented by two cascaded SPR-POF-MIP sensors with different thicknesses of the gold layer. The low cost, the high selectivity and sensitivity of the SPR-POF-MIP platforms and the simple and modular scheme of the optical interrogation layout make this system a potentially suitable on-line multi-diagnostic tool. As a proof of principle, the possibility of simultaneous determination of two important analytes, dibenzyl disulfide (DBDS and furfural (2-FAL, in power transformer oil was investigated. Their presence gives useful indication of underway corrosive or ageing processes in power transformers, respectively. Preliminarily, the dependence of the performance of the D-shaped optical platform on the gold film thickness has been studied, comparing two platforms with 30 nm and 60 nm thick gold layers. It has been found that the resonance wavelengths are different on platforms with gold layer of different thickness, furthermore when MIPs are present on the gold as receptors, the performances of the platforms are similar in the two considered sensors.

  16. [Child sexual exploitation].

    Science.gov (United States)

    Cabello, María F; Castaldi, Paula D; Cataldo, Andrea M

    2009-01-01

    Child Sexual Exploitation is a complex phenomenon in our country and the world; it dates back to an ancient past but it has a very recent conceptualization and specific approach. This article proposes a tour through this process as well as some inputs for its categorization, the attention to the affected subjects by the very design of public policies taken from a concrete institutional experience.

  17. Towards Separation of Concerns in Flow-Based Programming

    DEFF Research Database (Denmark)

    Zarrin, Bahram; Baumeister, Hubert

    2015-01-01

    Flow-Based Programming (FBP) is a programming paradigm that models software systems as a directed graph of predefined processes which run asynchronously and exchange data through input and output ports. FBP decomposes software systems into a network of processes. However there are concerns...

  18. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  19. Exploiting social evolution in biofilms

    DEFF Research Database (Denmark)

    Boyle, Kerry E; Heilmann, Silja; van Ditmarsch, Dave

    2013-01-01

    and thus, regrettably, select for resistance against their own action. A possible solution lies in targeting the mechanisms by which bacteria interact with each other within biofilms. The emerging field of microbial social evolution combines molecular microbiology with evolutionary theory to dissect...... the molecular mechanisms and the evolutionary pressures underpinning bacterial sociality. This exciting new research can ultimately lead to new therapies against biofilm infections that exploit evolutionary cheating or the trade-off between biofilm formation and dispersal.......Bacteria are highly social organisms that communicate via signaling molecules, move collectively over surfaces and make biofilm communities. Nonetheless, our main line of defense against pathogenic bacteria consists of antibiotics-drugs that target individual-level traits of bacterial cells...

  20. NOAA's NPOESS Data Exploitation Project

    Science.gov (United States)

    Goodrum, G.; Silva, J.; Yoe, J.; Schott, T.; McHugh, M.; Roth, G.; Macharrie, P.

    2009-05-01

    The U.S. National Oceanic and Atmospheric Administration's NPOESS Data Exploitation (NDE) Project is building a near-real time processing and distribution system for data from the National Polar-orbiting Operational Environmental Satellite System (NPOESS) and its forerunner, NASA's NPOESS Preparatory Project (NPP). The NDE Project has diverse user requirements for atmospheric, oceanographic, and land surface data products with strict operational timeliness. The NDE Project worked with stakeholders to promote and adopt widely used scientific data formats consistent with interoperability objectives for the Global Earth Observation System of Systems (GEOSS). The NDE system was designed to meet these user requirements in a Service Oriented Architecture (SOA) with product algorithms and product tailoring tools presented as internal service components. This approach provides scalability and high availability for mission critical operations, while maintaining flexibility for future products and satellite data processing and distribution requirements.

  1. M-Commerce Exploitation

    DEFF Research Database (Denmark)

    Ulhøi, John Parm; Jørgensen, Frances

    2008-01-01

    SMEs venturing into business ventures utilizing mobile devices via wireless communication for commercial purposes, or Mobile commerce (M-commerce), need to be adept at both exploiting cutting edge technology and managing intense collaboration between a host of network participants. Successful entry...... into this emerging market may well depend on development of new business models that emphasize the socio-technical intricacies of these networks. The objective of this paper is to examine the development of these networks as a central part of new M-commerce business models in SME's and report on initial findings...... from the preliminary phase of the project that is aimed at exploring, describing, and facilitating the development of new business models for M-commerce in SME's in Denmark. Data have been collected through in-depth interviews. The paper contributes to theory relative to M-commerce business models...

  2. Exploitative Learning by Exporting

    DEFF Research Database (Denmark)

    Golovko, Elena; Lopes Bento, Cindy; Sofka, Wolfgang

    Decisions on entering foreign markets are among the most challenging but also potentially rewarding strategy choices managers can make. In this study, we examine the effect of export entry on the firm investment decisions in two activities associated with learning about new technologies......, it is predominantly the marketing-related investment decisions associated with starting to export that lead to increases in firm productivity. We conclude that learning-by-exporting might be more properly characterized as ?learning about and exploiting new markets? rather than ?learning about new technologies...... and learning about new markets ? R&D investments and marketing investments, in search of novel insights into the content and process underlying learning by exporting. We draw from organizational learning theory for predicting changes in both R&D and marketing investment patterns that accompany firm entry...

  3. Towards Domain-specific Flow-based Languages

    DEFF Research Database (Denmark)

    Zarrin, Bahram; Baumeister, Hubert; Sarjoughian, Hessam S.

    2018-01-01

    describe their problems and solutions, instead of using general purpose programming languages. The goal of these languages is to improve the productivity and efficiency of the development and simulation of concurrent scientific models and systems. Moreover, they help to expose parallelism and to specify...... the concurrency within a component or across different independent components. In this paper, we introduce the concept of domain-specific flowbased languages which allows domain experts to use flow-based languages adapted to a particular problem domain. Flow-based programming is used to support concurrency, while......Due to the significant growth of the demand for data-intensive computing, in addition to the emergence of new parallel and distributed computing technologies, scientists and domain experts are leveraging languages specialized for their problem domain, i.e., domain-specific languages, to help them...

  4. Modeling and Simulation Framework for Flow-Based Microfluidic Biochips

    DEFF Research Database (Denmark)

    Schmidt, Morten Foged; Minhass, Wajid Hassan; Pop, Paul

    2013-01-01

    Microfluidic biochips are replacing the conventional biochemical analyzers and are able to integrate the necessary functions for biochemical analysis on-chip. In this paper we are interested in flow-based biochips, in which the fluidic flow is manipulated using integrated microvalves. By combining...... several microvalves, more complex units, such as micropumps, switches, mixers, and multiplexers, can be built. Such biochips are becoming increasingly complex, with thousands of components, but are still designed manually using a bottom-up full-custom design approach, which is extremely labor intensive...... developed for the top-down design of flow-based biochips. We show how the IDE can be used to design biochips for several applications....

  5. Storage and Caching: Synthesis of Flow-based Microfluidic Biochips

    OpenAIRE

    Tseng, Tsun-Ming; Li, Bing; Ho, Tsung-Yi; Schlichtmann, Ulf

    2017-01-01

    Flow-based microfluidic biochips are widely used in lab- on-a-chip experiments. In these chips, devices such as mixers and detectors connected by micro-channels execute specific operations. Intermediate fluid samples are saved in storage temporarily until target devices become avail- able. However, if the storage unit does not have enough capacity, fluid samples must wait in devices, reducing their efficiency and thus increasing the overall execution time. Consequently, storage and caching of...

  6. Learning Metasploit exploitation and development

    CERN Document Server

    Balapure, Aditya

    2013-01-01

    A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits.This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level.Prior experience exploiting basic st

  7. Biotechnological exploitation of microalgae.

    Science.gov (United States)

    Gangl, Doris; Zedler, Julie A Z; Rajakumar, Priscilla D; Martinez, Erick M Ramos; Riseley, Anthony; Włodarczyk, Artur; Purton, Saul; Sakuragi, Yumiko; Howe, Christopher J; Jensen, Poul Erik; Robinson, Colin

    2015-12-01

    Microalgae are a diverse group of single-cell photosynthetic organisms that include cyanobacteria and a wide range of eukaryotic algae. A number of microalgae contain high-value compounds such as oils, colorants, and polysaccharides, which are used by the food additive, oil, and cosmetic industries, among others. They offer the potential for rapid growth under photoautotrophic conditions, and they can grow in a wide range of habitats. More recently, the development of genetic tools means that a number of species can be transformed and hence used as cell factories for the production of high-value chemicals or recombinant proteins. In this article, we review exploitation use of microalgae with a special emphasis on genetic engineering approaches to develop cell factories, and the use of synthetic ecology approaches to maximize productivity. We discuss the success stories in these areas, the hurdles that need to be overcome, and the potential for expanding the industry in general. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  8. Exploitative Learning by Exporting

    DEFF Research Database (Denmark)

    Golovko, Elena; Lopes Bento, Cindy; Sofka, Wolfgang

    Decisions on entering foreign markets are among the most challenging but also potentially rewarding strategy choices managers can make. In this study, we examine the effect of export entry on the firm investment decisions in two activities associated with learning about new technologies and learn......Decisions on entering foreign markets are among the most challenging but also potentially rewarding strategy choices managers can make. In this study, we examine the effect of export entry on the firm investment decisions in two activities associated with learning about new technologies...... and learning about new markets ? R&D investments and marketing investments, in search of novel insights into the content and process underlying learning by exporting. We draw from organizational learning theory for predicting changes in both R&D and marketing investment patterns that accompany firm entry......, it is predominantly the marketing-related investment decisions associated with starting to export that lead to increases in firm productivity. We conclude that learning-by-exporting might be more properly characterized as ?learning about and exploiting new markets? rather than ?learning about new technologies...

  9. Profits and Exploitation: A Reappraisal

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2011-01-01

    This paper provides a mathematical analysis of the Marxian theory of the exploitation of labour in general equilibrium models. The two main definitions of Marxian exploitation in the literature, proposed by Morishima (1974) and Roemer (1982), respectively, are analysed in the context of general convex economies. It is shown that, contrary to the received view, in general these definitions do not preserve the so-called Fundamental Marxian Theorem (FMT), which states that the exploitation of la...

  10. Flow-based market coupling. Stepping stone towards nodal pricing?

    International Nuclear Information System (INIS)

    Van der Welle, A.J.

    2012-07-01

    For achieving one internal energy market for electricity by 2014, market coupling is deployed to integrate national markets into regional markets and ultimately one European electricity market. The extent to which markets can be coupled depends on the available transmission capacities between countries. Since interconnections are congested from time to time, congestion management methods are deployed to divide the scarce available transmission capacities over market participants. For further optimization of the use of available transmission capacities while maintaining current security of supply levels, flow-based market coupling (FBMC) will be implemented in the CWE region by 2013. Although this is an important step forward, important hurdles for efficient congestion management remain. Hence, flow based market coupling is compared to nodal pricing, which is often considered as the most optimal solution from theoretical perspective. In the context of decarbonised power systems it is concluded that advantages of nodal pricing are likely to exceed its disadvantages, warranting further development of FBMC in the direction of nodal pricing.

  11. Prediction on Droplet Sauter Mean Diameter in Gas-Liquid Mist Flow Based on Droplet Fractal Theory

    Directory of Open Access Journals (Sweden)

    Jian-Yi Liu

    2015-01-01

    Full Text Available We present a fractal model for droplet Sauter mean diameter in gas-liquid mist flow, based on the droplet fractal theory and the balance relationship between total droplet surface energy and total gas turbulent kinetic energy. The present model is expressed as functions of the droplet fractal dimension, gas superficial velocity, liquid superficial velocity, and other fluid characteristics. Agreement between the present model predictions and experimental measurements is obtained. Results verify the reliability of the present model.

  12. Material flow-based economic assessment of landfill mining processes.

    Science.gov (United States)

    Kieckhäfer, Karsten; Breitenstein, Anna; Spengler, Thomas S

    2017-02-01

    This paper provides an economic assessment of alternative processes for landfill mining compared to landfill aftercare with the goal of assisting landfill operators with the decision to choose between the two alternatives. A material flow-based assessment approach is developed and applied to a landfill in Germany. In addition to landfill aftercare, six alternative landfill mining processes are considered. These range from simple approaches where most of the material is incinerated or landfilled again to sophisticated technology combinations that allow for recovering highly differentiated products such as metals, plastics, glass, recycling sand, and gravel. For the alternatives, the net present value of all relevant cash flows associated with plant installation and operation, supply, recycling, and disposal of material flows, recovery of land and landfill airspace, as well as landfill closure and aftercare is computed with an extensive sensitivity analyses. The economic performance of landfill mining processes is found to be significantly influenced by the prices of thermal treatment (waste incineration as well as refuse-derived fuels incineration plant) and recovered land or airspace. The results indicate that the simple process alternatives have the highest economic potential, which contradicts the aim of recovering most of the resources. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. Lateral flow-based antibody testing for Chlamydia trachomatis.

    Science.gov (United States)

    Gwyn, Sarah; Mitchell, Alexandria; Dean, Deborah; Mkocha, Harran; Handali, Sukwan; Martin, Diana L

    2016-08-01

    We describe here a lateral flow-based assay (LFA) for the detection of antibodies against immunodominant antigen Pgp3 from Chlamydia trachomatis, the causative agent of urogenital chlamydia infection and ocular trachoma. Optimal signal detection was achieved when the gold-conjugate and test line contained Pgp3, creating a dual sandwich capture assay. The LFA yielded positive signals with serum and whole blood but not with eluted dried blood spots. For serum, the agreement of the LFA with the non-reference multiplex assay was 96%, the specificity using nonendemic pediatric sera was 100%, and the inter-rater agreement was κ=0.961. For whole blood, the agreement of LFA with multiplex was 81.5%, the specificity was 100%, and the inter-rater agreement was κ=0.940. The LFA was tested in a field environment and yielded similar results to those from laboratory-based testing. These data show the successful development of a lateral flow assay for detection of antibodies against Pgp3 with reliable use in field settings, which would make antibody-based testing for trachoma surveillance highly practical, especially after cessation of trachoma elimination programs. Published by Elsevier B.V.

  14. Exploitation et obligation de travailler

    Directory of Open Access Journals (Sweden)

    Pierre-Étienne Vandamme

    2014-06-01

    Full Text Available Cet article défend une définition de l’exploitation, restreinte aux relations de travail, en tentant d’une part d’expliciter une certaine compréhension de sens commun du concept (rémunération inéquitable en fonction du travail presté, et d’autre part d’échapper aux difficultés qui ont affecté la définition marxiste traditionnelle de l’exploitation comme extorsion de la plus-value (dans ses diverses variantes. Il explore ainsi le lien entre l’exploitation et l’obligation matérielle de travailler pour subvenir à ses besoins fondamentaux. Après avoir mis en garde contre les politiques d’activation des chômeurs, il conclut que l’exploitation est un phénomène contre lequel on peut lutter à l’aide de mécanismes relativement simples, même dans les sociétés capitalistes. Il rappelle toutefois que cela ne suffit pas à réaliser la justice sociale, resituant l’exploitation parmi d’autres enjeux fondamentaux pour une philosophie politique égalitariste

  15. Petroleum Exploitation or Human Exploitation? An Overview of ...

    African Journals Online (AJOL)

    Nekky Umera

    human exploitation under the disguise of any national development is frowned at. The Study Area ... Aghalino (2000) observed that the various stages of mineral oil business- geophysical/prospecting, drilling ... social and cultural life of the people in the oil producing communities. Farmers are forced to turn to other ...

  16. Sensory exploitation and sexual conflict.

    Science.gov (United States)

    Arnqvist, Göran

    2006-02-28

    Much of the literature on male-female coevolution concerns the processes by which male traits and female preferences for these can coevolve and be maintained by selection. There has been less explicit focus on the origin of male traits and female preferences. Here, I argue that it is important to distinguish origin from subsequent coevolution and that insights into the origin can help us appreciate the relative roles of various coevolutionary processes for the evolution of diversity in sexual dimorphism. I delineate four distinct scenarios for the origin of male traits and female preferences that build on past contributions, two of which are based on pre-existing variation in quality indicators among males and two on exploitation of pre-existing sensory biases among females. Recent empirical research, and theoretical models, suggest that origin by sensory exploitation has been widespread. I argue that this points to a key, but perhaps transient, role for sexually antagonistic coevolution (SAC) in the subsequent evolutionary elaboration of sexual traits, because (i) sensory exploitation is often likely to be initially costly for individuals of the exploited sex and (ii) the subsequent evolution of resistance to sensory exploitation should often be associated with costs due to selective constraints. A review of a few case studies is used to illustrate these points. Empirical data directly relevant to the costs of being sensory exploited and the costs of evolving resistance is largely lacking, and I stress that such data would help determining the general importance of sexual conflict and SAC for the evolution of sexual dimorphism.

  17. Protecting children from sexual exploitation.

    Science.gov (United States)

    Cooper, Lisa

    Child sexual exploitation has been a largely hidden but significant issue for many years. Nurses need to be aware of its effects on health so they can identify children and young people affected and work with colleagues from other disciplines and agencies to provide treatment and care.

  18. Nanoparticle-Directed Metal-Organic Framework/Porous Organic Polymer Monolithic Supports for Flow-Based Applications.

    Science.gov (United States)

    Darder, María Del Mar; Salehinia, Shima; Parra, José B; Herrero-Martinez, José M; Svec, Frantisek; Cerdà, Víctor; Turnes Palomino, Gemma; Maya, Fernando

    2017-01-18

    A two-step nanoparticle-directed route for the preparation of macroporous polymer monoliths for which the pore surface is covered with a metal-organic framework (MOF) coating has been developed to facilitate the use of MOFs in flow-based applications. The flow-through monolithic matrix was prepared in a column format from a polymerization mixture containing ZnO-nanoparticles. These nanoparticles embedded in the precursor monolith were converted to MOF coatings via the dissolution-precipitation equilibrium after filling the pores of the monolith with a solution of the organic linker. Pore surface coverage with the microporous zeolitic imidazolate framework ZIF-8 resulted in an increase in surface area from 72 to 273 m 2 g -1 . Monolithic polymer containing ZIF-8 coating was implemented as a microreactor catalyzing the Knoevenagel condensation reaction and also in extraction column format enabling the preconcentration of trace levels of toxic chlorophenols in environmental waters. Our approach can be readily adapted to other polymers and MOFs thus enabling development of systems for flow-based MOF applications.

  19. Optic-flow based slope estimation for autonomous landing

    NARCIS (Netherlands)

    De Croon, G.C.H.E.; Ho, H.W.; De Wagter, C.; Van Kampen, E.; Remes, B.; Chu, Q.P.

    2013-01-01

    Micro Air Vehicles need to have a robust landing capability, especially when they operate outside line-of-sight. Autonomous landing requires the identification of a relatively flat landing surface that does not have too large an inclination. In this article, a vision algorithm is introduced that

  20. The ESA Geohazard Exploitation Platform

    Science.gov (United States)

    Bally, Philippe; Laur, Henri; Mathieu, Pierre-Philippe; Pinto, Salvatore

    2015-04-01

    Earthquakes represent one of the world's most significant hazards in terms both of loss of life and damages. In the first decade of the 21st century, earthquakes accounted for 60 percent of fatalities from natural disasters, according to the United Nations International Strategy for Disaster Reduction (UNISDR). To support mitigation activities designed to assess and reduce risks and improve response in emergency situations, satellite EO can be used to provide a broad range of geo-information services. This includes for instance crustal block boundary mapping to better characterize active faults, strain rate mapping to assess how rapidly faults are deforming, soil vulnerability mapping to help estimate how the soil is behaving in reaction to seismic phenomena, geo-information to assess the extent and intensity of the earthquake impact on man-made structures and formulate assumptions on the evolution of the seismic sequence, i.e. where local aftershocks or future main shocks (on nearby faults) are most likely to occur. In May 2012, the European Space Agency and the GEO Secretariat convened the International Forum on Satellite EO for Geohazards now known as the Santorini Conference. The event was the continuation of a series of international workshops such as those organized by the Geohazards Theme of the Integrated Global Observing Strategy Partnership. In Santorini the seismic community has set out a vision of the EO contribution to an operational global seismic risk program, which lead to the Geohazard Supersites and Natural Laboratories (GSNL) initiative. The initial contribution of ESA to suuport the GSNL was the first Supersites Exploitation Platform (SSEP) system in the framework of Grid Processing On Demand (GPOD), now followed by the Geohazard Exploitation Platform (GEP). In this presentation, we will describe the contribution of the GEP for exploiting satellite EO for geohazard risk assessment. It is supporting the GEO Supersites and has been further

  1. A potential flow based flight simulator for an underwater glider

    OpenAIRE

    Phoemsapthawee, Surasak; Le Boulluec, Marc; Laurens, Jean-marc; Deniset, Francois

    2013-01-01

    Underwater gliders are recent innovative types of autonomous underwater vehicles (AUVs) used in ocean exploration and observation. They adjust their buoyancy to dive and to return to the ocean surface. During the change of altitude, they use the hydrodynamic forces developed by their wings to move forward. Their flights are controlled by changing the position of their centers of gravity and their buoyancy to adjust their trim and heel angles. For better flight control, the understanding of th...

  2. Prospects of geothermal resource exploitation

    International Nuclear Information System (INIS)

    Bourrelier, P.H.; Cornet, F.; Fouillac, C.

    1994-01-01

    The use of geothermal energy to generate electricity has only occurred during the past 50 years by drilling wells in aquifers close to magmas and producing either dry steam or hot water. The world's production of electricity from geothermal energy is over 6000 MWe and is still growing. The direct use of geothermal energy for major urban communities has been developed recently by exploitation of aquifers in sedimentary basins under large towns. Scaling up the extraction of heat implies the exploitation of larger and better located fields requiring an appropriate method of extraction; the objective of present attempts in USA, Japan and Europe is to create heat exchangers by the circulation of water between several deep wells. Two field categories are considered: the extension of classical geothermal fields beyond the aquifer areas, and areas favoured by both a high geothermal gradient, fractures inducing a natural permeability at large scale, and good commercial prospects (such as in the Rhenan Graben). Hot dry rocks concept has gained a large interest. 1 fig., 5 tabs., 11 refs

  3. Efficient Depth Map Compression Exploiting Segmented Color Data

    DEFF Research Database (Denmark)

    Milani, Simone; Zanuttigh, Pietro; Zamarin, Marco

    2011-01-01

    performances is still an open research issue. This paper presents a novel compression scheme that exploits a segmentation of the color data to predict the shape of the different surfaces in the depth map. Then each segment is approximated with a parameterized plane. In case the approximation is sufficiently...

  4. A potential flow based flight simulator for an underwater glider

    Science.gov (United States)

    Phoemsapthawee, Surasak; Le Boulluec, Marc; Laurens, Jean-Marc; Deniset, François

    2013-03-01

    Underwater gliders are recent innovative types of autonomous underwater vehicles (AUVs) used in ocean exploration and observation. They adjust their buoyancy to dive and to return to the ocean surface. During the change of altitude, they use the hydrodynamic forces developed by their wings to move forward. Their flights are controlled by changing the position of their centers of gravity and their buoyancy to adjust their trim and heel angles. For better flight control, the understanding of the hydrodynamic behavior and the flight mechanics of the underwater glider is necessary. A 6-DOF motion simulator is coupled with an unsteady potential flow model for this purpose. In some specific cases, the numerical study demonstrates that an inappropriate stabilizer dimension can cause counter-steering behavior. The simulator can be used to improve the automatic flight control. It can also be used for the hydrodynamic design optimization of the devices.

  5. Architecture Synthesis for Cost-Constrained Fault-Tolerant Flow-based Biochips

    DEFF Research Database (Denmark)

    Eskesen, Morten Chabert; Pop, Paul; Potluri, Seetal

    2016-01-01

    In this paper, we are interested in the synthesis of fault-tolerant architectures for flow-based microfluidic biochips, which use microvalves and channels to run biochemical applications. The growth rate of device integration in flow-based microfluidic biochips is scaling faster than Moore's law........ The proposed algorithm has been evaluated using several benchmarks and compared to the results of a Simulated Annealing metaheuristic....

  6. The Exploitation of Evolving Resources

    CERN Document Server

    McGlade, Jacqueline; Law, Richard

    1993-01-01

    The impact of man on the biosphere is profound. Quite apart from our capacity to destroy natural ecosystems and to drive species to extinction, we mould the evolution of the survivors by the selection pressures we apply to them. This has implications for the continued health of our natural biological resources and for the way in which we seek to optimise yield from those resources. Of these biological resources, fish stocks are particularly important to mankind as a source of protein. On a global basis, fish stocks provide the major source of protein for human consumption from natural ecosystems, amounting to some seventy million tonnes in 1970. Although fisheries management has been extensively developed over the last century, it has not hitherto considered the evolutionary consequences of fishing activity. While this omission may not have been serious in the past, the ever increasing intensity of exploitation and the deteriorating health of fish stocks has generated an urgent need for a better understanding...

  7. Swedish mines. Underground exploitation methods

    International Nuclear Information System (INIS)

    Paucard, A.

    1960-01-01

    Between 1949 and 1957, 10 engineers of the Mining research and exploitation department of the CEA visited 17 Swedish mines during 5 field trips. This paper presents a compilation of the information gathered during these field trips concerning the different underground mining techniques used in Swedish iron mines: mining with backfilling (Central Sweden and Boliden mines); mining without backfilling (mines of the polar circle area). The following techniques are described successively: pillar drawing and backfilled slices (Ammeberg, Falun, Garpenberg, Boliden group), sub-level pillar drawing (Grangesberg, Bloettberget, Haeksberg), empty room and sub-level pillar drawing (Bodas, Haksberg, Stripa, Bastkarn), storage chamber pillar drawing (Bodas, Haeksberg, Bastkarn), and pillar drawing by block caving (ldkerberget). Reprint of a paper published in Revue de l'Industrie Minerale, vol. 41, no. 12, 1959 [fr

  8. Energy for lunar resource exploitation

    Science.gov (United States)

    Glaser, Peter E.

    1992-02-01

    Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.

  9. Synthesis of copper nanocolloids using a continuous flow based microreactor

    Energy Technology Data Exchange (ETDEWEB)

    Xu, Lei, E-mail: xulei_kmust@aliyun.com [State Key Laboratory of Complex Nonferrous Metal Resources Clean Utilization, Faculty of Metallurgical and Energy Engineering, Kunming University of Science and Technology, Kunming 650093 (China); Mechanical Engineering, University of Washington, Seattle 98195 (United States); Peng, Jinhui [State Key Laboratory of Complex Nonferrous Metal Resources Clean Utilization, Faculty of Metallurgical and Energy Engineering, Kunming University of Science and Technology, Kunming 650093 (China); Srinivasakannan, C. [Chemical Engineering Program, The petroleum Institute, Abu Dhabi, P.O. Box 253 (United Arab Emirates); Chen, Guo [State Key Laboratory of Complex Nonferrous Metal Resources Clean Utilization, Faculty of Metallurgical and Energy Engineering, Kunming University of Science and Technology, Kunming 650093 (China); Shen, Amy Q., E-mail: amy.shen@oist.jp [Mechanical Engineering, University of Washington, Seattle 98195 (United States); Micro/Bio/Nanofluidics Unit, Okinawa Institute of Technology Graduate University, Okinawa (Japan)

    2015-11-15

    Highlights: • The copper nanocolloidal were synthesized in a T-shaped microreactor at room temperature. • The morphology of copper nanocolloidal are spherical, and with good size distribution. • The mean particle diameter increased with decreases the NaBH{sub 4} molar concentration. • With increasing particle size, the more obvious localized surface plasmon resonance absorption. - Abstract: The copper (Cu) nanocolloids were prepared by sodium borohydride (NaBH{sub 4}) reduction of metal salt solutions in a T-shaped microreactor at room temperature. The influence of NaBH{sub 4} molar concentrations on copper particle's diameter, morphology, size distribution, and elemental compositions has been investigated by transmission electron microscopy (TEM) and X-ray diffraction (XRD). The ultraviolet–visible spectroscopy (UV–vis) was used to verify the chemical compounds of nanocolloids and estimate the average size of copper nanocolloids. The synthesized copper nanocolloids were uniform in size and non-oxidized. A decrease in the mean diameter of copper nanocolloids was observed with increasing NaBH{sub 4} molar concentrations. The maximum mean diameter (4.25 nm) occurred at the CuSO{sub 4}/NaBH{sub 4} molar concentration ratio of 1:2.

  10. Exploiting Symmetry on Parallel Architectures.

    Science.gov (United States)

    Stiller, Lewis Benjamin

    1995-01-01

    This thesis describes techniques for the design of parallel programs that solve well-structured problems with inherent symmetry. Part I demonstrates the reduction of such problems to generalized matrix multiplication by a group-equivariant matrix. Fast techniques for this multiplication are described, including factorization, orbit decomposition, and Fourier transforms over finite groups. Our algorithms entail interaction between two symmetry groups: one arising at the software level from the problem's symmetry and the other arising at the hardware level from the processors' communication network. Part II illustrates the applicability of our symmetry -exploitation techniques by presenting a series of case studies of the design and implementation of parallel programs. First, a parallel program that solves chess endgames by factorization of an associated dihedral group-equivariant matrix is described. This code runs faster than previous serial programs, and discovered it a number of results. Second, parallel algorithms for Fourier transforms for finite groups are developed, and preliminary parallel implementations for group transforms of dihedral and of symmetric groups are described. Applications in learning, vision, pattern recognition, and statistics are proposed. Third, parallel implementations solving several computational science problems are described, including the direct n-body problem, convolutions arising from molecular biology, and some communication primitives such as broadcast and reduce. Some of our implementations ran orders of magnitude faster than previous techniques, and were used in the investigation of various physical phenomena.

  11. National Center for Missing and Exploited Children

    Science.gov (United States)

    ... Professional Trainings & Resources Training Catalogue Additional Resources EDUCATION EDUCATION KidSmartz NetSmartz ... Report Child Sexual Exploitation Make a CYBERTIPLINE Report Number of reports ...

  12. Silviculture and Forestry Exploitation in Mongolia

    National Research Council Canada - National Science Library

    Dediu, Engr

    1960-01-01

    In line with the collaboration between the Rumanian People's Republic and the People's Republic of Mongolia regarding problems of cultivation, exploitation, and industrialization of timber, a group...

  13. The exploitation of Gestalt principles by magicians.

    Science.gov (United States)

    Barnhart, Anthony S

    2010-01-01

    Magicians exploit a host of psychological principles in deceiving their audiences. Psychologists have recently attempted to pinpoint the most common psychological tendencies exploited by magicians. This paper highlights two co-occurring principles that appear to be the basis for many popular magic tricks: accidental alignment and good continuation.

  14. Interviewing Child Victims of Sexual Exploitation.

    Science.gov (United States)

    Spaulding, William

    The interviewing of the child victim of sexual exploitation is one of the first and most important steps in solving and prosecuting a case of child exploitation and is the topic of this document. The first chapter discusses the interviewer's role, focusing on improving communication, dealing with emotion, the interviewer's response, male or female…

  15. Packaging of Sin Goods - Commitment or Exploitation?

    DEFF Research Database (Denmark)

    Nafziger, Julia

    to such self-control problems, and possibly exploit them, by offering different package sizes. In a competitive market, either one or three (small, medium and large) packages are offered. In contrast to common intuition, the large, and not the small package is a commitment device. The latter serves to exploit...

  16. Exploration, Exploitation, and Organizational Coordination Mechanisms

    Directory of Open Access Journals (Sweden)

    Silvio Popadiuk

    2016-03-01

    Full Text Available This paper presents an empirical relationship among exploration, exploitation, and organizational coordination mechanisms, classified as the centralization of decision-making, formalization, and connectedness. In order to analyze the findings of this survey, we used two techniques: Principal Component Analysis (PCA and Partial Least Squares Path Modeling (PLS-PM. Our analysis was supported by 249 answers from managers of companies located in Brazil (convenience sampling. Contrary to expectations, centralization and exploitation were negatively associated. Our data supports the research hypothesis that formalization is positively associated with exploitation. Although the relationship between formalization and exploration were significant, the result is contrary to the research hypothesis that we made. The relationships among connectedness and exploitation, and connectedness and exploration were both positive and significant. This relationship means that the more connectedness increases, the higher the likelihood of exploitation and exploration.

  17. GOCE Exploitation for Moho Modeling and Applications

    Science.gov (United States)

    Sampierto, D.

    2011-07-01

    New ESA missions dedicated to the observation of the Earth from space, like the gravity-gradiometry mission GOCE and the radar altimetry mission CRYOSAT 2, foster research, among other subjects, also on inverse gravimetric problems and on the description of the nature and the geographical location of gravimetric signals. In this framework the GEMMA project (GOCE Exploitation for Moho Modeling and Applications), funded by the European Space Agency and Politecnico di Milano, aims at estimating the boundary between Earth's crust and mantle (the so called Mohorovičić discontinuity or Moho) from GOCE data in key regions of the world. In the project a solution based on a simple two layer model in spherical approximation is proposed. This inversion problem based on the linearization of the Newton's gravitational law around an approximate mean Moho surface will be solved by exploiting Wiener-Kolmogorov theory in the frequency domain where the depth of the Moho discontinuity will be treated as a random signal with a zero mean and its own covariance function. The algorithm can be applied in a numerically efficient way by using the Fast Fourier Transform. As for the gravity observations, we will consider grids of the anomalous gravitational potential and its second radial derivative at satellite altitude. In particular this will require first of all to elaborate GOCE data to obtain a local grid of the gravitational potential field and its second radial derivative and after that to separate the gravimetric signal due to the considered discontinuity from the gravitational effects of other geological structures present into the observations. The first problem can be solved by applying the so called space- wise approach to GOCE observations, while the second one can be achieved by considering a priori models and geophysical information by means of an appropriate Bayesan technique. Moreover other data such as ground gravity anomalies or seismic profiles can be combined, in an

  18. Flow-Based Network Management: A Report from the IRTF NMRG Workshop

    NARCIS (Netherlands)

    de Oliveira Schmidt, R.; Sadre, R.; Hendriks, Luuk

    This is the report on the Workshop on Flow-Based Network Management, held within the 37th IRTF NMRG meeting, during IETF 93, on 24th July 2015, in Prague, Czech Republic. Following the tradition of the IRTF NMRG, the workshop focused on technologies, developments, and challenges of using flow-level

  19. Real-Time and Resilient Intrusion Detection: A Flow-Based Approach

    NARCIS (Netherlands)

    Hofstede, R.J.; Pras, Aiko

    Due to the demanding performance requirements of packet-based monitoring solutions on network equipment, flow-based intrusion detection systems will play an increasingly important role in current high-speed networks. The required technologies are already available and widely deployed: NetFlow and

  20. Fusion of optical flow based motion pattern analysis and silhouette classification for person tracking and detection

    NARCIS (Netherlands)

    Tangelder, J.W.H.; Lebert, E.; Burghouts, G.J.; Zon, K. van; Den Uyl, M.J.

    2014-01-01

    This paper presents a novel approach to detect persons in video by combining optical flow based motion analysis and silhouette based recognition. A new fast optical flow computation method is described, and its application in a motion based analysis framework unifying human tracking and detection is

  1. Designing Organizations for Exploration and Exploitation

    Directory of Open Access Journals (Sweden)

    Timothy N. Carroll

    2012-08-01

    Full Text Available All organizations face the core challenge of deciding on investments in two very different types of activities: exploration and exploitation. Exploration activities are future-oriented, such as developing new capabilities, experimenting with new technologies, and pursuing new customers and markets. Exploitation activities, in contrast, focus on the refinement of existing competencies, processes, and products. Because an organization’s design should reflect its goals, it is difficult to accommodate exploration and exploitation activities within a single organization. This article discusses four major approaches used to tackle this problem, and notes the strengths and limitations of each approach.

  2. Enhancing Aluminum Reactivity by Exploiting Surface Chemistry and Mechanical Properties

    Science.gov (United States)

    2015-06-01

    into a Pyrex dish. The  Perfluorosolv evaporated in a fume  hood  until the remaining mass was only that  of Al/CuO/PFPE or Al/MoO3/PFPE (about 24 h...Sonicator 3000 probe for 2  minutes.  The solution is poured into a Pyrex dish and hexane evaporated in a  fume  hood  for 24 hours. The dry powders were...Thermal Analysis and Calorimetry 18 (353).  Cervantes, Octavio G.,  Joshua  D. Kuntz, Alexander E. Gash, and Zuhair a. Munir.  2011. “Activation Energy of

  3. Life History Theory and Exploitative Strategies

    Directory of Open Access Journals (Sweden)

    Joshua J. Reynolds

    2016-07-01

    Full Text Available Exploitative strategies involve depriving others of resources while enhancing one’s own. Life history theory suggests that there are individual differences (life history strategy and environmental characteristics (life history contingencies [LHCs] that influence the use of exploitative strategies. However, past work manipulating LHCs has found mixed evidence for the influence of this information on exploitative behavior. We present three studies that help clarify the effects of this type of information. Results indicated that younger individuals are most sensitive to LHC information. We also found, contrary to predictions, that communicating slow LHC information (i.e., high population density, intraspecific competition, and resource scarcity increased rather than decreased the temptation to engage in exploitative behavior. Limitations and future directions are discussed.

  4. Exploiting Inhibitory Siglecs to Combat Food Allergies

    Science.gov (United States)

    2017-10-01

    CONTRACT NUMBER: W81XWH-16-1-0303 TITLE: Exploiting Inhibitory Siglecs to Combat Food Allergies PARTNERING INVESTIGATOR: Matthew Macauley, Ph.D...SUBTITLE Exploiting Inhibitory Siglecs to Combat Food Allergies 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Michael...Furthermore, two novel transgenic mouse models were generated, one expresses human CD22 on B cells and the other expresses human CD33 on mast cells

  5. Managing the Innovators for Exploration and Exploitation

    Directory of Open Access Journals (Sweden)

    C. Annique UN

    2007-09-01

    Full Text Available I analyze how to manage employees to achieve a balance between exploration and exploitation in large established firms. Previous studies suggest that, although firms need to undertake both exploration and exploitation simultaneously, this is difficult either because of the scarcity of resources or because of the incompatibility of these two processes. Proposed solutions have been ambidexterity, punctuated equilibrium or specialization. I suggest another method: managing employees. Specifically, I argue that using the so-called “innovative” system of human resource management practices, consisting of team-based incentive system, team-based job design, and job rotation, enables the firm to undertake exploration and exploitation simultaneously because it provides the psychological safety for people to explore new knowledge to make novel products and develops employees to have the perspective-taking capability that enables the integration of knowledge cross-functionally for efficiency. Using the so-called “traditional” system of human resource management practices, consisting of individual-based incentive system, individual-based job design, and no job rotation, has limited impact on either exploration or exploitation because it does not create the psychological safety for people to explore new knowledge and does not develop the perspective-taking capability needed for exploitation. Moreover, mixing practices from both systems is better than only using the traditional system in achieving exploration or exploitation, but less effective than only using the innovative system as the mix of practices can create inconsistent expectations on employees.

  6. A multi-pumping flow-based procedure with improved sensitivity for the spectrophotometric determination of acid-dissociable cyanide in natural waters.

    Science.gov (United States)

    Frizzarin, Rejane M; Rocha, Fábio R P

    2013-01-03

    An analytical procedure with improved sensitivity was developed for cyanide determination in natural waters, exploiting the reaction with the complex of Cu(I) with 2,2'-biquinoline 4,4'-dicarboxylic acid (BCA). The flow system was based on the multi-pumping approach and long pathlength spectrophotometry with a flow cell based on a Teflon AF 2400(®) liquid core waveguide was exploited to increase sensitivity. A linear response was achieved from 5 to 200μg L(-1), with coefficient of variation of 1.5% (n=10). The detection limit and the sampling rate were 2μg L(-1) (99.7% confidence level), and 22h(-1), respectively. Per determination, 48ng of Cu(II), 5μg of ascorbic acid and 0.9μg of BCA were consumed. As high as 100mg L(-1) thiocyanate, nitrite or sulfite did not affect cyanide determination. Sulfide did not interfere at concentrations lower than 40 and 200μg L(-1) before or after sample pretreatment with hydrogen peroxide. The results for natural waters samples agreed with those obtained by a fluorimetric flow-based procedure at the 95% confidence level. The proposed procedure is then a reliable, fast and environmentally friendly alternative for cyanide determination in natural waters. Copyright © 2012 Elsevier B.V. All rights reserved.

  7. Synthesis of Biochemical Applications on Flow-Based Microfluidic Biochips using Constraint Programming

    DEFF Research Database (Denmark)

    Minhass, Wajid Hassan; Pop, Paul; Madsen, Jan

    2012-01-01

    Microfluidic biochips are replacing the conventional biochemical analyzers and are able to integrate the necessary functions for biochemical analysis on-chip. In this paper we are interested in flow-based biochips, in which the flow of liquid is manipulated using integrated microvalves....... By combining several microvalves, more complex units, such as micropumps, switches, mixers, and multiplexers, can be built. We propose a constraint programming (CP) based approach for the synthesis of biochemical applications on flow-based microfluidic biochips. We use a sequencing graph to model...... the biochemical application and consider that the biochip architecture is given. We model the architecture using a topology graph. We are interested in synthesizing an implementation, consisting of binding and scheduling of the biochemical operations onto the components of the architecture, such that the resource...

  8. An efficient flow-based botnet detection using supervised machine learning

    DEFF Research Database (Denmark)

    Stevanovic, Matija; Pedersen, Jens Myrup

    2014-01-01

    Botnet detection represents one of the most crucial prerequisites of successful botnet neutralization. This paper explores how accurate and timely detection can be achieved by using supervised machine learning as the tool of inferring about malicious botnet traffic. In order to do so, the paper...... introduces a novel flow-based detection system that relies on supervised machine learning for identifying botnet network traffic. For use in the system we consider eight highly regarded machine learning algorithms, indicating the best performing one. Furthermore, the paper evaluates how much traffic needs...... to accurately and timely detect botnet traffic using purely flow-based traffic analysis and supervised machine learning. Additionally, the results show that in order to achieve accurate detection traffic flows need to be monitored for only a limited time period and number of packets per flow. This indicates...

  9. Flow-based vulnerability measures for network component importance: Experimentation with preparedness planning

    International Nuclear Information System (INIS)

    Nicholson, Charles D.; Barker, Kash; Ramirez-Marquez, Jose E.

    2016-01-01

    This work develops and compares several flow-based vulnerability measures to prioritize important network edges for the implementation of preparedness options. These network vulnerability measures quantify different characteristics and perspectives on enabling maximum flow, creating bottlenecks, and partitioning into cutsets, among others. The efficacy of these vulnerability measures to motivate preparedness options against experimental geographically located disruption simulations is measured. Results suggest that a weighted flow capacity rate, which accounts for both (i) the contribution of an edge to maximum network flow and (ii) the extent to which the edge is a bottleneck in the network, shows most promise across four instances of varying network sizes and densities. - Highlights: • We develop new flow-based measures of network vulnerability. • We apply these measures to determine the importance of edges after disruptions. • Networks of varying size and density are explored.

  10. System-Level Modeling and Synthesis of Flow-Based Microfluidic Biochips

    DEFF Research Database (Denmark)

    Minhass, Wajid Hassan; Pop, Paul; Madsen, Jan

    2011-01-01

    Microfluidic biochips are replacing the conventional biochemical analyzers and are able to integrate the necessary functions for biochemical analysis on-chip. There are several types of microfluidic biochips, each having its advantages and limitations. In this paper we are interested in flow......-based biochips, in which the flow of liquid is manipulated using integrated microvalves. By combining several microvalves, more complex units, such as micropumps, switches, mixers, and multiplexers, can be built. Although researchers have proposed significant work on the system-level synthesis of droplet......-based biochips, which manipulate droplets on a two-dimensional array of electrodes, no research on system-level synthesis of flow-based biochips has been reported so far. The focus has been on application modeling and component-level simulation. Therefore, for the first time to our knowledge, we propose a system...

  11. Exploitation of Labour and Exploitation of Commodities: a “New Interpretation”

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2011-01-01

    In the standard Okishio-Morishima approach, the existence of profits is proved to be equivalent to the exploitation of labour. Yet, it can also be proved that the existence of profits is equivalent to the ‘exploitation’ of any good. Labour and commodity exploitation are just different numerical representations of the productiveness of the economy. This paper presents an alternative approach to exploitation theory which is related to the New Interpretation (Duménil 1980; Foley 1982). In this a...

  12. Rethinking exploitation: a process-centered account.

    Science.gov (United States)

    Jansen, Lynn A; Wall, Steven

    2013-12-01

    Exploitation has become an important topic in recent discussions of biomedical and research ethics. This is due in no small measure to the influence of Alan Wertheimer's path-breaking work on the subject. This paper presents some objections to Wertheimer's account of the concept. The objections attempt to show that his account places too much emphasis on outcome-based considerations and too little on process-based considerations. Building on these objections, the paper develops an alternative process-centered account of the concept. This alternative account of exploitation takes as its point of departure the broadly Kantian notion that it is wrong to use another as an instrument for the advancement of one's own ends. It sharpens this slippery notion and adds a number of refinements to it. The paper concludes by arguing that process-centered accounts of exploitation better illuminate the ethical challenges posed by research on human subjects than outcome-centered accounts.

  13. Shale gas exploitation: Status, problems and prospect

    Directory of Open Access Journals (Sweden)

    Shiqian Wang

    2018-02-01

    Full Text Available Over the past five years, great progress has been made in shale gas exploitation, which has become the most driving force for global gas output growth. Hydrocarbon extraction from shale helps drive the USA on the road to energy independence. Besides, shale oil & gas production has been kept in a sustained growth by continuous improvement in drilling efficiency and well productivity in the case of tumbling oil prices and rig counts. Shale gas reserves and production have been in a rapid growth in China owing to the Lower Paleozoic Wufeng and Longmaxi shale gas exploitation in the Sichuan Basin, which has become an important sector for the future increment of gas reserves and output in China. However, substantial progress has been made neither in non-marine shale gas exploitation as previously expected nor in the broad complicated tectonic areas in South China for which a considerable investment was made. Analysis of the basic situation and issues in domestic shale gas development shows that shale gas exploitation prospects are constrained by many problems in terms of resources endowment, horizontal well fracturing technology, etc. especially in non-marine shale deposits and complicated tectonic areas in South China where hot shales are widely distributed but geological structures are found severely deformed and over matured. Discussion on the prospects shows that the sustained and steady growth in shale gas reserves and production capacity in the coming years lies in the discovery and supersession of new shale plays in addition to Wufeng and Longmaxi shale plays, and that a technological breakthrough in ultra-high-pressure and ultra-deep (over 3500 m buried in the Sichuan Basin marine shale gas exploitation is the key and hope. Keywords: Shale gas, Exploitation, Marine facies, Hot shale, Resource endowment, Sichuan Basin, South China, Complicated tectonic area, Gas play

  14. The largest renewable, easily exploitable, and economically sustainable energy resource

    Science.gov (United States)

    Abbate, Giancarlo; Saraceno, Eugenio

    2018-02-01

    Sun, the ultimate energy resource of our planet, transfers energy to the Earth at an average power of 23,000 TW. Earth surface can be regarded as a huge panel transforming solar energy into a more convenient mechanical form, the wind. Since millennia wind is recognized as an exploitable form of energy and it is common knowledge that the higher you go, the stronger the winds flow. To go high is difficult; however Bill Gates cites high wind among possible energy miracles in the near future. Public awareness of this possible miracle is still missing, but today's technology is ready for it.

  15. Mineral exploitation and development in Greenland

    DEFF Research Database (Denmark)

    Hendriksen, Kåre; Hoffmann, Birgitte; Jørgensen, Ulrik

    2014-01-01

    using immigrant and migrant labourers that work intensively while living in temporary quarters. The historic experiences of Greenland tell that a different, slower exploitation of mineral resources may contribute to social improvements and competence building thereby providing long-term improvements...... for the Greenlandic society. This point to a need for plans and the organisation of mineral exploitations that operate based on coupling local settlements and resources with mining and other forms of activities. This demands new perspectives on the content of social impact assessments as well as new criteria...

  16. Courseware Design: Exploiting the Colour Micro.

    Science.gov (United States)

    Kidd, Marilyn E.; Holmes, Glyn

    1982-01-01

    Discusses the impact of the presentation of data on the educational effectiveness of computer assisted learning systems, describes some of the existing systems for controlling the display of instructional data on CRTs, and outlines a project undertaken at the University of Western Ontario to exploit the capabilities of microcomputer color…

  17. On the dynamics of exploited fish populations

    National Research Council Canada - National Science Library

    Beverton, R. J. H; Holt, Sidney J

    1993-01-01

    ...-brooding cichlids, and viviparity in many sharks and toothcarps. Moreover, fish are of considerable importance to the survival of the human species in the form of nutritious, delicious and diverse food. Rational exploitation and management of our global stocks of fishes must rely upon a detailed and precise insight of their biology. The...

  18. Exploiting a natural auxotrophy for genetic selection.

    Science.gov (United States)

    Ramage, Elizabeth; Gallagher, Larry; Manoil, Colin

    2012-08-01

    We exploited the natural histidine auxotrophy of Francisella species to develop hisD (encodes histidinol dehydrogenase) as a positive selection marker. A shuttle plasmid (pBR103) carrying Escherichia coli hisD and designed for cloning of PCR fragments replicated in both attenuated and highly virulent Francisella strains. During this work, we formulated a simplified defined growth medium for Francisella novicida.

  19. Child Exploitation: Some Pieces of the Puzzle.

    Science.gov (United States)

    Rohlader, Dorothy

    The report addresses the status in North Carolina and in the nation of child exploitation. Legislative and judicial backgrounds of child pornography and child prostitution are reviewed, and difficulties in obtaining statistical data are noted. Law enforcement issues in pornography are cited, and suggestions for further legislation regarding child…

  20. Exploiting indigenous knowledge in the environmental conservation ...

    African Journals Online (AJOL)

    ... of agriculture and reared livestock (especially goats). Over several years, they developed sustainable and effective exploitation mechanisms of the existing biodiversity resources to satisfy their individual needs and those of their societies in general. Journal of Language, Technology and Entrepreneurship in Africa Vol.

  1. Development of substance flow based Life Cycle Assessment tool for sewage sludge treatment and disposal

    DEFF Research Database (Denmark)

    Yoshida, Hiroko; Clavreul, Julie; Scheutz, Charlotte

    Life Cycle Assessment (LCA) is a method to quantify environmental impacts of products or systems. It is often done by correlating material and energy demands with certain input characteristics. An attempt was made to evaluate the robustness of the substance flow based LCA for wastewater and sludge...... treatment processes. Operational data of a conventional wastewater treatment plant over 12 years was collected. A cluster analysis was conducted to determine the relatedness of each input and output characteristic at the whole plant level. The results indicate that the output from the wastewater and sludge...

  2. Architectural Synthesis of Flow-Based Microfluidic Large-Scale Integration Biochips

    DEFF Research Database (Denmark)

    Minhass, Wajid Hassan; Pop, Paul; Madsen, Jan

    2012-01-01

    , the designers are still using full-custom and bottom-up, manual techniques in order to design and implement these chips. As the chips become larger and the applications become more complex, the manual methodologies will not scale, becoming highly inadequate. Therefore, for the first time to our knowledge......,we propose a top-down architectural synthesis methodology for the flow-based biochips. Starting from a given biochemical application and a microfluidic component library, we are interested in synthesizing a biochip architecture, i.e., performing component allocation from the library based on the biochemical...

  3. Dissemination and Exploitation: Project Goals beyond Science

    Science.gov (United States)

    Hamann, Kristin; Reitz, Anja

    2017-04-01

    Dissemination and Exploitation are essential parts of public funded projects. In Horizon 2020 a plan for the exploitation and dissemination of results (PEDR) is a requirement. The plan should contain a clear vision on the objectives of the project in relation to actions for dissemination and potential exploitation of the project results. The actions follow the basic idea to spread the knowledge and results gathered within the project and face the challenge of how to bring the results into potentially relevant policy circle and how they impact the market. The plan follows the purpose to assess the impact of the project and to address various target groups who are interested in the project results. Simply put, dissemination concentrates on the transfer of knowledge and exploitation on the commercialization of the project. Beyond the question of the measurability of project`s impact, strategies within science marketing can serve purposes beyond internal and external communication. Accordingly, project managers are facing the challenge to implement a dissemination and exploitation strategy that ideally supports the identification of all partners with the project and matches the current discourse of the project`s content within the society, politics and economy. A consolidated plan might unite all projects partners under a central idea and supports the identification with the project beyond the individual research questions. Which applications, strategies and methods can be used to bring forward a PEDR that accompanies a project successfully and allows a comprehensive assessment of the project afterwards? Which hurdles might project managers experience in the dissemination process and which tasks should be fulfilled by the project manager?

  4. A two-stage flow-based intrusion detection model for next-generation networks.

    Science.gov (United States)

    Umer, Muhammad Fahad; Sher, Muhammad; Bi, Yaxin

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

  5. Exploitation of marine gas hydrates: Benefits and risks (Invited)

    Science.gov (United States)

    Wallmann, K. J.

    2013-12-01

    Vast amounts of natural gas are stored in marine gas hydrates deposited at continental margins. The global inventory of carbon bound as methane in gas hydrates is currently estimated as 1000 × 500 Gt. Large-scale national research projects located mostly in South-East Asia but also in North America and Europe are aiming to exploit these ice-like solids as new unconventional resource of natural gas. Japan, South Korea and other Asian countries are taking the lead because their national waters harbor exploitable gas hydrate deposits which could be developed to reduce the dependency of these nations on costly LGN imports. In 2013, the first successful production test was performed off Japan at water depths of ca. 1000 m demonstrating that natural gas can be released and produced from marine hydrates by lowering the pressure in the sub-seabed hydrate reservoirs. In an alternative approach, CO2 from coal power plans and other industrial sources is used to release natural gas (methane) from hydrates while CO2 is bound and stored in the sub-surface as solid hydrate. These new approaches and technologies are still in an early pre-commercial phase; the costs of field development and gas production exceed the value of natural gas being produced from the slowly dissociating hydrates. However, new technologies are currently under development in the German SUGAR project and elsewhere to reduce costs and enhance gas production rates such that gas hydrates may become commercially exploitable over the coming decade(s). The exploitation of marine gas hydrates may help to reduce CO2 emissions from the fossil fuel sector if the produced natural gas is used to replace coal and/or LNG. Hydrate development could also provide important incentives for carbon capture technologies since CO2 can be used to produce natural gas from hydrates. However, leakage of gas may occur during the production process while slope failure may be induced by the accompanying dissociation/conversion of gas

  6. Intelligence, mapping, and geospatial exploitation system (IMAGES)

    Science.gov (United States)

    Moellman, Dennis E.; Cain, Joel M.

    1998-08-01

    This paper provides further detail to one facet of the battlespace visualization concept described in last year's paper Battlespace Situation Awareness for Force XXI. It focuses on the National Imagery and Mapping Agency (NIMA) goal to 'provide customers seamless access to tailorable imagery, imagery intelligence, and geospatial information.' This paper describes Intelligence, Mapping, and Geospatial Exploitation System (IMAGES), an exploitation element capable of CONUS baseplant operations or field deployment to provide NIMA geospatial information collaboratively into a reconnaissance, surveillance, and target acquisition (RSTA) environment through the United States Imagery and Geospatial Information System (USIGS). In a baseplant CONUS setting IMAGES could be used to produce foundation data to support mission planning. In the field it could be directly associated with a tactical sensor receiver or ground station (e.g. UAV or UGV) to provide near real-time and mission specific RSTA to support mission execution. This paper provides IMAGES functional level design; describes the technologies, their interactions and interdependencies; and presents a notional operational scenario to illustrate the system flexibility. Using as a system backbone an intelligent software agent technology, called Open Agent ArchitectureTM (OAATM), IMAGES combines multimodal data entry, natural language understanding, and perceptual and evidential reasoning for system management. Configured to be DII COE compliant, it would utilize, to the extent possible, COTS applications software for data management, processing, fusion, exploitation, and reporting. It would also be modular, scaleable, and reconfigurable. This paper describes how the OAATM achieves data synchronization and enables the necessary level of information to be rapidly available to various command echelons for making informed decisions. The reasoning component will provide for the best information to be developed in the timeline

  7. Exploiting host immunity: the Salmonella paradigm

    Science.gov (United States)

    Behnsen, Judith; Perez-Lopez, Araceli; Nuccio, Sean-Paul; Raffatellu, Manuela

    2014-01-01

    Pathogens have evolved clever strategies to evade and in some cases exploit the attacks of an activated immune system. Salmonella enterica is one such pathogen, exploiting multiple aspects of host defense to promote its replication in the host. Here we review recent findings on the mechanisms by which Salmonella establishes systemic and chronic infection, including strategies involving manipulation of innate immune signaling and inflammatory forms of cell death, as well as immune evasion by establishing residency in M2 macrophages. We also examine recent evidence showing that the oxidative environment and the high levels of antimicrobial proteins produced in response to localized Salmonella gastrointestinal infection enable the pathogen to successfully outcompete the resident gut microbiota. PMID:25582038

  8. Automatic exploitation system for photographic dosemeters; Systeme d`exploitation automatique des dosimetres photographiques

    Energy Technology Data Exchange (ETDEWEB)

    Magri, Y.; Devillard, D.; Godefroit, J.L.; Barillet, C.

    1997-01-01

    The Laboratory of Dosimetry Exploitation (LED) has realized an equipment allowing to exploit automatically photographic film dosemeters. This system uses an identification of the films by code-bars and gives the doses measurement with a completely automatic reader. The principle consists in putting in ribbon the emulsions to be exploited and to develop them in a circulation machine. The measurement of the blackening film is realized on a reading plate having fourteen points of reading, in which are circulating the emulsions in ribbon. The exploitation is made with the usual dose calculation method, with special computers codes. A comparison on 2000 dosemeters has shown that the results are the same in manual and automatical methods. This system has been operating since July 1995 by the LED. (N.C.).

  9. Exploitation as the Unequal Exchange of Labour : An Axiomatic Approach

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2009-01-01

    In subsistence economies with general convex technology and rational optimising agents, a new, axiomatic approach is developed, which allows an explicit analysis of the core positive and normative intuitions behind the concept of exploitation. Three main new axioms, called Labour Exploitation in Subsistence Economies , Relational Exploitation , and Feasibility of Non-Exploitation , are presented and it is proved that they uniquely characterise a definition of exploitation conceptually related...

  10. Database Translator (DATALATOR) for Integrated Exploitation

    Science.gov (United States)

    2010-10-31

    SIGN _saHa.catego« y -l Custom facets c at cgoiy.na*r>e= Action T Figure 17: Situation class frame in OntoBase 23 Next Generation Software Contract...Effective Date of Contract: 02/23/2010 Contract Expiration Date: 10/31/2010 Next Generation Software 52 Strawtown Road, New City, NY 10956, 1(845...release; distribution is unlimited 20101104173 Next Generation Software Database Translator (DATALATOR) for Integrated Exploitation Contract: W31P4Q

  11. Macropinocytosis Exploitation by Cancers and Cancer Therapeutics

    OpenAIRE

    Ha, Kevin D.; Bidlingmaier, Scott M.; Liu, Bin

    2016-01-01

    Macropinocytosis has long been known as a primary method for cellular intake of fluid-phase and membrane-bound bulk cargo. This review seeks to re-examine the latest studies to emphasize how cancers exploit macropinocytosis to further their tumorigenesis, including details in how macropinocytosis can be adapted to serve diverse functions. Furthermore, this review will also cover the latest endeavors in targeting macropinocytosis as an avenue for novel therapeutics.

  12. Macropinocytosis Exploitation by Cancers and Cancer Therapeutics.

    Science.gov (United States)

    Ha, Kevin D; Bidlingmaier, Scott M; Liu, Bin

    2016-01-01

    Macropinocytosis has long been known as a primary method for cellular intake of fluid-phase and membrane-bound bulk cargo. This review seeks to re-examine the latest studies to emphasize how cancers exploit macropinocytosis to further their tumorigenesis, including details in how macropinocytosis can be adapted to serve diverse functions. Furthermore, this review will also cover the latest endeavors in targeting macropinocytosis as an avenue for novel therapeutics.

  13. Macropinocytosis Exploitation by Cancers and Cancer Therapeutics

    Directory of Open Access Journals (Sweden)

    Kevin D Ha

    2016-09-01

    Full Text Available Macropinocytosis has long been known as a primary method for cellular intake of fluid-phase and membrane-bound bulk cargo. This review seeks to re-examine the latest studies to emphasize how cancers exploit macropinocytosis to further their tumorigenesis, including details in how macropinocytosis can be adapted to serve diverse functions. Furthermore, this review will also cover the latest endeavors in targeting macropinocytosis as an avenue for novel therapeutics.

  14. MATHEMATICS OF SENSING, EXPLOITATION, AND EXECUTION (MSEE) Sensing, Exploitation, and Execution (SEE) on a Foundation for Representation, Inference, and Learning

    Science.gov (United States)

    2016-07-01

    AFRL-RY-WP-TR-2016-0127 MATHEMATICS OF SENSING, EXPLOITATION, AND EXECUTION (MSEE) Sensing, Exploitation, and Execution ( SEE ) on a Foundation for...distribution unlimited. See additional restrictions described on inside pages STINFO COPY AIR FORCE RESEARCH LABORATORY SENSORS DIRECTORATE WRIGHT...EXPLOITATION, AND EXECUTION (MSEE) Sensing, Exploitation, and Execution ( SEE ) on a Foundation for Representation, Inference, and Learning 5a

  15. Speed-Density Model of Interrupted Traffic Flow Based on Coil Data

    Directory of Open Access Journals (Sweden)

    Chen Yu

    2016-01-01

    Full Text Available As a fundamental traffic diagram, the speed-density relationship can provide a solid foundation for traffic flow analysis and efficient traffic management. Because of the change in modern travel modes, the dramatic increase in the number of vehicles and traffic density, and the impact of traffic signals and other factors, vehicles change velocity frequently, which means that a speed-density model based on uninterrupted traffic flow is not suitable for interrupted traffic flow. Based on the coil data of urban roads in Wuhan, China, a new method which can accurately describe the speed-density relation of interrupted traffic flow is proposed for speed fluctuation characteristics. The model of upper and lower bounds of critical values obtained by fitting the data of the coils on urban roads can accurately and intuitively describe the state of urban road traffic, and the physical meaning of each parameter plays an important role in the prediction and analysis of such traffic.

  16. Fast architecture-level synthesis of fault-tolerant flow-based microfluidic biochips

    DEFF Research Database (Denmark)

    Huang, Wei Lun; Gupta, Ankur; Roy, Sudip

    2017-01-01

    in turn results in wastage of expensive reagent fluids. In order to make the chip fault-tolerant, the state-of-the-art technique adopts simulated annealing (SA) based approach to synthesize a fault-tolerant architecture. However, the SA method is time consuming and non-deterministic with over......-simplified model that usually derive sub-optimal results. Thus, we propose a progressive optimization procedure for the synthesis of fault-tolerant flow-based microfluidic biochips. Simulation results demonstrate that proposed method is efficient compared to the state-of-the-art techniques and can provide...... effective solutions in 88% (on average) less CPU time compared to state-of-the-art technique over three benchmark bioprotocols....

  17. A novel flow-based parameter of collateral function assessed by intracoronary thermodilution.

    Science.gov (United States)

    Lindner, Markus; Felix, Stephan B; Empen, Klaus; Reffelmann, Thorsten

    2014-04-01

    Currently, many methods for quantitation of coronary collateral function are based on intracoronary pressure measurements distal of an occluded balloon, which do not fully account for the dynamic nature of collateral flow. Therefore, a flow-based parameter of coronary collateral function based upon principles of thermodilution was evaluated. In 26 patients with a high-grade coronary artery stenosis, intracoronary hemodynamics were analyzed by the RadiAnalyzer system (St Jude Medical), including fractional flow reserve (FFR), index of microcirculatory resistance (IMR), and the pressure-based collateral flow index (CFI) during balloon occlusion and hyperemia (intravenous adenosine). Moreover, immediately after an intracoronary bolus of room-temperature saline, the balloon was occluded and the intracoronary temperature distal to the balloon was analyzed over time. The slope of the temperature-time curve was calculated after logarithmic transformation as an index of collateral blood flow (CBFI). The coefficient of variation between two measurements of CBFI amounted to 11 ± 2%. In patients with CFI ≥0.25, CBFI amounted to 0.55 ± 0.09, whereas in those with CFI <0.25, CBFI was 0.37 ± 0.03. CBFI correlated significantly with CFI (r = 0.65; P<.001). Interestingly, in the subgroup with IMR below the median (<14.2 mm Hg · s), the slope of the linear regression for CBFI vs CFI was steeper than in individuals with higher IMR, which indicates more effective collateral flow for any given intracoronary pressure distal to the occluded balloon in the group with lower microvascular resistance. This novel index might be useful as a flow-based index of collateral function, and should be evaluated in further studies.

  18. Gaze interaction in UAS video exploitation

    Science.gov (United States)

    Hild, Jutta; Brüstle, Stefan; Heinze, Norbert; Peinsipp-Byma, Elisabeth

    2013-05-01

    A frequently occurring interaction task in UAS video exploitation is the marking or selection of objects of interest in the video. If an object of interest is visually detected by the image analyst, its selection/marking for further exploitation, documentation and communication with the team is a necessary task. Today object selection is usually performed by mouse interaction. As due to sensor motion all objects in the video move, object selection can be rather challenging, especially if strong and fast and ego-motions are present, e.g., with small airborne sensor platforms. In addition to that, objects of interest are sometimes too shortly visible to be selected by the analyst using mouse interaction. To address this issue we propose an eye tracker as input device for object selection. As the eye tracker continuously provides the gaze position of the analyst on the monitor, it is intuitive to use the gaze position for pointing at an object. The selection is then actuated by pressing a button. We integrated this gaze-based "gaze + key press" object selection into Fraunhofer IOSB's exploitation station ABUL using a Tobii X60 eye tracker and a standard keyboard for the button press. Representing the object selections in a spatial relational database, ABUL enables the image analyst to efficiently query the video data in a post processing step for selected objects of interest with respect to their geographical and other properties. An experimental evaluation is presented, comparing gaze-based interaction with mouse interaction in the context of object selection in UAS videos.

  19. Exploitation of subsea gas hydrate reservoirs

    Science.gov (United States)

    Janicki, Georg; Schlüter, Stefan; Hennig, Torsten; Deerberg, Görge

    2016-04-01

    Natural gas hydrates are considered to be a potential energy resource in the future. They occur in permafrost areas as well as in subsea sediments and are stable at high pressure and low temperature conditions. According to estimations the amount of carbon bonded in natural gas hydrates worldwide is two times larger than in all known conventional fossil fuels. Besides technical challenges that have to be overcome climate and safety issues have to be considered before a commercial exploitation of such unconventional reservoirs. The potential of producing natural gas from subsea gas hydrate deposits by various means (e.g. depressurization and/or injection of carbon dioxide) is numerically studied in the frame of the German research project »SUGAR«. The basic mechanisms of gas hydrate formation/dissociation and heat and mass transport in porous media are considered and implemented into a numerical model. The physics of the process leads to strong non-linear couplings between hydraulic fluid flow, hydrate dissociation and formation, hydraulic properties of the sediment, partial pressures and seawater solution of components and the thermal budget of the system described by the heat equation. This paper is intended to provide an overview of the recent development regarding the production of natural gas from subsea gas hydrate reservoirs. It aims at giving a broad insight into natural gas hydrates and covering relevant aspects of the exploitation process. It is focused on the thermodynamic principles and technological approaches for the exploitation. The effects occurring during natural gas production within hydrate filled sediment layers are identified and discussed by means of numerical simulation results. The behaviour of relevant process parameters such as pressure, temperature and phase saturations is described and compared for different strategies. The simulations are complemented by calculations for different safety relevant problems.

  20. Aphid Heritable Symbiont Exploits Defensive Mutualism.

    Science.gov (United States)

    Doremus, Matthew R; Oliver, Kerry M

    2017-04-15

    Insects and other animals commonly form symbioses with heritable bacteria, which can exert large influences on host biology and ecology. The pea aphid, Acyrthosiphon pisum , is a model for studying effects of infection with heritable facultative symbionts (HFS), and each of its seven common HFS species has been reported to provide resistance to biotic or abiotic stresses. However, one common HFS, called X-type, rarely occurs as a single infection in field populations and instead typically superinfects individual aphids with Hamiltonella defensa , another HFS that protects aphids against attack by parasitic wasps. Using experimental aphid lines comprised of all possible infection combinations in a uniform aphid genotype, we investigated whether the most common strain of X-type provides any of the established benefits associated with aphid HFS as a single infection or superinfection with H. defensa We found that X-type does not confer protection to any tested threats, including parasitoid wasps, fungal pathogens, or thermal stress. Instead, component fitness assays identified large costs associated with X-type infection, costs which were ameliorated in superinfected aphids. Together these findings suggest that X-type exploits the aphid/ H. defensa mutualism and is maintained primarily as a superinfection by "hitchhiking" via the mutualistic benefits provided by another HFS. Exploitative symbionts potentially restrict the functions and distributions of mutualistic symbioses with effects that extend to other community members. IMPORTANCE Maternally transmitted bacterial symbionts are widespread and can have major impacts on the biology of arthropods, including insects of medical and agricultural importance. Given that host fitness and symbiont fitness are tightly linked, inherited symbionts can spread within host populations by providing beneficial services. Many insects, however, are frequently infected with multiple heritable symbiont species, providing potential

  1. Art Therapy Exhibitions: Exploitation or Advocacy?

    Science.gov (United States)

    Davis, Terri

    2017-01-01

    Promoting awareness of human trafficking by sharing trauma survivors' art and summaries of their life stories suggests ethical complexities that have been typically neglected by bioethicists. Although these survivors voluntarily share the objects they created during art therapy sessions, they are still at risk of harm, including further exploitation, due to their vulnerability, high rates of victim sensitivity, and the mental health consequences of their traumatic experiences. While some argue that the benefits of sublimation and art therapy for human trafficking survivors make sharing their art worth the risk, anti-trafficking organizations and supporters of such art exhibitions have responsibilities to be trauma informed. © 2017 American Medical Association. All Rights Reserved.

  2. Heisenberg's heirs exploit loopholes in his law

    International Nuclear Information System (INIS)

    Taubes, G.

    1994-01-01

    This article describes research into Heisenberg's Uncertainty Principle. Loopholes in the principle have led to a series of experiments using sophisticated optical techniques to extract information from a quantum system without disturbing the variable being measured. The experiments are based on a technique called back-action evasion, which exploits the possibility of channeling all the uncertainty generated by measuring one quantum variable (e.g. laser beam intensity) onto a related variable known as the conjugate observable (beam phase). These experiments and others are described

  3. Algorithms exploiting ultrasonic sensors for subject classification

    Science.gov (United States)

    Desai, Sachi; Quoraishee, Shafik

    2009-09-01

    Proposed here is a series of techniques exploiting micro-Doppler ultrasonic sensors capable of characterizing various detected mammalian targets based on their physiological movements captured a series of robust features. Employed is a combination of unique and conventional digital signal processing techniques arranged in such a manner they become capable of classifying a series of walkers. These processes for feature extraction develops a robust feature space capable of providing discrimination of various movements generated from bipeds and quadrupeds and further subdivided into large or small. These movements can be exploited to provide specific information of a given signature dividing it in a series of subset signatures exploiting wavelets to generate start/stop times. After viewing a series spectrograms of the signature we are able to see distinct differences and utilizing kurtosis, we generate an envelope detector capable of isolating each of the corresponding step cycles generated during a walk. The walk cycle is defined as one complete sequence of walking/running from the foot pushing off the ground and concluding when returning to the ground. This time information segments the events that are readily seen in the spectrogram but obstructed in the temporal domain into individual walk sequences. This walking sequence is then subsequently translated into a three dimensional waterfall plot defining the expected energy value associated with the motion at particular instance of time and frequency. The value is capable of being repeatable for each particular class and employable to discriminate the events. Highly reliable classification is realized exploiting a classifier trained on a candidate sample space derived from the associated gyrations created by motion from actors of interest. The classifier developed herein provides a capability to classify events as an adult humans, children humans, horses, and dogs at potentially high rates based on the tested sample

  4. Geothermal resources: exploration and exploitation. A bibliography

    Energy Technology Data Exchange (ETDEWEB)

    1976-07-01

    This comprehensive bibliography contains 5476 citations of foreign and domestic research reports, journal articles, patents, conference proceedings, and books concerned with the exploration and exploitation of geothermal resources. The coverage dates back as far as useful references could be obtained and extends through June 1976. References are arranged in broad subject categories and are made up of complete bibliographic citations. These are followed by a listing of subject descriptors used to describe the subject content of each reference. Four indexes are included: Corporate, Personal Author, Subject, and Report Number. Also included is a list of journals from which articles were selected. (LBS)

  5. Exploiting citation contexts for physics retrieval

    DEFF Research Database (Denmark)

    Dabrowska, Anna; Larsen, Birger

    2015-01-01

    The text surrounding citations within scientific papers may contain terms that usefully describe cited documents and can benefit retrieval. We present a preliminary study that investigates appending ci- tation contexts from citing documents to cited documents in the iSearch test collection. We...... examine the effect on information retrieval perfor- mance of a range of citation context sizes and their variable weighting. We find that relatively short citation contexts with moderate weights can improve retrieval performance, and demonstrate the feasibility of identi- fying citation contexts...... in a large collection of physics papers, paving the way for future research that exploits citation contexts for retrieval....

  6. Electromagnetic Optimization Exploiting Aggressive Space Mapping

    DEFF Research Database (Denmark)

    Bandler, J. W.; Biernacki, R.; Chen, S.

    1995-01-01

    emerges after only six EM simulations with sparse frequency sweeps. Furthermore, less CPU effort is required to optimize the filter than is required by one single detailed frequency sweep. We also extend the SM concept to the parameter extraction phase, overcoming severely misaligned responses induced......We propose a significantly improved space mapping (SM) strategy for electromagnetic (EM) optimization. Instead of waiting for upfront EM analyses at several base points, our new approach aggressively exploits every available EM analysis, producing dramatic results right from the first step. We...

  7. Cloud Based Earth Observation Data Exploitation Platforms

    Science.gov (United States)

    Romeo, A.; Pinto, S.; Loekken, S.; Marin, A.

    2017-12-01

    In the last few years data produced daily by several private and public Earth Observation (EO) satellites reached the order of tens of Terabytes, representing for scientists and commercial application developers both a big opportunity for their exploitation and a challenge for their management. New IT technologies, such as Big Data and cloud computing, enable the creation of web-accessible data exploitation platforms, which offer to scientists and application developers the means to access and use EO data in a quick and cost effective way. RHEA Group is particularly active in this sector, supporting the European Space Agency (ESA) in the Exploitation Platforms (EP) initiative, developing technology to build multi cloud platforms for the processing and analysis of Earth Observation data, and collaborating with larger European initiatives such as the European Plate Observing System (EPOS) and the European Open Science Cloud (EOSC). An EP is a virtual workspace, providing a user community with access to (i) large volume of data, (ii) algorithm development and integration environment, (iii) processing software and services (e.g. toolboxes, visualization routines), (iv) computing resources, (v) collaboration tools (e.g. forums, wiki, etc.). When an EP is dedicated to a specific Theme, it becomes a Thematic Exploitation Platform (TEP). Currently, ESA has seven TEPs in a pre-operational phase dedicated to geo-hazards monitoring and prevention, costal zones, forestry areas, hydrology, polar regions, urban areas and food security. On the technology development side, solutions like the multi cloud EO data processing platform provides the technology to integrate ICT resources and EO data from different vendors in a single platform. In particular it offers (i) Multi-cloud data discovery, (ii) Multi-cloud data management and access and (iii) Multi-cloud application deployment. This platform has been demonstrated with the EGI Federated Cloud, Innovation Platform Testbed Poland

  8. Competing Discourses about Youth Sexual Exploitation in Canadian News Media.

    Science.gov (United States)

    Saewyc, Elizabeth M; Miller, Bonnie B; Rivers, Robert; Matthews, Jennifer; Hilario, Carla; Hirakata, Pam

    2013-10-01

    Media holds the power to create, maintain, or break down stigmatizing attitudes, which affect policies, funding, and services. To understand how Canadian news media depicts the commercial sexual exploitation of children and youth, we examined 835 Canadian newspaper articles from 1989-2008 using a mixed methods critical discourse analysis approach, comparing representations to existing research about sexually exploited youth. Despite research evidence that equal rates of boys and girls experience exploitation, Canadian news media depicted exploited youth predominantly as heterosexual girls, and described them alternately as victims or workers in a trade, often both in the same story. News media mentioned exploiters far less often than victims, and portrayed them almost exclusively as male, most often called 'customers' or 'consumers,' and occasionally 'predators'; in contrast, research has documented the majority of sexually exploited boys report female exploiters. Few news stories over the past two decades portrayed the diversity of victims, perpetrators, and venues of exploitation reported in research. The focus on victims but not exploiters helps perpetuate stereotypes of sexual exploitation as business or a 'victimless crime,' maintains the status quo, and blurs responsibility for protecting youth under the UN Convention on the Rights of the Child. Health care providers and researchers can be advocates for accuracy in media coverage about sexual exploitation; news reporters and editors should focus on exploiters more than victims, draw on existing research evidence to avoid perpetuating stereotypes, and use accurate terms, such as commercial sexual exploitation, rather than terms related to business or trade.

  9. Uncovering Indicators of Commercial Sexual Exploitation.

    Science.gov (United States)

    Bounds, Dawn; Delaney, Kathleen R; Julion, Wrenetha; Breitenstein, Susan

    2017-07-01

    It is estimated that annually 100,000 to 300,000 youth are at risk for sex trafficking; a commercial sex act induced by force, fraud, or coercion, or any such act where the person induced to perform such an act is younger than 18 years of age. Increasingly, such transactions are occurring online via Internet-based sites that serve the commercial sex industry. Commercial sex transactions involving trafficking are illegal; thus, Internet discussions between those involved must be veiled. Even so, transactions around sex trafficking do occur. Within these transactions are innuendos that provide one avenue for detecting potential activity. The purpose of this study is to identify linguistic indicators of potential commercial sexual exploitation within the online comments of men posted on an Internet site. Six hundred sixty-six posts from five Midwest cities and 363 unique members were analyzed via content analysis. Three main indicators were found: the presence of youth or desire for youthfulness, presence of pimps, and awareness of vulnerability. These findings begin a much-needed dialogue on uncovering online risks of commercial sexual exploitation and support the need for further research on Internet indicators of sex trafficking.

  10. Compressed sensing MRI exploiting complementary dual decomposition.

    Science.gov (United States)

    Park, Suhyung; Park, Jaeseok

    2014-04-01

    Compressed sensing (CS) MRI exploits the sparsity of an image in a transform domain to reconstruct the image from incoherently under-sampled k-space data. However, it has been shown that CS suffers particularly from loss of low-contrast image features with increasing reduction factors. To retain image details in such degraded experimental conditions, in this work we introduce a novel CS reconstruction method exploiting feature-based complementary dual decomposition with joint estimation of local scale mixture (LSM) model and images. Images are decomposed into dual block sparse components: total variation for piecewise smooth parts and wavelets for residuals. The LSM model parameters of residuals in the wavelet domain are estimated and then employed as a regional constraint in spatially adaptive reconstruction of high frequency subbands to restore image details missing in piecewise smooth parts. Alternating minimization of the dual image components subject to data consistency is performed to extract image details from residuals and add them back to their complementary counterparts while the LSM model parameters and images are jointly estimated in a sequential fashion. Simulations and experiments demonstrate the superior performance of the proposed method in preserving low-contrast image features even at high reduction factors. Copyright © 2014 Elsevier B.V. All rights reserved.

  11. PROBA-V Mission Exploitation Platform

    Directory of Open Access Journals (Sweden)

    Erwin Goor

    2016-07-01

    Full Text Available As an extension of the PROBA-Vegetation (PROBA-V user segment, the European Space Agency (ESA, de Vlaamse Instelling voor Technologisch Onderzoek (VITO, and partners TRASYS and Spacebel developed an operational Mission Exploitation Platform (MEP to drastically improve the exploitation of the PROBA-V Earth Observation (EO data archive, the archive from the historical SPOT-VEGETATION mission, and derived products by researchers, service providers, and thematic users. The analysis of the time series of data (petabyte range is addressed, as well as the large scale on-demand processing of the complete archive, including near real-time data. The platform consists of a private cloud environment, a Hadoop-based processing environment and a data manager. Several applications are released to the users, e.g., a full resolution viewing service, a time series viewer, pre-defined on-demand processing chains, and virtual machines with powerful tools and access to the data. After an initial release in January 2016 a research platform was deployed gradually, allowing users to design, debug, and test applications on the platform. From the PROBA-V MEP, access to, e.g., Sentinel-2 and Sentinel-3 data will be addressed as well.

  12. ROUNDTABLE - SESSION 2 EXPLOITATION, CONSERVATION AND LEGISLATION

    Directory of Open Access Journals (Sweden)

    EDSMAN L.

    2004-01-01

    Full Text Available The link between socioeconomics and conservation and the role of legislation in conservation work was discussed in the group with participants from nine European countries. Interest and knowledge among the general public, stakeholders and managers is the key to successful conservation of native crayfish species. Exploitation and conservation do not necessarily exclude each other. A controlled fishery, where it can be sustained, may be an essential tool for conservation by increasing the general awareness and involving more people in the task of protecting the native crayfish species. This strategy is mainly possible for the noble crayfish in the northern part of its distribution, where strong traditions connected to crayfish also exist. A balance between utilisation and overexploitation has to be found and local guidelines for sustainable exploitation produced. Media, the Internet and educational material aimed at schools and stakeholders are excellent ways of reaching a wide audience with information. Universal objectives, rules and regulations at the European level are desirable and the noble crayfish and the stone crayfish should be included in Annex II of the Habitat Directive. Based on this framework detailed regulations are best worked out at the national level, considering the specific crayfish situation in the country. Information about the legislation, the purpose of the legislation and the consequences when not obeying it should be distributed. Stricter regulation of the trade with live alien crayfish is vital because of the associated risk of introducing new diseases and species.

  13. Ultrasonic Flaw Imaging via Multipath Exploitation

    Directory of Open Access Journals (Sweden)

    Yimin D. Zhang

    2012-01-01

    Full Text Available We consider ultrasonic imaging for the visualization of flaws in a material. Ultrasonic imaging is a powerful nondestructive testing (NDT tool which assesses material conditions via the detection, localization, and classification of flaws inside a structure. We utilize reflections of ultrasonic signals which occur when encountering different media and interior boundaries. These reflections can be cast as direct paths to the target corresponding to the virtual sensors appearing on the top and bottom side of the target. Some of these virtual sensors constitute a virtual aperture, whereas in others, the aperture changes with the transmitter position. Exploitations of multipath extended virtual array apertures provide enhanced imaging capability beyond the limitation of traditional multisensor approaches. The waveforms observed at the physical as well as the virtual sensors yield additional measurements corresponding to different aspect angles, thus allowing proper multiview imaging of flaws. We derive the wideband point spread functions for dominant multipaths and show that fusion of physical and virtual sensor data improves the flaw perimeter detection and localization performance. The effectiveness of the proposed multipath exploitation approach is demonstrated using real data.

  14. A Federated Geospatial and Imagery Exploitation Service (GIXS) Model

    National Research Council Canada - National Science Library

    Weber, Derek

    2000-01-01

    In order for the Geospatial and Imagery Exploitation Service (GIXS) architecture to take advantage of distributed processing of image exploitation tasks, it needs to be adapted to suit a federated environment...

  15. GOCE and Future Gravity Missions for Geothermal Energy Exploitation

    Science.gov (United States)

    Pastorutti, Alberto; Braitenberg, Carla; Pivetta, Tommaso; Mariani, Patrizia

    2016-08-01

    Geothermal energy is a valuable renewable energy source the exploitation of which contributes to the worldwide reduction of consumption of fossil fuels oil and gas. The exploitation of geothermal energy is facilitated where the thermal gradient is higher than average leading to increased surface heat flow. Apart from the hydrologic circulation properties which depend on rock fractures and are important due to the heat transportation from the hotter layers to the surface, essential properties that increase the thermal gradient are crustal thinning and radiogenic heat producing rocks. Crustal thickness and rock composition form the link to the exploration with the satellite derived gravity field, because both induce subsurface mass changes that generate observable gravity anomalies. The recognition of gravity as a useful investigation tool for geothermal energy lead to a cooperation with ESA and the International Renewable Energy Agency (IRENA) that included the GOCE derived gravity field in the online geothermal energy investigation tool of the IRENA database. The relation between the gravity field products as the free air gravity anomaly, the Bouguer and isostatic anomalies and the heat flow values is though not straightforward and has not a unique relationship. It is complicated by the fact that it depends on the geodynamical context, on the geologic context and the age of the crustal rocks. Globally the geological context and geodynamical history of an area is known close to everywhere, so that a specific known relationship between gravity and geothermal potential can be applied. In this study we show the results of a systematic analysis of the problem, including some simulations of the key factors. The study relies on the data of GOCE and the resolution and accuracy of this satellite. We also give conclusions on the improved exploration power of a gravity mission with higher spatial resolution and reduced data error, as could be achieved in principle by flying

  16. The Theory of Exploitation as the Unequal Exchange of Labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2016-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  17. The theory of exploitation as the unequal exchange of labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2017-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  18. Total exploitation of an ornamental granite quarry

    Directory of Open Access Journals (Sweden)

    Taboada, J.

    2005-09-01

    Full Text Available In this paper we propose a methodology to estimate the recovery percentage for each of the products which can be obtained from the exploitation of an ornamental granite quarry: block, semiblock, masonry-transverse stone, and the smaller materials that can be used to obtain construction aggregates. This methodology ensures that quarry exploitation is exhaustive, thereby minimising the production of spoils and the consequent negative impact on the environment. The analysis is based on a detailed and exhaustive compilation of discontinuity data from the research fronts, which are then interpreted statistically and projected over the three weakness planes that are a particular feature of ornamental granite deposits. Using this information, and bearing in mind the minimum commercially viable sizes for each kind of granite, the corresponding recovery rates are calculated for each material in each plane. The results are then integrated using spatial techniques, and the result is an evaluation of quarry contents with a view to total exploitation. This methodology was applied to a quarry in the opening phase in order to carry out an a priori assessment of the economic feasibility of the quarry.

    En este trabajo se propone una metodología para estimar el porcentaje de recuperación de cada uno de los productos que se pueden obtener en la explotación de una cantera de granito ornamental: bloque, semibloque, manpostería y per piaños, y material restante destinado a la obtención de áridos. De esta manera se logra un aprovechamiento integral de la cantera, evitándose la generación de estériles y el subsiguiente impacto ambiental producido por éstos. La metodología de análisis se basa en la recopilación detallada y exhaustiva de datos de discontinuidades en los frentes de investigación, que se interpretan estadísticamente y se proyectan sobre los tres planos de debilidad propios del granito ornamental. Con esta información, y las

  19. Virtual Exploitation Environment Demonstration for Atmospheric Missions

    Science.gov (United States)

    Natali, Stefano; Mantovani, Simone; Hirtl, Marcus; Santillan, Daniel; Triebnig, Gerhard; Fehr, Thorsten; Lopes, Cristiano

    2017-04-01

    The scientific and industrial communities are being confronted with a strong increase of Earth Observation (EO) satellite missions and related data. This is in particular the case for the Atmospheric Sciences communities, with the upcoming Copernicus Sentinel-5 Precursor, Sentinel-4, -5 and -3, and ESA's Earth Explorers scientific satellites ADM-Aeolus and EarthCARE. The challenge is not only to manage the large volume of data generated by each mission / sensor, but to process and analyze the data streams. Creating synergies among the different datasets will be key to exploit the full potential of the available information. As a preparation activity supporting scientific data exploitation for Earth Explorer and Sentinel atmospheric missions, ESA funded the "Technology and Atmospheric Mission Platform" (TAMP) [1] [2] project; a scientific and technological forum (STF) has been set-up involving relevant European entities from different scientific and operational fields to define the platforḿs requirements. Data access, visualization, processing and download services have been developed to satisfy useŕs needs; use cases defined with the STF, such as study of the SO2 emissions for the Holuhraun eruption (2014) by means of two numerical models, two satellite platforms and ground measurements, global Aerosol analyses from long time series of satellite data, and local Aerosol analysis using satellite and LIDAR, have been implemented to ensure acceptance of TAMP by the atmospheric sciences community. The platform pursues the "virtual workspace" concept: all resources (data, processing, visualization, collaboration tools) are provided as "remote services", accessible through a standard web browser, to avoid the download of big data volumes and for allowing utilization of provided infrastructure for computation, analysis and sharing of results. Data access and processing are achieved through standardized protocols (WCS, WPS). As evolution toward a pre

  20. Intertemporal Choice of Marine Ecosystem Exploitation

    DEFF Research Database (Denmark)

    Ravn-Jonsen, Lars

    empirically before drawing the conclusion that Fishing Down Marine Food Webs is economically detrimental can be established directly. Nevertheless, the model does reveal a need for intertemporal balance with respect to both fish size and harvest volume. These aspects are not addressed in any systematic way...... at the ecosystem level in the present management. Therefore, economic predictions for an ecosystem managed as a common pool resource must be that  the exploitation probably are conducted at lower sized than optimum. In addition, given its population stock approach, the present management probably overlooks...... the ability of an ecosystem to sustain total volume of harvest. Given the two aspects of intertemporal choice revealed by the model, the conclusion must be that the Fishing Down Marine Food Webs is probably driven by the current management's inability to conduct adequate intertemporal balancing; therefore...

  1. Exploiting HRM in support of lean manufacturing

    DEFF Research Database (Denmark)

    Jørgensen, Frances; Matthiesen, Rikke

    The purpose of this paper is to investigate the ways in HRM practices are-and could potentially be-exploited to support lean manufacturing in practice. First, a review of the pertinent literature regarding HRM, SHRM, and lean manufacturing is presented to provide an understanding of the mechanisms...... by which HRM practices could, theoretically, be used to support a lean implementation. Data presented in the paper are derived from 1) a longitudinal case study on lean implementation and 2) from managers currently involved with lean manufacturing in a second company. The relevant literature and the data......'s contribution to the change process itself and through bundling particular HRM practices that are aligned with the lean strategy. The paper contributes to both theory and practice, by suggesting specific ways in which HRM can be strategically aligned with a major change implementation such as lean manufacturing....

  2. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  3. Does high indebtedness increase natural resource exploitation?

    Energy Technology Data Exchange (ETDEWEB)

    Neumayer, Eric [London School of Economics and Political Science, Dept. of Geography and Environment, London (United Kingdom)

    2005-04-01

    The debt-resource-hypothesis suggests that high indebtedness leads to increased natural resource exploitation as well as more unsustainable patterns of resource use. Countries with high debt burdens supposedly increase their extraction of fossil fuels and mineral resources as well as their production of so-called cash crops in order to service their debt obligations. In spite of its popularity, there have been few attempts to systematically test the hypothesis. Existing analyses refer to deforestation only and come to mixed results. This study fills a gap in testing the hypothesis more comprehensively for 23 natural resources and cash crops. It uses first differencing, period-specific time dummies, and a lagged dependent variable to mitigate omitted variable bias. No evidence is found that would support the debt-resource-hypothesis. (Author)

  4. CHARACTERISTICS OF HYDROCARBON EXPLOITATION IN ARCTIC CIRCLE

    Directory of Open Access Journals (Sweden)

    Vanja Lež

    2013-12-01

    Full Text Available The existence of large quantities of hydrocarbons is supposed within the Arctic Circle. Assumed quantities are 25% of the total undiscovered hydrocarbon reserves on Earth, mostly natural gas. Over 500 major and minor gas accumulations within the Arctic Circle were discovered so far, but apart from Snøhvit gas field, there is no commercial exploitation of natural gas from these fields. Arctic gas projects are complicated, technically hard to accomplish, and pose a great threat to the return of investment, safety of people and equipment and for the ecosystem. Russia is a country that is closest to the realization of the Arctic gas projects that are based on the giant gas fields. The most extreme weather conditions in the seas around Greenland are the reason why this Arctic region is the least explored and furthest from the realization of any gas project (the paper is published in Croatian .

  5. Redesigning the exploitation of wheat genetic resources.

    Science.gov (United States)

    Longin, C Friedrich H; Reif, Jochen C

    2014-10-01

    More than half a million wheat genetic resources are resting in gene banks worldwide. Unlocking their hidden favorable genetic diversity for breeding is pivotal for enhancing grain yield potential, and averting future food shortages. Here, we propose exploiting recent advances in hybrid wheat technology to uncover the masked breeding values of wheat genetic resources. The gathered phenotypic information will enable a targeted choice of accessions with high value for pre-breeding among this plethora of genetic resources. We intend to provoke a paradigm shift in pre-breeding strategies for grain yield, moving away from allele mining toward genome-wide selection to bridge the yield gap between genetic resources and elite breeding pools. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. Social network analysis realization and exploitation

    Science.gov (United States)

    Davenport, Jack H.; Nolan, James J.

    2015-05-01

    Intelligence analysts demand rapid information fusion capabilities to develop and maintain accurate situational awareness and understanding of dynamic enemy threats in asymmetric military operations. The ability to extract meaning in relationships between people, objects, and locations from a variety of unstructured text datasets is critical to proactive decision making. Additionally, the ability to automatically cluster text documents about entities and discover connections between those documents allows the analyst to navigate an extremely large collection of documents. Analysts also demand a temporal understanding of the extracted relationships between entities and connections between documents. We describe approaches to automatically realize the social networks via concept extraction, relationship extraction, and document connection algorithms; we also describe approaches to exploit the network by visualizing the results to the analyst such that changes over time are evident.

  7. FLOW-BASED NETWORK MEASURES OF BRAIN CONNECTIVITY IN ALZHEIMER'S DISEASE.

    Science.gov (United States)

    Prasad, Gautam; Joshi, Shantanu H; Nir, Talia M; Toga, Arthur W; Thompson, Paul M

    2013-01-01

    We present a new flow-based method for modeling brain structural connectivity. The method uses a modified maximum-flow algorithm that is robust to noise in the diffusion data and guided by biologically viable pathways and structure of the brain. A flow network is first created using a lattice graph by connecting all lattice points (voxel centers) to all their neighbors by edges. Edge weights are based on the orientation distribution function (ODF) value in the direction of the edge. The maximum-flow is computed based on this flow graph using the flow or the capacity between each region of interest (ROI) pair by following the connected tractography fibers projected onto the flow graph edges. Network measures such as global efficiency, transitivity, path length, mean degree, density, modularity, small world, and assortativity are computed from the flow connectivity matrix. We applied our method to diffusion-weighted images (DWIs) from 110 subjects (28 normal elderly, 56 with early and 11 with late mild cognitive impairment, and 15 with AD) and segmented co-registered anatomical MRIs into cortical regions. Experimental results showed better performance compared to the standard fiber-counting methods when distinguishing Alzheimer's disease from normal aging.

  8. Transformation of Commercial Flows into Physical Flows of Electricity – Flow Based Method

    Directory of Open Access Journals (Sweden)

    M. Adamec

    2009-01-01

    Full Text Available We are witnesses of large – scale electricity transport between European countries under the umbrella of the UCTE organization. This is due to the inabilyof generators to satisfy the growing consumption in some regions. In this content, we distinguish between two types of flow. The first type is physical flow, which causes costs in the transmission grid, whilst the second type is commercial flow, which provides revenues for the market participants. The old methods for allocating transfer capacity fail to take this duality into account. The old methods that allocate transmission border capacity to “virtual” commercial flows which, in fact, will not flow over this border, do not lead to optimal allocation. Some flows are uselessly rejected and conversely, some accepted flows can cause congestion on another border. The Flow Based Allocation method (FBA is a method which aims to solve this problem.Another goal of FBA is to ensure sustainable development of expansion of transmission capacity. Transmission capacity is important, because it represents a way to establish better transmission system stability, and it provides a distribution channel for electricity to customers abroad. For optimal development, it is necessary to ensure the right division of revenue allocation among the market participants.This paper contains a brief description of the FBA method. Problems of revenue maximization and optimal revenue distribution are mentioned. 

  9. Summary of radiation protection in exploitation

    International Nuclear Information System (INIS)

    Garcier, Yves; Guers, Rene; Bidard, Francoise; Colson, Philippe; Gonin, Michele; Delabre, Herve; Hemidy, Pierre-Yves; Corgnet, Bruno; Perrin, Marie-Claire; Phan Hoang, Long; Abela, Gonzague; Crepieux, Virginie; Guyot, Pierre; Haranger, Didier; Warembourg, Philippe

    2004-01-01

    This document proposes a large and detailed overview of notions and practices regarding radiation protection in relationship with an NPP exploitation framework. It presents the main notions: matter structure, radioactivity, interactions between matter and radiations, types of ionizing radiation, magnitudes and measurement units, exposure modes, main principles of radiation protection, means of protection against internal and external exposures. The second part proposes an overview of the origin of radiological risks in a nuclear power plant. This origin can be found in fission products, activation products, actinides, designed protections, or circuit contaminations. These radiological risks are more precisely identified and described in terms of detection and prevention (internal exposure risk, contamination risk, iodine-related risk, alpha radiation-related risk, access to the reactor building). The next part addresses the medical and radiological follow-up of exposed workers by a special medical control, by an individual exposure control, by a specific control of female personnel, and by attention to exceptional exposures. Measurement means are presented (detection principles, installation continuous control, workspaces control, personnel contamination control, follow-up of individual dose) as well as collective and individual protection means. The management of radiation protection is addressed through a presentation of decision and management structures for radiation protection, and of EDF objectives and ambitions in this domain. The organization of radiation protection during exploitation is described: responsibilities for radiation protection in a nuclear power station, requirements for workers, preparation of interventions in controlled zone, work execution in controlled zone, zone controls and radiological cleanness of installations. The two last chapters address issues and practices of radiation protection in the case of deconstruction or dismantling, and

  10. Trawling bats exploit an echo-acoustic ground effect

    Directory of Open Access Journals (Sweden)

    Sandor eZsebok

    2013-04-01

    Full Text Available A water surface acts not only as an optic mirror but also as an acoustic mirror. Echolocation calls emitted by bats at low heights above water are reflected away from the bat, and hence the background clutter is reduced. Moreover, targets on the surface create an enhanced echo. Here, we formally quantified the effect of the substrate and target height on both target detection and –discrimination in a combined laboratory and field approach with Myotis daubentonii. In a two-alternative, forced-choice paradigm, the bats had to detect a mealworm and discriminate it from an inedible dummy (20 mm PVC disc. Psychophysical performance was measured as a function of height above either smooth substrates (water or PVC or above a clutter substrate (artificial grass. At low heights above the clutter substrate (10, 20 or 35 cm, the bats’ detection performance was worse than above a smooth substrate. At a height of 50 cm, the substrate structure had no influence on target detection. Above the clutter surface, also target discrimination was significantly impaired with decreasing target height. A detailed analysis of the bats’ echolocation calls during target approach shows that above the clutter substrate, the bats produce calls with significantly higher peak frequency. Flight-path reconstruction revealed that the bats attacked an object from below over water but from above over a clutter substrate.These results are consistent with the hypothesis that trawling bats exploit an echo-acoustic ground effect, in terms of a spatio-temporal integration of direct reflections with indirect reflections from the water surface, to optimize prey detection and –discrimination not only for prey on the water but also for some range above.

  11. Point Movement Trace Vs. The Range Of Mining Exploitation Effects In The Rock Mass

    Science.gov (United States)

    Sroka, Anton; Knothe, Stanisław; Tajduś, Krzysztof; Misa, Rafał

    2015-12-01

    The geometric-integral theories of the rock mass point movements due to mining exploitation assume the relationship between the progress of subsidence and horizontal movement. By analysing the movement trace of a point located on the surface, and the influence of the mining exploitation in the rock mass, an equation describing the relationship between the main components of the deformation conditions was formulated. The result is consistent with the in situ observations and indicates the change of the rock mass component volume due to mining exploitation. The analyses and in situ observations demonstrate clearly that the continuity equation adopted in many solutions in the form: sumlimits_{i = 1}^{i = 3} {\\varepsilon _{ii}= 0} is fundamentally incorrect.

  12. Shale Gas Exploration and Exploitation Induced Risks - SHEER

    Science.gov (United States)

    Capuano, Paolo; Orlecka-Sikora, Beata; Lasocki, Stanislaw; Cesca, Simone; Gunning, Andrew; jaroslawsky, Janusz; Garcia-Aristizabal, Alexander; Westwood, Rachel; Gasparini, Paolo

    2017-04-01

    Shale gas operations may affect the quality of air, water and landscapes; furthermore, it can induce seismic activity, with the possible impacts on the surrounding infrastructure. The SHEER project aims at setting up a probabilistic methodology to assess and mitigate the short and the long term environmental risks connected to the exploration and exploitation of shale gas. In particular we are investigating risks associated with groundwater contamination, air pollution and induced seismicity. A shale gas test site located in Poland (Wysin) has been monitored before, during and after the fracking operations with the aim of assessing environmental risks connected with groundwater contamination, air pollution and earthquakes induced by fracking and injection of waste water. The severity of each of these hazards depends strongly on the unexpected enhanced permeability pattern, which may develop as an unwanted by-product of the fracking processes and may become pathway for gas and fluid migration towards underground water reservoirs or the surface. The project is devoted to monitor and understand how far this enhanced permeability pattern develops both in space and time. The considered hazards may be at least partially inter-related as they all depend on this enhanced permeability pattern. Therefore they are being approached from a multi-hazard, multi parameter perspective. We expect to develop methodologies and procedures to track and model fracture evolution around shale gas exploitation sites and a robust statistically based, multi-parameter methodology to assess environmental impacts and risks across the operational lifecycle of shale gas. The developed methodologies are going to be applied and tested on a comprehensive database consisting of seismicity, changes of the quality of ground-waters and air, ground deformations, and operational data collected from the ongoing monitoring episode (Wysin) and past episodes: Lubocino (Poland), Preese Hall (UK), Oklahoma (USA

  13. Child Sexual Abuse and Exploitation: Guest Editor’s Introduction

    Directory of Open Access Journals (Sweden)

    Michael Salter

    2015-07-01

    Full Text Available One of the most unnerving aspects of child sexual abuse is that it is constantly manifesting in unexpected ways. The current Royal Commission into Institutional Responses to Child Sexual Abuse has collected testimony of abuse in churches, schools, out-of-home care, hospitals and religious communities, demonstrating the breadth of institutional arrangements whose structures and cultures have facilitated child sexual abuse. Cases of serious and prolonged sexual abuse in family contexts have been excluded from the terms of reference of the Royal Commission but nonetheless continue to surface in media reports. In 2013, twelve children were permanently removed from an extended family living in rural NSW in what has been described as one of the worst cases of child abuse in Australia, involving intergenerational incest going back at least three generations (Auebach 2014. Another recent high-profile case involved the use of the Internet to facilitate the sexual exploitation of an adopted child by his parents in Queensland (Ralston 2013. These cases challenge the received wisdom that child sexual abuse is characterised by the victimisation of one child by one opportunistic offender. Such incidents suggest instead that child sexual abuse takes varied and systemic forms, and can operate to perpetuate and entrench toxic cultures and power structures.   This special issue on Child Sexual Abuse and Exploitation is a timely contribution to ongoing efforts to understand the multiplicity of child sexual abuse. It is an interdisciplinary collection of insights drawn from criminology, sociology, psychiatry, psychology and psychoanalysis, and includes papers from academic researchers alongside academic practitioners whose writing is grounded in their work with affected individuals and communities. A key aim of the special issue is to contextualise the diversity of child sexual abuse socially, politically and historically, recognising the dynamic and iterative

  14. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, E.

    2017-12-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (an EC Copernicus contributing mission) EO-data archive, the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers (e.g. the EC Copernicus Global Land Service) and end-users. The analysis of time series of data (PB range) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. New features are still developed, but the platform is yet fully operational since November 2016 and offers A time series viewer (browser web client and API), showing the evolution of Proba-V bands and derived vegetation parameters for any country, region, pixel or polygon defined by the user. Full-resolution viewing services for the complete data archive. On-demand processing chains on a powerfull Hadoop/Spark backend. Virtual Machines can be requested by users with access to the complete data archive mentioned above and pre-configured tools to work with this data, e.g. various toolboxes and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. Jupyter Notebooks is available with some examples python and R projects worked out to show the potential of the data. Today the platform is already used by several international third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. From the Proba-V MEP, access to other data sources such as Sentinel-2 and landsat data is also addressed. Selected components of the MEP are also deployed on public cloud infrastructures in various R&D projects. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to

  15. Mission Exploitation Platform PROBA-V

    Science.gov (United States)

    Goor, Erwin

    2016-04-01

    VITO and partners developed an end-to-end solution to drastically improve the exploitation of the PROBA-V EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data. From November 2015 an operational Mission Exploitation Platform (MEP) PROBA-V, as an ESA pathfinder project, will be gradually deployed at the VITO data center with direct access to the complete data archive. Several applications will be released to the users, e.g. - A time series viewer, showing the evolution of PROBA-V bands and derived vegetation parameters for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains e.g. for the calculation of N-daily composites. - A Virtual Machine will be provided with access to the data archive and tools to work with this data, e.g. various toolboxes and support for R and Python. After an initial release in January 2016, a research platform will gradually be deployed allowing users to design, debug and test applications on the platform. From the MEP PROBA-V, access to Sentinel-2 and landsat data will be addressed as well, e.g. to support the Cal/Val activities of the users. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to the complete data archive. To realise this, private cloud technology (openStack) is used and a distributed processing environment is built based on Hadoop. The Hadoop ecosystem offers a lot of technologies (Spark, Yarn, Accumulo, etc.) which we integrate with several open-source components. The impact of this MEP on the user community will be high and will completely change the way of working with the data and hence open the large time series to a larger

  16. A lightweight, flow-based toolkit for parallel and distributed bioinformatics pipelines

    Directory of Open Access Journals (Sweden)

    Cieślik Marcin

    2011-02-01

    Full Text Available Abstract Background Bioinformatic analyses typically proceed as chains of data-processing tasks. A pipeline, or 'workflow', is a well-defined protocol, with a specific structure defined by the topology of data-flow interdependencies, and a particular functionality arising from the data transformations applied at each step. In computer science, the dataflow programming (DFP paradigm defines software systems constructed in this manner, as networks of message-passing components. Thus, bioinformatic workflows can be naturally mapped onto DFP concepts. Results To enable the flexible creation and execution of bioinformatics dataflows, we have written a modular framework for parallel pipelines in Python ('PaPy'. A PaPy workflow is created from re-usable components connected by data-pipes into a directed acyclic graph, which together define nested higher-order map functions. The successive functional transformations of input data are evaluated on flexibly pooled compute resources, either local or remote. Input items are processed in batches of adjustable size, all flowing one to tune the trade-off between parallelism and lazy-evaluation (memory consumption. An add-on module ('NuBio' facilitates the creation of bioinformatics workflows by providing domain specific data-containers (e.g., for biomolecular sequences, alignments, structures and functionality (e.g., to parse/write standard file formats. Conclusions PaPy offers a modular framework for the creation and deployment of parallel and distributed data-processing workflows. Pipelines derive their functionality from user-written, data-coupled components, so PaPy also can be viewed as a lightweight toolkit for extensible, flow-based bioinformatics data-processing. The simplicity and flexibility of distributed PaPy pipelines may help users bridge the gap between traditional desktop/workstation and grid computing. PaPy is freely distributed as open-source Python code at http://muralab.org/PaPy, and

  17. A lightweight, flow-based toolkit for parallel and distributed bioinformatics pipelines.

    Science.gov (United States)

    Cieślik, Marcin; Mura, Cameron

    2011-02-25

    Bioinformatic analyses typically proceed as chains of data-processing tasks. A pipeline, or 'workflow', is a well-defined protocol, with a specific structure defined by the topology of data-flow interdependencies, and a particular functionality arising from the data transformations applied at each step. In computer science, the dataflow programming (DFP) paradigm defines software systems constructed in this manner, as networks of message-passing components. Thus, bioinformatic workflows can be naturally mapped onto DFP concepts. To enable the flexible creation and execution of bioinformatics dataflows, we have written a modular framework for parallel pipelines in Python ('PaPy'). A PaPy workflow is created from re-usable components connected by data-pipes into a directed acyclic graph, which together define nested higher-order map functions. The successive functional transformations of input data are evaluated on flexibly pooled compute resources, either local or remote. Input items are processed in batches of adjustable size, all flowing one to tune the trade-off between parallelism and lazy-evaluation (memory consumption). An add-on module ('NuBio') facilitates the creation of bioinformatics workflows by providing domain specific data-containers (e.g., for biomolecular sequences, alignments, structures) and functionality (e.g., to parse/write standard file formats). PaPy offers a modular framework for the creation and deployment of parallel and distributed data-processing workflows. Pipelines derive their functionality from user-written, data-coupled components, so PaPy also can be viewed as a lightweight toolkit for extensible, flow-based bioinformatics data-processing. The simplicity and flexibility of distributed PaPy pipelines may help users bridge the gap between traditional desktop/workstation and grid computing. PaPy is freely distributed as open-source Python code at http://muralab.org/PaPy, and includes extensive documentation and annotated usage

  18. A lightweight, flow-based toolkit for parallel and distributed bioinformatics pipelines

    Science.gov (United States)

    2011-01-01

    Background Bioinformatic analyses typically proceed as chains of data-processing tasks. A pipeline, or 'workflow', is a well-defined protocol, with a specific structure defined by the topology of data-flow interdependencies, and a particular functionality arising from the data transformations applied at each step. In computer science, the dataflow programming (DFP) paradigm defines software systems constructed in this manner, as networks of message-passing components. Thus, bioinformatic workflows can be naturally mapped onto DFP concepts. Results To enable the flexible creation and execution of bioinformatics dataflows, we have written a modular framework for parallel pipelines in Python ('PaPy'). A PaPy workflow is created from re-usable components connected by data-pipes into a directed acyclic graph, which together define nested higher-order map functions. The successive functional transformations of input data are evaluated on flexibly pooled compute resources, either local or remote. Input items are processed in batches of adjustable size, all flowing one to tune the trade-off between parallelism and lazy-evaluation (memory consumption). An add-on module ('NuBio') facilitates the creation of bioinformatics workflows by providing domain specific data-containers (e.g., for biomolecular sequences, alignments, structures) and functionality (e.g., to parse/write standard file formats). Conclusions PaPy offers a modular framework for the creation and deployment of parallel and distributed data-processing workflows. Pipelines derive their functionality from user-written, data-coupled components, so PaPy also can be viewed as a lightweight toolkit for extensible, flow-based bioinformatics data-processing. The simplicity and flexibility of distributed PaPy pipelines may help users bridge the gap between traditional desktop/workstation and grid computing. PaPy is freely distributed as open-source Python code at http://muralab.org/PaPy, and includes extensive

  19. Exploitation of complement regulatory proteins by Borrelia and Francisella.

    Science.gov (United States)

    Madar, Marian; Bencurova, Elena; Mlynarcik, Patrik; Almeida, André M; Soares, Renata; Bhide, Katarina; Pulzova, Lucia; Kovac, Andrej; Coelho, Ana V; Bhide, Mangesh

    2015-06-01

    Pathogens have developed sophisticated mechanisms of complement evasion such as binding to the host complement regulatory proteins (CRPs) on their surface or expression of CRP mimicking molecules. The ability of pathogens to evade the complement system has been correlated with pathogenesis and host selectivity. Hitherto, little work has been undertaken to determine whether Borrelia and Francisella exploit various CRPs to block complement attack. Seventeen Borrelia (twelve species) and six Francisella (three subspecies) strains were used to assess their ability to bind human, sheep and cattle CRPs or mimic membrane associated complement regulators. A series of experiments including affinity ligand binding experiments, pull-down assays and mass spectrometry based protein identification, revealed an array of CRP binding proteins of Borrelia and Francisella. Unlike Francisella, Borrelia strains were able to bind multiple human CRPs. Three strains of Borrelia (SKT-4, SKT-2 and HO14) showed the presence of a human CD46-homologous motif, indicating their ability to possess putative human CD46 mimicking molecules. Similarly, five strains of Borrelia and two strains of Francisella may have surface proteins with human CD59-homologous motifs. Among ovine and bovine CRPs, the only CRP bound by Francisella (LVS, Tul4 strain) was vitronectin, while ovine C4BP, ovine factor H and bovine factor H were bound to Borrelia strains SKT-2, DN127 and Co53. This study presents an array of proteins of Borrelia and Francisella that bind CRPs or may mimic membrane-CRPs, thus enabling multiphasic complement evasion strategies of these pathogens.

  20. Understanding Online Child Sexual Exploitation Offenses.

    Science.gov (United States)

    Ly, Thanh; Murphy, Lisa; Fedoroff, J Paul

    2016-08-01

    In the past three decades, there has been an exponential increase in the worldwide availability of Internet access and devices that are able to access online materials. This literature review investigated whether increased accessibility of Internet child pornography (CP) increases the risk of in-person child sexual exploitation. The current review found little to no evidence that availability of the Internet has increased the worldwide incidence or prevalence of in-person child sexual abuse. In fact, during the time period in which the Internet has flourished, international crime statistics have shown a steady decrease of in-person child sexual abuse. The only exception to this trend is an increase in Internet child pornography or luring offenses (e.g., Stats Can, 2014), which involves child abuse by definition. This article reviews the impact of the Internet on child sexual abuse. It also reviews the characteristics of online CP offenders. Treatment of these offenders and prevention of such offenses is also discussed.

  1. Exploiting intrinsic fluctuations to identify model parameters.

    Science.gov (United States)

    Zimmer, Christoph; Sahle, Sven; Pahle, Jürgen

    2015-04-01

    Parameterisation of kinetic models plays a central role in computational systems biology. Besides the lack of experimental data of high enough quality, some of the biggest challenges here are identification issues. Model parameters can be structurally non-identifiable because of functional relationships. Noise in measured data is usually considered to be a nuisance for parameter estimation. However, it turns out that intrinsic fluctuations in particle numbers can make parameters identifiable that were previously non-identifiable. The authors present a method to identify model parameters that are structurally non-identifiable in a deterministic framework. The method takes time course recordings of biochemical systems in steady state or transient state as input. Often a functional relationship between parameters presents itself by a one-dimensional manifold in parameter space containing parameter sets of optimal goodness. Although the system's behaviour cannot be distinguished on this manifold in a deterministic framework it might be distinguishable in a stochastic modelling framework. Their method exploits this by using an objective function that includes a measure for fluctuations in particle numbers. They show on three example models, immigration-death, gene expression and Epo-EpoReceptor interaction, that this resolves the non-identifiability even in the case of measurement noise with known amplitude. The method is applied to partially observed recordings of biochemical systems with measurement noise. It is simple to implement and it is usually very fast to compute. This optimisation can be realised in a classical or Bayesian fashion.

  2. Exploiting epigenetic vulnerabilities for cancer therapeutics.

    Science.gov (United States)

    Mair, Barbara; Kubicek, Stefan; Nijman, Sebastian M B

    2014-03-01

    Epigenetic deregulation is a hallmark of cancer, and there has been increasing interest in therapeutics that target chromatin-modifying enzymes and other epigenetic regulators. The rationale for applying epigenetic drugs to treat cancer is twofold. First, epigenetic changes are reversible, and drugs could therefore be used to restore the normal (healthy) epigenetic landscape. However, it is unclear whether drugs can faithfully restore the precancerous epigenetic state. Second, chromatin regulators are often mutated in cancer, making them attractive drug targets. However, in most instances it is unknown whether cancer cells are addicted to these mutated chromatin proteins, or whether their mutation merely results in epigenetic instability conducive to the selection of secondary aberrations. An alternative incentive for targeting chromatin regulators is the exploitation of cancer-specific vulnerabilities, including synthetic lethality, caused by epigenetic deregulation. We review evidence for the hypothesis that mechanisms other than oncogene addiction are a basis for the application of epigenetic drugs, and propose future research directions. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. Exploiting Virtualization and Cloud Computing in ATLAS

    International Nuclear Information System (INIS)

    Harald Barreiro Megino, Fernando; Van der Ster, Daniel; Benjamin, Doug; De, Kaushik; Gable, Ian; Paterson, Michael; Taylor, Ryan; Hendrix, Val; Vitillo, Roberto A; Panitkin, Sergey; De Silva, Asoka; Walker, Rod

    2012-01-01

    The ATLAS Computing Model was designed around the concept of grid computing; since the start of data-taking, this model has proven very successful in the federated operation of more than one hundred Worldwide LHC Computing Grid (WLCG) sites for offline data distribution, storage, processing and analysis. However, new paradigms in computing, namely virtualization and cloud computing, present improved strategies for managing and provisioning IT resources that could allow ATLAS to more flexibly adapt and scale its storage and processing workloads on varied underlying resources. In particular, ATLAS is developing a “grid-of-clouds” infrastructure in order to utilize WLCG sites that make resources available via a cloud API. This work will present the current status of the Virtualization and Cloud Computing R and D project in ATLAS Distributed Computing. First, strategies for deploying PanDA queues on cloud sites will be discussed, including the introduction of a “cloud factory” for managing cloud VM instances. Next, performance results when running on virtualized/cloud resources at CERN LxCloud, StratusLab, and elsewhere will be presented. Finally, we will present the ATLAS strategies for exploiting cloud-based storage, including remote XROOTD access to input data, management of EC2-based files, and the deployment of cloud-resident LCG storage elements.

  4. Tonic dopamine modulates exploitation of reward learning

    Directory of Open Access Journals (Sweden)

    Jeff A Beeler

    2010-11-01

    Full Text Available The impact of dopamine on adaptive behavior in a naturalistic environment is largely unexamined. Experimental work suggests that phasic dopamine is central to reinforcement learning whereas tonic dopamine may modulate performance without altering learning per se; however, this idea has not been developed formally or integrated with computational models of dopamine function. We quantitatively evaluate the role of tonic dopamine in these functions by studying the behavior of hyperdopaminergic DAT knockdown mice in an instrumental task in a semi-naturalistic homecage environment. In this closed economy paradigm, subjects earn all of their food by pressing either of two levers, but the relative cost for food on each lever shifts frequently. Compared to wild-type mice, hyperdopaminergic mice allocate more lever presses on high-cost levers, thus working harder to earn a given amount of food and maintain their body weight. However, both groups show a similarly quick reaction to shifts in lever cost, suggesting that the hyperdominergic mice are not slower at detecting changes, as with a learning deficit. We fit the lever choice data using reinforcement learning models to assess the distinction between acquisition and expression the models formalize. In these analyses, hyperdopaminergic mice displayed normal learning from recent reward history but diminished capacity to exploit this learning: a reduced coupling between choice and reward history. These data suggest that dopamine modulates the degree to which prior learning biases action selection and consequently alters the expression of learned, motivated behavior.

  5. Aspects of abuse: commercial sexual exploitation of children.

    Science.gov (United States)

    Jimenez, Melissa; Jackson, Allison M; Deye, Katherine

    2015-03-01

    Commercial sexual exploitation of children (CSEC) and adolescents is a serious worldwide problem. It is, in essence, the sexual abuse of a minor for economic gain. In the United States, there is no uniform nationwide database to capture the incidence and prevalence of CSEC. Therefore, there is a great variation in the estimates, but the actual numbers are unknown. Given the clandestine nature of the practice, it is often underreported and underidentified. Healthcare providers will often encounter victims of commercial sexual exploitation due to mental health, physical health, and sexual health consequences, and therefore should be knowledgeable in the signs of possible sexual exploitation. The aim of this article is to educate healthcare providers on how vulnerable children may become sexually exploited, the health consequences involved with sexual exploitation, how to better identify possible victims, and the medical evaluation of a victim of sexual exploitation. Copyright © 2015 Mosby, Inc. All rights reserved.

  6. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, Erwin; Dries, Jeroen

    2017-04-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (a Copernicus contributing mission) EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. Furthermore data from the Copernicus Global Land Service is in scope of the platform. From November 2015 an operational Proba-V MEP environment, as an ESA operation service, is gradually deployed at the VITO data center with direct access to the complete data archive. Since autumn 2016 the platform is operational and yet several applications are released to the users, e.g. - A time series viewer, showing the evolution of Proba-V bands and derived vegetation parameters from the Copernicus Global Land Service for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains on a powerfull Hadoop/Spark backend e.g. for the calculation of N-daily composites. - Virtual Machines can be provided with access to the data archive and tools to work with this data, e.g. various toolboxes (GDAL, QGIS, GrassGIS, SNAP toolbox, …) and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. - A prototype of jupyter Notebooks is available with some examples worked out to show the potential of the data. Today the platform is used by several third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. In parallel the platform is further improved and extended. From the MEP PROBA-V, access to Sentinel-2 and landsat data will

  7. Exploitation of Apoptotic Regulation in Cancer

    Directory of Open Access Journals (Sweden)

    David S. Ucker

    2018-02-01

    Full Text Available Within an organism, environmental stresses can trigger cell death, particularly apoptotic cell death. Apoptotic cells, themselves, are potent regulators of their cellular environment, involved primarily in effecting homeostatic control. Tumors, especially, exist in a dynamic balance of cell proliferation and cell death. This special feature of the tumorous microenvironment—namely, the prominence and persistence of cell death—necessarily entails a magnification of the extrinsic, postmortem effects of dead cells. In both normal and malignant tissues, apoptotic regulation is exerted through immune as well as non-immune mechanisms. Apoptotic cells suppress the repertoire of immune reactivities, both by attenuating innate (especially inflammatory responses and by abrogating adaptive responses. In addition, apoptotic cells modulate multiple vital cell activities, including survival, proliferation (cell number, and growth (cell size. While the microenvironment of the tumor may contribute to apoptosis, the postmortem effects of apoptotic cells feature prominently in the reciprocal acclimatization between the tumor and its environment. In much the same way that pathogens evade the host’s defenses through exploitation of key aspects of innate and adaptive immunity, cancer cells subvert several normal homeostatic processes, in particular wound healing and organ regeneration, to transform and overtake their environment. In understanding this subversion, it is crucial to view a tumor not simply as a clone of malignant cells, but rather as a complex and highly organized structure in which there exists a multidirectional flow of information between the cancer cells themselves and the multiple other cell types and extracellular matrix components of which the tumor is comprised. Apoptotic cells, therefore, have the unfortunate consequence of facilitating tumorigenesis and tumor survival.

  8. Exploitation of Parallelism in Climate Models

    Energy Technology Data Exchange (ETDEWEB)

    Baer, F.; Tribbia, J.J.; Williamson, D.L.

    1999-03-01

    The US Department of Energy (DOE), through its CHAMMP initiative, hopes to develop the capability to make meaningful regional climate forecasts on time scales exceeding a decade, such capability to be based on numerical prediction type models. We propose research to contribute to each of the specific items enumerated in the CHAMMP announcement (Notice 91-3); i.e., to consider theoretical limits to prediction of climate and climate change on appropriate time scales, to develop new mathematical techniques to utilize massively parallel processors (MPP), to actually utilize MPPs as a research tool, and to develop improved representations of some processes essential to climate prediction. In particular, our goals are to: (1) Reconfigure the prediction equations such that the time iteration process can be compressed by use of MMP architecture, and to develop appropriate algorithms. (2) Develop local subgrid scale models which can provide time and space dependent parameterization for a state- of-the-art climate model to minimize the scale resolution necessary for a climate model, and to utilize MPP capability to simultaneously integrate those subgrid models and their statistics. (3) Capitalize on the MPP architecture to study the inherent ensemble nature of the climate problem. By careful choice of initial states, many realizations of the climate system can be determined concurrently and more realistic assessments of the climate prediction can be made in a realistic time frame. To explore these initiatives, we will exploit all available computing technology, and in particular MPP machines. We anticipate that significant improvements in modeling of climate on the decadal and longer time scales for regional space scales will result from our efforts.

  9. Simulation of subsea gas hydrate exploitation

    Science.gov (United States)

    Janicki, Georg; Schlüter, Stefan; Hennig, Torsten; Deerberg, Görge

    2014-05-01

    The recovery of methane from gas hydrate layers that have been detected in several subsea sediments and permafrost regions around the world is a promising perspective to overcome future shortages in natural gas supply. Being aware that conventional natural gas resources are limited, research is going on to develop technologies for the production of natural gas from such new sources. Thus various research programs have started since the early 1990s in Japan, USA, Canada, India, and Germany to investigate hydrate deposits and develop required technologies. In recent years, intensive research has focussed on the capture and storage of CO2 from combustion processes to reduce climate impact. While different natural or man-made reservoirs like deep aquifers, exhausted oil and gas deposits or other geological formations are considered to store gaseous or liquid CO2, the storage of CO2 as hydrate in former methane hydrate fields is another promising alternative. Due to beneficial stability conditions, methane recovery may be well combined with CO2 storage in the form of hydrates. Regarding technological implementation many problems have to be overcome. Especially mixing, heat and mass transfer in the reservoir are limiting factors causing very long process times. Within the scope of the German research project »SUGAR« different technological approaches for the optimized exploitation of gas hydrate deposits are evaluated and compared by means of dynamic system simulations and analysis. Detailed mathematical models for the most relevant chemical and physical processes are developed. The basic mechanisms of gas hydrate formation/dissociation and heat and mass transport in porous media are considered and implemented into simulation programs. Simulations based on geological field data have been carried out. The studies focus on the potential of gas production from turbidites and their fitness for CO2 storage. The effects occurring during gas production and CO2 storage within

  10. Simulated population responses of common carp to commercial exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Weber, Michael J.; Hennen, Matthew J.; Brown, Michael L.

    2011-12-01

    Common carp Cyprinus carpio is a widespread invasive species that can become highly abundant and impose deleterious ecosystem effects. Thus, aquatic resource managers are interested in controlling common carp populations. Control of invasive common carp populations is difficult, due in part to the inherent uncertainty of how populations respond to exploitation. To understand how common carp populations respond to exploitation, we evaluated common carp population dynamics (recruitment, growth, and mortality) in three natural lakes in eastern South Dakota. Common carp exhibited similar population dynamics across these three systems that were characterized by consistent recruitment (ages 3 to 15 years present), fast growth (K = 0.37 to 0.59), and low mortality (A = 1 to 7%). We then modeled the effects of commercial exploitation on size structure, abundance, and egg production to determine its utility as a management tool to control populations. All three populations responded similarly to exploitation simulations with a 575-mm length restriction, representing commercial gear selectivity. Simulated common carp size structure modestly declined (9 to 37%) in all simulations. Abundance of common carp declined dramatically (28 to 56%) at low levels of exploitation (0 to 20%) but exploitation >40% had little additive effect and populations were only reduced by 49 to 79% despite high exploitation (>90%). Maximum lifetime egg production was reduced from 77 to 89% at a moderate level of exploitation (40%), indicating the potential for recruitment overfishing. Exploitation further reduced common carp size structure, abundance, and egg production when simulations were not size selective. Our results provide insights to how common carp populations may respond to exploitation. Although commercial exploitation may be able to partially control populations, an integrated removal approach that removes all sizes of common carp has a greater chance of controlling population abundance

  11. Exploiting for medical and biological applications

    Science.gov (United States)

    Giano, Michael C.

    Biotherapeutics are an emerging class of drug composed of molecules ranging in sizes from peptides to large proteins. Due to their poor stability and mucosal membrane permeability, biotherapeutics are administered by a parenteral method (i.e., syringe, intravenous or intramuscular). Therapeutics delivered systemically often experience short half-lives. While, local administration may involve invasive surgical procedures and suffer from poor retention at the site of application. To compensate, the patient receives frequent doses of highly concentrated therapeutic. Unfortunately, the off-target side effects and discomfort associated with multiple injections results in poor patient compliance. Therefore, new delivery methods which can improve therapeutic retention, reduce the frequency of administration and may aid in decreasing the off-target side effects is a necessity. Hydrogels are a class of biomaterials that are gaining interests for tissue engineering and drug delivery applications. Hydrogel materials are defined as porous, 3-dimensional networks that are primarily composed of water. Generally, they are mechanically rigid, cytocompatible and easily chemically functionalized. Collectively, these properties make hydrogels fantastic candidates to perform as drug delivery depots. Current hydrogel delivery systems physically entrap the target therapeutic which is then subsequently released over time at the site of administration. The swelling and degradation of the material effect the diffusion of the therapy from the hydrogel, and therefore should be controlled. Although these strategies provide some regulation over therapeutic release, full control of the delivery is not achieved. Newer approaches are focused on designing hydrogels that exploit known interactions, covalently attach the therapy or respond to an external stimulus in an effort to gain improved control over the therapy's release. Unfortunately, the biotherapeutic is typically required to be chemically

  12. Tuning oxygen sensitivity of ruthenium complex exploiting silver nanoparticles

    Energy Technology Data Exchange (ETDEWEB)

    Ozturk, Osman [Department of Chemistry, Faculty of Science, University of Dicle, Diyarbakır (Turkey); Oter, Ozlem [Department of Chemistry, Faculty of Science, University of Dokuz Eylul, 35397 Buca, Izmir (Turkey); Center for Fabrication and Application of Electronic Materials (EMUM), University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Nanoscience and Nanoengineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Yildirim, Serdar [Center for Fabrication and Application of Electronic Materials (EMUM), University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Metallurgical and Materials Engineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Subasi, Elif [Department of Chemistry, Faculty of Science, University of Dokuz Eylul, 35397 Buca, Izmir (Turkey); Department of Nanoscience and Nanoengineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Ertekin, Kadriye, E-mail: kadriye.ertekin@deu.edu.tr [Department of Chemistry, Faculty of Science, University of Dokuz Eylul, 35397 Buca, Izmir (Turkey); Center for Fabrication and Application of Electronic Materials (EMUM), University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Nanoscience and Nanoengineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Celik, Erdal [Center for Fabrication and Application of Electronic Materials (EMUM), University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Nanoscience and Nanoengineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Metallurgical and Materials Engineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Temel, Hamdi [Department of Chemistry, Faculty of Science, University of Dicle, Diyarbakır (Turkey)

    2014-11-15

    In this study, we utilized silver nanoparticles (Ag NPs) along with ionic liquids as additives for fabrication of polymeric oxygen sensitive fibers. Plasticized polymethyl methacrylate and ethyl cellulose (EC) were used as matrix materials. Fibers and porous films were produced by electrospinning technique. Oxygen induced spectral response of the fluorescent tris(2,2′-bipyridyl) ruthenium(II) chloride (Ru(bipy){sub 3}{sup 2+}) was followed as the analytical signal. Utilization of silver nanoparticles in electrospun polymeric fibers for oxygen sensing purposes resulted with many advantages such as tuned sensitivity, linear calibration plot for larger concentration ranges, increased surface area and enhancement in all sensor dynamics. Linearity of the calibration plot for the offered composition was superior with respect to the previously reported ones. When stored at the ambient air of the laboratory there was no significant drift in intensity after 12 months. Our sensitivity and stability tests are still in progress. - Highlights: • Ag nanoparticles and Ru(II) complex doped together into polymers for the first time for O{sub 2} sensing. • The ionic liquid EMIMBF{sub 4} was used for matrix modification. • Fabricated electrospun nanofibers offered enhanced linearity for a large concentration range. • Exploited polymeric matrix materials and additives provided long-term stability. • Silver nanoparticles tuned oxygen sensitivity and facilitated fabrication process.

  13. Exploitation program of ''Adamow'' quarry up to 2015

    International Nuclear Information System (INIS)

    Hadlaw, A.

    1994-01-01

    The brown coal deposits exploited by the quarry ''Adamow'' located in Central Poland are shortly described and the prognosis of their exploitation up to 2015 is given. The basis data on the perspective deposits in the quarry's area are also presented. All deposits are shown on the map. 3 ills, 2 tabs

  14. The Dark Side of Courtship: Violence and Sexual Exploitation.

    Science.gov (United States)

    Lloyd, Sally A.

    1991-01-01

    Reviews literature on physical violence and sexual exploitation between premarital partners. Suggests that two features of dating encourage exploitative behavior: different context of courtship for males versus females encourages male control of relationships and female compliance, and highly romanticized nature of courtship encourages partners to…

  15. Teaching the Mentally Handicapped To Avoid Sexual Exploitation.

    Science.gov (United States)

    Fisher, Gary L.; And Others

    Existing curricula on prevention of sexual exploitation for non-mentally handicapped children are not appropriate for the mentally retarded. Curricula specifically designed for special needs students include the "Special Education Curriculum on Sexual Exploitation" for mildly handicapped students and "Self-Protection for the…

  16. Early Sexual Exploitation as an Influence in Prostitution.

    Science.gov (United States)

    Silbert, Mimi H.; Pines, Ayala M.

    1983-01-01

    Surveyed 200 female street prostitutes to determine whether they were sexually exploited during childhood. Results showed 60 percent of the subjects were sexually exploited. The few girls who discussed their abuse with others were met with shame and most often inaction. Only 10 percent were abused by strangers. (JAC)

  17. A Descriptive Study on Sexually Exploited Children in Residential Treatment

    Science.gov (United States)

    Twill, Sarah E.; Green, Denise M.; Traylor, Amy

    2010-01-01

    Sexual exploitation and prostitution of children and adolescents is a multibillion dollar industry in the United States (Estes and Weiner in "Medical, legal & social science aspects of child sexual exploitation: A comprehensive review of pornography, prostitution, and internet crimes, vol I," G.W. Medical Publishing, Inc, St Louis,…

  18. Geodetic monitoring (TLS of a steel transport trestle bridge located in an active mining exploitation site

    Directory of Open Access Journals (Sweden)

    Skoczylas Arkadiusz

    2016-09-01

    Full Text Available Underground mining exploitation causes, in general, irregular vertical and horizontal shifts in the superficial layer of the rock mass. In the case of construction objects seated on this layer, a deformation of the object’s foundation can be observed. This leads to additional loads and deformations. Identification of surface geometry changes in construction objects located within the premises of underground mining exploitation areas is an important task as far as safety of mining sites is concerned. Surveys targeting shifts and deformations in engineering objects preformed with the use of classic methods are of a selective nature and do not provide the full image of the phenomenon being the subject of the observation. This paper presents possibilities of terrestrial laser scanning technology application in the monitoring of engineering objects that allows for a complete spatial documentation of an object subjected to the influence of an active mining exploitation. This paper describes an observation of a 100 m section of a steel transport trestle bridge located on the premises of hard coal mine Lubelski Węgiel “Bogdanka” S.A. carried out in 2015. Measurements were carried out using a Z+F Imager 5010C scanner at an interval of 3.5 months. Changes in the structure’s geometry were determined by comparing the point clouds recorded during the two measurement periods. The results of the analyses showed shifts in the trestle bridge towards the exploited coal wall accompanied by object deformation. The obtained results indicate the possibility of of terrestrial laser scanning application in studying the aftereffects of underground mining exploitation on surface engineering objects.

  19. [Ecotourism exploitation model in Bita Lake Natural Reserve of Yunnan].

    Science.gov (United States)

    Yang, G; Wang, Y; Zhong, L

    2000-12-01

    Bita lake provincial natural reserve is located in Shangri-La region of North-western Yunnan, and was set as a demonstrating area for ecotourism exploitation in 1998. After a year's exploitation construction and half a year's operation as a branch of the 99' Kunming International Horticulture Exposition to accept tourists, it was proved that the ecotourism demonstrating area attained four integrated functions of ecotourism, i.e., tourism, protection, poverty clearing and environment education. Five exploitation and management models including function zoned exploitation model, featured tourism communication model signs system designing model, local Tibetan family reception model and environmental monitoring model, were also successful, which were demonstrated and spreaded to the whole province. Bita lake provincial natural reserve could be a good sample for the ecotourism exploitation natural reserves of the whole country.

  20. Making and exploiting fullerenes, graphene, and carbon nanotubes

    Energy Technology Data Exchange (ETDEWEB)

    Marcaccio, Massimo; Paolucci, Francesco (eds.) [Bologna Univ. (Italy). Dept. of Chemistry G. Ciamician

    2014-11-01

    ;'Fullerene-Stoppered Bistable Rotaxanes'' by Aurelio Mateo-Alonso, which presents an overview of the different types of fullerene-stoppered bistable rotaxanes, their switching mechanism and their potential applications. In the chapter ''Catalysis-Material Crosstalk at Tailored Nano-Carbon Interfaces'' by Michele Melchionna et al., carbon nanomaterials are described as supports for molecular and nanostructured catalysts, where their outstanding electronic and optical properties, high surface area and thermal and mechanical stability contribute to create a synergistic effect that leads to enhanced performance for a wide range of possible applications. Exploitation of nanocarbons in biology and biomedical applications has been increasingly proposed and, in particular, the chapter ''Carbon Nanotubes in Tissue Engineering'' by Susanna Bosi et al. explores applications of CNTs for tissue engineering purposes, where the tubes proved to be ideal materials for the growth and proliferation of many kind of tissues. The local chemical reactivity, the mechanical properties and the electron transfer in graphene membranes have been shown to be strongly affected by the fold-induced curvature; thus in the chapter ''Folds and Buckles at the Nanoscale: Experimental and Theoretical Investigation of the Bending Properties of Graphene Membranes'' by Vittorio Morandi, a novel methodology to investigate the mechanical properties of folded and wrinkled graphene crystals, which combine transmission electron microscopy mapping and theoretical modelling, is described. Graphene and nanocarbons in general are intensively investigated as platforms for the development of sensing devices for the selective and highly sensitive detection of biohazards. The aim of the chapter ''Graphene and Graphene Oxide Materials for Chemo- and Biosensing of Chemical and Biochemical Hazards'' by Piyush Sindhu Sharma et al. is then to bring out important

  1. Cerro Prieto geothermal field: exploration during exploitation

    Energy Technology Data Exchange (ETDEWEB)

    1982-07-01

    Geological investigations at Momotombo included photogeology, field mapping, binocular microscope examination of cuttings, and drillhole correlations. Among the geophysical techniques used to investigate the field sub-structure were: Schlumberger and electromagnetic soundings, dipole mapping and audio-magnetotelluric surveys, gravity and magnetic measurements, frequency domain soundings, self-potential surveys, and subsurface temperature determinations. The geochemical program analyzed the thermal fluids of the surface and in the wells. The description and results of exploration methods used during the investigative stages of the Momotombo Geothermal Field are presented. A conceptual model of the geothermal field was drawn from the information available at each exploration phase. The exploration methods have been evaluated with respect to their contributions to the understanding of the field and their utilization in planning further development.

  2. Rationalising predictors of child sexual exploitation and sex-trading.

    Science.gov (United States)

    Klatt, Thimna; Cavner, Della; Egan, Vincent

    2014-02-01

    Although there is evidence for specific risk factors leading to child sexual exploitation and prostitution, these influences overlap and have rarely been examined concurrently. The present study examined case files for 175 young persons who attended a voluntary organization in Leicester, United Kingdom, which supports people who are sexually exploited or at risk of sexual exploitation. Based on the case files, the presence or absence of known risk factors for becoming a sex worker was coded. Data were analyzed using t-test, logistic regression, and smallest space analysis. Users of the voluntary organization's services who had been sexually exploited exhibited a significantly greater number of risk factors than service users who had not been victims of sexual exploitation. The logistic regression produced a significant model fit. However, of the 14 potential predictors--many of which were associated with each other--only four variables significantly predicted actual sexual exploitation: running away, poverty, drug and/or alcohol use, and having friends or family members in prostitution. Surprisingly, running away was found to significantly decrease the odds of becoming involved in sexual exploitation. Smallest space analysis of the data revealed 5 clusters of risk factors. Two of the clusters, which reflected a desperation and need construct and immature or out-of-control lifestyles, were significantly associated with sexual exploitation. Our research suggests that some risk factors (e.g. physical and emotional abuse, early delinquency, and homelessness) for becoming involved in sexual exploitation are common but are part of the problematic milieu of the individuals affected and not directly associated with sex trading itself. Our results also indicate that it is important to engage with the families and associates of young persons at risk of becoming (or remaining) a sex worker if one wants to reduce the numbers of persons who engage in this activity. Copyright

  3. Imouraren mining exploitation : Complementary studies Synthetic report Volum B - Mines

    International Nuclear Information System (INIS)

    1980-01-01

    The object of the current study is to determine the main technical characteristics of the reference project of a mine that can supply the necessary ore quantity at a production of 3000 tonnes uranium per year, along 10 years. The project is one of the possible solutions for exploiting the mine. The current study permits to establish : investment and functioning cost estimation, overall project of the mining exploitation program, necessary strength estimation, average ore grades evaluation and variations of these grades, utilities needs, production vizing program, main exploitation methods and necessary materials. Reference project study of the mine serves as base to the economics studies and studies optimization [fr

  4. The possibilities of exploitation of Serbian thermomineral waters

    International Nuclear Information System (INIS)

    Jovanovic, L.

    2002-01-01

    Global ecological problem of petrol resources deficit caused an intensive search of alternative energy sources. Deficit of conventional energy fluids in Yugoslavia requires serious efforts to create a program of alternative energy sources exploitation. Geothermal energy represents an important energetic source for the countries with poor energy resources. Geothermal energy can become the basis for economic development. At present these geothermal resources are not being exploited in Yugoslavia. The possibilities of effective exploitation of thermal and thermomineral water resources in Yugoslavia are presented in this paper

  5. Electrochemical flow-based solution-solid growth of the Cu2O nanorod array: potential application to lithium ion batteries.

    Science.gov (United States)

    Shin, Jeong Ho; Park, Sun Hwa; Hyun, Seung Min; Kim, Jeong Won; Park, Hyun Min; Song, Jae Yong

    2014-09-14

    The catalyzed solution-liquid-solid (SLS) growth has been well developed to synthesize semiconductor nanowires with controlled diameters. The SLS growth occurs in the longitudinal direction of nanowires, due to the directional anisotropy driven by the metal catalysts where chemical precursors are introduced. In the present study, we report a selective, template-free, and environmentally-friendly electrochemical flow-based solution-solid (electrochemical flow-SS) growth of the Cu2O nanorod array. The anisotropy for directional growth without any catalysts is generated by the electrical field in a flowing electrolyte of ultra-dilute CuSO4. The filamentary anisotropy originates from electric field enhancement on pyramidal nanocrystals in the electrolyte of low ionic conductivity (13 μS cm(-1)). The Cu2O and Cu nanorods are able to be selectively synthesized by controlling the electrolyte pH and oxygen dissolution into the electrolyte. The synthesized Cu2O nanorod array shows excellent electrochemical properties as an anode material for lithium-ion batteries; the specific capacities increase from 323 to 1206 mA h g(-1) during 500 cycles. The capacity enhancement is due to the phase transformation from Cu2O to CuO, nano-restructuring of nanorods into fragmented nanoparticles, and the progressive generation of an electroactive polymeric gel-like layer on the surface of the nanoparticles. The electrochemical flow-SS growth of Cu2O nanorods is expected to contribute to further development of other functional nanorods.

  6. System-Level Modeling and Synthesis Techniques for Flow-Based Microfluidic Very Large Scale Integration Biochips

    DEFF Research Database (Denmark)

    Minhass, Wajid Hassan

    Microfluidic biochips integrate different biochemical analysis functionalities on-chip and offer several advantages over the conventional biochemical laboratories. In this thesis, we focus on the flow-based biochips. The basic building block of such a chip is a valve which can be fabricated at very...... to reduce the macro-assembly around the chip and enhance chip scalability, we propose an approach for the biochip pin count minimization. We also propose a throughput maximization scheme for the cell culture mVLSI biochips, saving time and reducing costs. We have extensively evaluated the proposed...

  7. Understanding and Exploiting the T - Cell Memory

    Directory of Open Access Journals (Sweden)

    Kshipra Chandrashekhar1

    Full Text Available Immunological memory is one of the lesser understood aspects of adaptive immunity which protects organisms from recurrent and persistent attack by pathogens. The central event in the generation of both humoral and cell mediated immune responses is the activation and clonal expansion of T cells. T cell activation is initiated by interaction of the TCR-CD3 complex with processed antigenic peptide bound to either a class I (CD8+cells or class II (CD 4+cells MHC molecule on the surface of antigen presenting cell (APC. On interaction of a naïve T cell with the processed antigen initiates a cascade of events which activates the resting T cell to enter the cell cycle, proliferating and developing into a clone of progeny cells, which differentiate into memory or effector T cells. Memory T cells are generated by antigen interaction and remain long but quiescent in nature, however responding with greater reactivity to a subsequent challenge with the same antigen, generating a secondary response. Memory cells, though in the G0 stage of the cell cycle require a lower level of activation than so naïve cells. A lot of work in this direction can yield a whole lot of interesting findings which will help us develop better vaccines for chronic animal diseases like Tuberculosis, Johne’s disease using suitable animal models. A better understanding of these issues may lead to improvements in the design of vaccines which can be used to generate potent protective T cell memory against pathogens. In the present article various properties of memory T cells along with their implications to vaccine development have been reviewed. [Veterinary World 2010; 3(7.000: 343-345

  8. Autonomous Industrial Mobile Manipulation (AIMM) - maturation, exploitation and implementation

    DEFF Research Database (Denmark)

    Hvilshøj, Mads

    This thesis introduces the Autonomous Industrial Mobile Manipulator ”Little Helper”, a robotic co-worker which extends the potential of industrial robotics by combining locomotion and manipulation capabilities. The thesis presents promising findings for industrial maturation, exploitation...

  9. Human trafficking and exploitation: A global health concern.

    Science.gov (United States)

    Zimmerman, Cathy; Kiss, Ligia

    2017-11-01

    In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  10. Enhanced surrogate models for statistical design exploiting space mapping technology

    DEFF Research Database (Denmark)

    Koziel, Slawek; Bandler, John W.; Mohamed, Achmed S.

    2005-01-01

    We present advances in microwave and RF device modeling exploiting Space Mapping (SM) technology. We propose new SM modeling formulations utilizing input mappings, output mappings, frequency scaling and quadratic approximations. Our aim is to enhance circuit models for statistical analysis...

  11. Exporting DNA – striking a balance between preventing exploitation ...

    African Journals Online (AJOL)

    ); additional documentation that would apparently limit this exploitation is now required. This includes: (i) a material transfer agreement (MTA) that details what will be done with the. DNA and how the information derived therefrom will be used; ...

  12. Management of impacts and risks related to the exploitation of source rock hydrocarbons: stakes, locks, and research opportunities. Final report

    International Nuclear Information System (INIS)

    Lary, L. de; Fabriol, H.; Azaroual, M.; Barthelemy, Y.; Bonijoly, D.; Seyedi, D.; Dorfliger, N.; Negrel, P.; Perrin, J.; Serrano, O.; Vernier, R.; Moretti, I.; Kalaydjian, F.; Benoit, Y.; Vially, R.; Didier, C.

    2011-09-01

    This report aims at identifying environmental challenges and risks related to the exploitation of source rock oils and gases, at identifying scientific and technological locks related to the management of potential risks and impacts for the environment, and at proposing actions in the field of scientific research to address the different risks raised by this technique, and to see whether existing locks can be unleashed. After having recalled the context (brief history of source rock gases and oils, methods of exploration and exploitation, North-American return on experience on hydraulic fracturing for the exploitation of source rock hydrocarbons, conclusions of a provisional report), the report describes various aspects related to the geological medium: source rock, stress status, cracks, natural fracturing, knowledge of the water resource. It identifies the various risks and pollutions related to hydraulic fracturing, to the use of chemical products (these products and their toxicity are indicated), to water quality, to the treatment and future of effluents, to induced seismicity phenomena, to non controlled migration of gases towards the surface, to surface installations, to the exploitation for the environment. The authors propose an assessment of current practices in the field of risk management: methodology of risk assessment, integrated exploitation management, control, corrective measures and repairs. A list of research topics and a selection of priority research topics are finally proposed

  13. Assessment of Sub-Micron Particles by Exploiting Charge Differences with Dielectrophoresis

    Directory of Open Access Journals (Sweden)

    Maria F. Romero-Creel

    2017-08-01

    Full Text Available The analysis, separation, and enrichment of submicron particles are critical steps in many applications, ranging from bio-sensing to disease diagnostics. Microfluidic electrokinetic techniques, such as dielectrophoresis (DEP have proved to be excellent platforms for assessment of submicron particles. DEP is the motion of polarizable particles under the presence of a non-uniform electric field. In this work, the polarization and dielectrophoretic behavior of polystyrene particles with diameters ranging for 100 nm to 1 μm were studied employing microchannels for insulator based DEP (iDEP and low frequency (<1000 Hz AC and DC electric potentials. In particular, the effects of particle surface charge, in terms of magnitude and type of functionalization, were examined. It was found that the magnitude of particle surface charge has a significant impact on the polarization and dielectrophoretic response of the particles, allowing for successful particle assessment. Traditionally, charge differences are exploited employing electrophoretic techniques and particle separation is achieved by differential migration. The present study demonstrates that differences in the particle’s surface charge can also be exploited by means of iDEP; and that distinct types of nanoparticles can be identified by their polarization and dielectrophoretic behavior. These findings open the possibility for iDEP to be employed as a technique for the analysis of submicron biological particles, where subtle differences in surface charge could allow for rapid particle identification and separation.

  14. Intensive exploitation of a karst aquifer leads to Cryptosporidium water supply contamination.

    Science.gov (United States)

    Khaldi, S; Ratajczak, M; Gargala, G; Fournier, M; Berthe, T; Favennec, L; Dupont, J P

    2011-04-01

    Groundwater from karst aquifers is an important source of drinking water worldwide. Outbreaks of cryptosporidiosis linked to surface water and treated public water are regularly reported. Cryptosporidium oocysts are resistant to conventional drinking water disinfectants and are a major concern for the water industry. Here, we examined conditions associated with oocyst transport along a karstic hydrosystem, and the impact of intensive exploitation on Cryptosporidium oocyst contamination of the water supply. We studied a well-characterized karstic hydrosystem composed of a sinkhole, a spring and a wellbore. Thirty-six surface water and groundwater samples were analyzed for suspended particulate matter, turbidity, electrical conductivity, and Cryptosporidium and Giardia (oo)cyst concentrations. (Oo)cysts were identified and counted by means of solid-phase cytometry (ChemScan RDI(®)), a highly sensitive method. Cryptosporidium oocysts were detected in 78% of both surface water and groundwater samples, while Giardia cysts were found in respectively 22% and 8% of surface water and groundwater samples. Mean Cryptosporidium oocyst concentrations were 29, 13 and 4/100 L at the sinkhole, spring and wellbore, respectively. Cryptosporidium oocysts were transported from the sinkhole to the spring and the wellbore, with respective release rates of 45% and 14%, suggesting that oocysts are subject to storage and remobilization in karst conduits. Principal components analysis showed that Cryptosporidium oocyst concentrations depended on variations in hydrological forcing factors. All water samples collected during intensive exploitation contained oocysts. Control of Cryptosporidium oocyst contamination during intensive exploitation is therefore necessary to ensure drinking water quality. Copyright © 2011. Published by Elsevier Ltd.

  15. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    OpenAIRE

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definit...

  16. The ESA scientific exploitation element results and outlook

    Science.gov (United States)

    Desnos, Yves-louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Donlon, Craig; Mathieu, Pierre-Philippe; Fernandez, Diego; Gascon, Ferran; Zehner, Claus; Davidson, Malcolm; Goryl, Philippe; Koetz, Benjamin; Pinnock, Simon

    2017-04-01

    The Scientific Exploitation of Operational Missions (SEOM) element of ESA's fourth Earth Observation Envelope Programme (EOEP4) prime objective is to federate, support and expand the international research community built up over the last 25 years exploiting ESA's EO missions. SEOM enables the science community to address new scientific research areas that are opened by the free and open access to data from operational EO missions. Based on community-wide recommendations, gathered through a series of international thematic workshops and scientific user consultation meetings, key research studies have been launched over the last years to further exploit data from the Sentinels (http://seom.esa.int/). During 2016 several Science users consultation workshops have been organized, new results from scientific studies have been published and open-source multi-mission scientific toolboxes have been distributed (SNAP 80000 users from 190 countries). In addition the first ESA Massive Open Online Courses on Climate from space have been deployed (20000 participants) and the second EO Open Science conference was organized at ESA in September 2016 bringing together young EO scientists and data scientists. The new EOEP5 Exploitation element approved in 2016 and starting in 2017 is taking stock of all precursor activities in EO Open Science and Innovation and in particular a workplan for ESA scientific exploitation activities has been presented to Member States taking full benefit of the latest information and communication technology. The results and highlights from current scientific exploitation activities will be presented and an outlook on the upcoming activities under the new EOEP5 exploitation element will be given.

  17. Rational Exploitation and Utilizing of Groundwater in Jiangsu Coastal Area

    Science.gov (United States)

    Kang, B.; Lin, X.

    2017-12-01

    Jiangsu coastal area is located in the southeast coast of China, where is a new industrial base and an important coastal and Land Resources Development Zone of China. In the areas with strong human exploitation activities, regional groundwater evolution is obviously affected by human activities. In order to solve the environmental geological problems caused by groundwater exploitation fundamentally, we must find out the forming conditions of regional groundwater hydrodynamic field, and the impact of human activities on groundwater hydrodynamic field evolution and hydrogeochemical evolition. Based on these results, scientific management and reasonable exploitation of the regional groundwater resources can be provided for the utilization. Taking the coastal area of Jiangsu as the research area, we investigate and analyze of the regional hydrogeological conditions. The numerical simulation model of groundwater flow was established according to the water power, chemical and isotopic methods, the conditions of water flow and the influence of hydrodynamic field on the water chemical field. We predict the evolution of regional groundwater dynamics under the influence of human activities and climate change and evaluate the influence of groundwater dynamic field evolution on the environmental geological problems caused by groundwater exploitation under various conditions. We get the following conclusions: Three groundwater exploitation optimal schemes were established. The groundwater salinization was taken as the primary control condition. The substitution model was proposed to model groundwater exploitation and water level changes by BP network method.Then genetic algorithm was used to solve the optimization solution. Three groundwater exploitation optimal schemes were submit to local water resource management. The first sheme was used to solve the groundwater salinization problem. The second sheme focused on dual water supply. The third sheme concerned on emergency water

  18. Optic flow-based collision-free strategies: From insects to robots.

    Science.gov (United States)

    Serres, Julien R; Ruffier, Franck

    2017-09-01

    Flying insects are able to fly smartly in an unpredictable environment. It has been found that flying insects have smart neurons inside their tiny brains that are sensitive to visual motion also called optic flow. Consequently, flying insects rely mainly on visual motion during their flight maneuvers such as: takeoff or landing, terrain following, tunnel crossing, lateral and frontal obstacle avoidance, and adjusting flight speed in a cluttered environment. Optic flow can be defined as the vector field of the apparent motion of objects, surfaces, and edges in a visual scene generated by the relative motion between an observer (an eye or a camera) and the scene. Translational optic flow is particularly interesting for short-range navigation because it depends on the ratio between (i) the relative linear speed of the visual scene with respect to the observer and (ii) the distance of the observer from obstacles in the surrounding environment without any direct measurement of either speed or distance. In flying insects, roll stabilization reflex and yaw saccades attenuate any rotation at the eye level in roll and yaw respectively (i.e. to cancel any rotational optic flow) in order to ensure pure translational optic flow between two successive saccades. Our survey focuses on feedback-loops which use the translational optic flow that insects employ for collision-free navigation. Optic flow is likely, over the next decade to be one of the most important visual cues that can explain flying insects' behaviors for short-range navigation maneuvers in complex tunnels. Conversely, the biorobotic approach can therefore help to develop innovative flight control systems for flying robots with the aim of mimicking flying insects' abilities and better understanding their flight. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  19. Measurement of urinary N-telopeptides and serum C-telopeptides from type I collagen using a lateral flow-based immunoassay.

    Science.gov (United States)

    Lee, Kyoung Min; Lee, Min Ho; Chung, Chin Youb; Seong, Woo Kyeong; Lee, Sang Dae; Park, Moon Seok

    2012-12-24

    Measuring bone turnover markers could detect early stages of osteoporosis and early responses to anti-osteoporotic treatments. Currently, commonly used bone turnover markers, N-telopeptides (NTx) and C-telopeptides (CTx), are measured using ELISA tests, which demands time and increases cost. Bone turnover markers need to be measured more easily for general use. Lateral flow-based immunoassay would be an appropriate method for this context. This study was performed to investigate the precision of a newly developed lateral flow-based immunoassay for measuring the urinary NTx and serum CTx, and their correlations with ELISA measurements. Urine NTx and serum CTx concentrations were determined by photoscan of newly developed strips, using a lateral flow-based immunoassay for 36 subjects (mean age 66.2 years, SD 7.5 years; four males and 32 females). Repeated measurement of urinary NTx and serum CTx were performed three times, using this technology for a precision test. The correlation of the lateral flow-based immunoassay with the ELISA measurements was analyzed. Precision of the newly developed lateral flow based immunoassay was 0.974 (ICC, 95% confidence interval, 0.955 to 0.986) and 0.995 (ICC, 95% confidence interval, 0.991 to 0.997) for urinary NTx and serum CTx, respectively. The correlation of lateral flow based immunoassay with ELISA was 0.913 for urinary NTx and 0.872 for serum CTx. These results suggest that measuring the urinary NTx and serum CTx, using a lateral flow-based immunoassay, is a relevant method for point-of-care testing and screening of bone resorption markers.

  20. Towards agile large-scale predictive modelling in drug discovery with flow-based programming design principles.

    Science.gov (United States)

    Lampa, Samuel; Alvarsson, Jonathan; Spjuth, Ola

    2016-01-01

    Predictive modelling in drug discovery is challenging to automate as it often contains multiple analysis steps and might involve cross-validation and parameter tuning that create complex dependencies between tasks. With large-scale data or when using computationally demanding modelling methods, e-infrastructures such as high-performance or cloud computing are required, adding to the existing challenges of fault-tolerant automation. Workflow management systems can aid in many of these challenges, but the currently available systems are lacking in the functionality needed to enable agile and flexible predictive modelling. We here present an approach inspired by elements of the flow-based programming paradigm, implemented as an extension of the Luigi system which we name SciLuigi. We also discuss the experiences from using the approach when modelling a large set of biochemical interactions using a shared computer cluster.Graphical abstract.

  1. Adolescent Victims of Commercial Sexual Exploitation versus Sexually Abused Adolescents.

    Science.gov (United States)

    Shaw, Jon A; Lewis, John E; Chitiva, Harvey A; Pangilinan, Andrew R

    2017-09-01

    We have discovered in our clinical review that sexually abused girls have significantly better therapeutic outcomes than girls who have been victims of sex trafficking. Thus, we compared the mental health records of 25 adolescent female victims of commercial sexual exploitation with a group of 25 girls with a history of sexual abuse matched for age. Exclusion criteria included IQ sexual exploitation were more likely to be in foster care; to have arrests, suspensions from school, and a history of running away; to abuse drugs; to be more impaired in social and school activities; to be withdrawn and depressed; to manifest social and thought problems and aggressive and rule-breaking behaviors; and to have a diagnosis of mood or conduct disorder or both. The results of this study suggest that the psychopathology of girl victims of sexual exploitation is markedly different from that of sexually abused girls. © 2017 American Academy of Psychiatry and the Law.

  2. The exploitation of swamp plants for dewatering liquid sewage sludge

    Directory of Open Access Journals (Sweden)

    Jiří Šálek

    2006-01-01

    Full Text Available The operators of little rural wastewater treatment plants have been interested in economic exploitation of sewage sludge in local conditions. The chance is searching simply and natural ways of processing and exploitation stabilized sewage sludge in agriculture. Manure substrate have been obtained by composting waterless sewage sludge including rest plant biomass after closing 6–8 years period of filling liquid sewage sludge to the basin. Main attention was focused on exploitation of swamp plants for dewatering liquid sewage sludge and determination of influence sewage sludge on plants, intensity and course of evapotranspiration and design and setting of drying beds. On the base of determined ability of swamp plants evapotranspiration were edited suggestion solutions of design and operation sludge bed facilities in the conditions of small rural wastewater treatment plant.

  3. Sexual exploitation and labor during adolescence: A case study

    Directory of Open Access Journals (Sweden)

    Luciana Dutra-Thomé

    2011-09-01

    Full Text Available The present article focused on the perception of sexual exploitation as a job, using a single case study design. The aim of the study was to investigate the case of a 14 year-old girl, involved in commercial sexual exploitation, who considered this situation as her labor activity. A content analysis showed protective and risk factors as categories, especially related to her labor activities. The girl perceived the sexual exploitation activity as a job that provided autonomy, subsistence, and survival. The study revealed that the negative effects of working during adolescence may bring consequences to health and development. Youth work may be defined as a risk factor, especially when the labour conditions are not adequate and protected.

  4. Cultural Work as a Site of Struggle: Freelancers and Exploitation

    Directory of Open Access Journals (Sweden)

    Nicole S. Cohen

    2012-05-01

    Full Text Available This paper argues that Marxist political economy is a useful framework for understanding contemporary conditions of cultural work. Drawing on Karl Marx’s foundational concepts, labour process theory, and a case study of freelance writers, I argue that the debate over autonomy and control in cultural work ignores exploitation in labour-capital relationships, which is a crucial process shaping cultural work. To demonstrate the benefits of this approach, I discuss two methods media firms use to extract surplus value from freelance writers: exploitation of unpaid labour time and exploitation of intellectual property through aggressive copyright regimes. I argue that a Marxist perspective can uncover the dynamics that are transforming cultural industries and workers’ experiences. From this perspective, cultural work is understood as a site of struggle.

  5. Technical dialogue on High-level and Intermediate-level wastes. Risks during exploitation: co-activity

    International Nuclear Information System (INIS)

    Sene, Monique; Lheureux, Yves; Demet, Michel; Jaquet, Benoit; Gueritte, Michel; Rollinger, Francois; Le Bars, Igor; Bauduin, Eloi; Flachet, Margot; Besnus, Francois; Espivent, Camille; Tichauer, Michael; Serres, Christophe; Rocher, Muriel; Michel, Maurice; Perroud, Geraldine; Sauvage, Marite; Stupien, Maurice; Delamare, Thierry; Klajman, Irene; Castel, Cecile; Makhijani, Arjun; Pellegrini, Delphine; Dessaint, Anthony; Proust, Christophe; Gratton, Laura; Vinot, Thierry; Michel, Maurice; Demet, Michel

    2015-04-01

    This publication contains contributions and the content of debates on these contributions. After introduction speeches, a contribution on safety challenges during exploitation, and an overview of questions asked about these risks by the Citizen Conference, the following issues have been addressed: the accident of the American Isolation Pilot Plant with a fire and a radioactive release in 2014 (facts and analysis, other points of view, debate), fire risks in Cigeo as a major challenge which combines constraints related to mining activities and to the exploitation of a nuclear installation (IRSN point of view, debate), risks related to transportation, risks related to parallel surface and underground activities such as storage filling, digging, road traffic and so on (points of view of SNCF and ANDRA, debate), risk of radioactivity dispersion within Cigeo (problem description, IRSN point of view, debate), and exploitation risks within Cigeo (risks of explosion due to heat and hydrogen releases, IRSN point of view, debate)

  6. Trajectories and cycles of sexual exploitation and trafficking for sexual exploitation of women in the Peruvian Amazon

    Directory of Open Access Journals (Sweden)

    Jaris Mujica

    2015-01-01

    Full Text Available The commercial sexual exploitation is a constant activity in the Peruvian Amazon. Around the river port of Pucallpa in ucayali region, the practice appears systematically: teenage attend taverns around the port, and those dedicated to the work of cooking camps logging, are victims of constant exploitation and many also of trafficking. this article aims to reconstruct the path of life and reproductive cycle of the forms of exploitation in a sample of 20 women, and focuses on: (i evidence of seasonal forms of exploitation; (ii the path of life of these women showing steps in a chain holding several stages and in different work areas; (iii in this context, sexual exploitation and trafficking are not permanent phenomena, are concentrated in one point in the path and stopped to motherhood, between 19 and 25 years; (iv with motherhood and matrilocal settlement, daughters and sons repeat the cycle and reproduce the chain.

  7. On species preservation and Non-Cooperative Exploiters

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Lindroos, Marko

    Game-theoretic fisheries models typically consider cases where some players harvest a single common fish stock. It is, however, the case that these types of models do not capture many real world mixed fisheries, where species are biological independent or dependent. The present paper considers...... cases where several non-cooperative exploiters are involved in mixed fisheries. This paper is targeting biodiversity preservation by setting up a two species model with the aim of ensuring both species survive harvesting of exploiters adapting a non-cooperative behaviour. The model starts out as a multi...

  8. Exploiting Thread Parallelism for Ocean Modeling on Cray XC Supercomputers

    Energy Technology Data Exchange (ETDEWEB)

    Sarje, Abhinav [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jacobsen, Douglas W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Williams, Samuel W. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ringler, Todd [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Oliker, Leonid [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-05-01

    The incorporation of increasing core counts in modern processors used to build state-of-the-art supercomputers is driving application development towards exploitation of thread parallelism, in addition to distributed memory parallelism, with the goal of delivering efficient high-performance codes. In this work we describe the exploitation of threading and our experiences with it with respect to a real-world ocean modeling application code, MPAS-Ocean. We present detailed performance analysis and comparisons of various approaches and configurations for threading on the Cray XC series supercomputers.

  9. Shale Gas Exploitation: Challenges for Development in Algeria

    Directory of Open Access Journals (Sweden)

    Boualem Ammar CHEBIRA

    2017-06-01

    Full Text Available This paper aims to assess the situation of Algeria in the field of shale gas to illustrate the various potential benefits and risks in the exploitation area. The constraints for Algeria are numerous : the risks due in its exploitation, particularly the pollution generated by hydraulic fracturing and also the increased risk of earthquake; the scarcity of water resources and the high cost of such investments. Currently, and under conditions of non-availability of clean and safe technologies, the most available choice for Algeria is the diversification of non-hydrocarbon exports and the development of renewable energies.

  10. Final Report, “Exploiting Global View for Resilience”

    Energy Technology Data Exchange (ETDEWEB)

    Chien, Andrew [Univ. of Chicago, IL (United States)

    2017-03-29

    Final technical report for the "Exploiting Global View for Resilience" project. The GVR project aims to create a new approach to portable, resilient applications. The GVR approach builds on a global view data model,, adding versioning (multi-version), user control of timing and rate (multi-stream), and flexible cross layer error signalling and recovery. With a versioned array as a portable abstraction, GVR enables application programmers to exploit deep scientific and application code insights to manage resilience (and its overhead) in a flexible, portable fashion.

  11. Subversion of innate immunity by periodontopathic bacteria via exploitation of complement receptor-3.

    Science.gov (United States)

    Hajishengallis, George; Wang, Min; Liang, Shuang; Shakhatreh, Muhamad-Ali K; James, Deanna; Nishiyama, So-ichiro; Yoshimura, Fuminobu; Demuth, Donald R

    2008-01-01

    The capacity of certain pathogens to exploit innate immune receptors enables them to undermine immune clearance and persist in their host, often causing disease. Here we review subversive interactions of Porphyromonas gingivalis, a major periodontal pathogen, with the complement receptor-3 (CR3; CD11b/CD18) in monocytes/macrophages. Through its cell surface fimbriae, P. gingivalis stimulates Toll-like receptor-2 (TLR2) inside-out signaling which induces the high-affinity conformation of CR3. Although this activates CR3-dependent monocyte adhesion and transendothelial migration, P. gingivalis has co-opted this TLR2 proadhesive pathway for CR3 binding and intracellular entry. In CR3-deficient macrophages, the internalization of P. gingivalis is reduced twofold but its ability to survive intracellularly is reduced 1,000-fold, indicating that CR3 is exploited by the pathogen as a relatively safe portal of entry. The interaction of P. gingivalis fimbriae with CR3 additionally inhibits production of bioactive (p70) interleukin-12, which mediates immune clearance. In vivo blockade of CR3 leads to reduced persistence of P. gingivalis in the mouse host and diminished ability to cause periodontal bone loss, the hallmark of periodontal disease. Strikingly, the ability of P. gingivalis to interact with and exploit CR3 depends upon quantitatively minor components (FimCDE) of its fimbrial structure, which predominantly consists of polymerized fimbrillin (FimA). Indeed, isogenic mutants lacking FimCDE but expressing FimA are dramatically less persistent and virulent than the wildtype organism both in vitro and in vivo. This model of immune evasion through CR3 exploitation by P. gingivalis supports the concept that pathogens evolved to manipulate innate immune function for promoting their adaptive fitness.

  12. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    Science.gov (United States)

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels. PMID:26726289

  13. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls.

    Science.gov (United States)

    Gerassi, Lara

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels.

  14. Exploiting the oxidizing capabilities of laccases exploiting the oxidizing capabilities of laccases for sustainable chemistry

    Energy Technology Data Exchange (ETDEWEB)

    Cannatelli, Mark D. [Georgia Inst. of Technology, Atlanta, GA (United States)

    2017-05-01

    Part one of this dissertation research has focused on harnessing the ability of laccases to generate reactive para-quinones in situ from the corresponding hydroquinones, followed by reaction with a variety of nucleophiles to perform novel carbon-carbon, carbon-nitrogen, and carbon-sulfur bond forming reactions for the synthesis of new and existing compounds. In part two of this dissertation, the fundamental laccase-catalyzed coupling chemistry developed in part one was applied to functionalize the surface of kraft lignin.

  15. Sexual exploitation and abuse by UN peacekeepers: the ...

    African Journals Online (AJOL)

    United Nations peacekeepers have been subject to allegations of serious sexual misconduct for many years. Such incidents of sexual assault perpetrated by peacekeepers have been documented over the years in a number of countries. The violation of codes of conduct, particularly regarding sexual exploitation and abuse, ...

  16. Traditional exploitation of edible freshwater oyster Etheria elliptica ...

    African Journals Online (AJOL)

    ... they also targeted each year the same sites regardless rotation planning. Finally, oyster`s shell, a main substrate for larval settlement and bed restoration, were left on riverbanks after exploitation, reducing stocks reconstitution potential. Appropriate measures were suggested to Reserve staff for sustainable management.

  17. Assisting children born of sexual exploitation and abuse

    Directory of Open Access Journals (Sweden)

    Lauren Rumble

    2007-01-01

    Full Text Available The UN Secretary-General has issued a strategy tosupport victims of sexual exploitation and abuse by UNstaff. It includes a controversial proposal to introduceDNA sampling for all UN staff. Unless this suggestionis adopted, an important opportunity to implementa truly survivor-centred approach may be lost.

  18. Prey choice and habitat use of people exploiting intertidal resources

    NARCIS (Netherlands)

    Boer, de W.F.; Blijdenstein, A.F.; Longamane, F.

    2002-01-01

    The impact of human exploitation depends mostly on the size of the catch and the species targeted. The value of a species is an important explanatory variable in understanding human impact. Co-management of resources should take into account these different resource values, when evaluating

  19. Exploitation Rates and Management Implications for the Fisheries of ...

    African Journals Online (AJOL)

    The exploitation rates of eight major component fishery species, Auchenoglanis occidentalis, Brycinus nurse, Clarias gariepinus, Hemichromis fasciatus, Marcusenius senegalensis, Oreochromis niloticus, Sarotherodon galilaeus and Tilapia zillii, of gill net fishery of Bontanga reservoir, were studied from March 2004 to ...

  20. Exploiting network redundancy for low-cost neural network realizations.

    NARCIS (Netherlands)

    Keegstra, H; Jansen, WJ; Nijhuis, JAG; Spaanenburg, L; Stevens, H; Udding, JT

    1996-01-01

    A method is presented to optimize a trained neural network for physical realization styles. Target architectures are embedded microcontrollers or standard cell based ASIC designs. The approach exploits the redundancy in the network, required for successful training, to replace the synaptic weighting

  1. Desiring TESOL and International Education: Market Abuse and Exploitation

    Science.gov (United States)

    Chowdhury, Raqib; Ha, Phan Le

    2014-01-01

    This book addresses how Western universities have constructed themselves as global providers of education, and are driven to be globally competitive. It examines how the term "international" has been exploited by the market in the form of government educational policies and agencies, host institutions, academia and the mass media. The…

  2. Spatial dynamics of fuel wood exploitation in Delta State, Nigeria ...

    African Journals Online (AJOL)

    This study examined the spatial and temporal changes in fuel wood exploitation as a result of environmental degradation, between 2008 and 2013 in Delta State, Nigeria. It utilised data from both primary and secondary sources. Primary data were obtained from a survey of selected settlements using a questionnaire.

  3. Bats track and exploit changes in insect pest populations

    Science.gov (United States)

    The role of bats or any generalist predator in suppressing prey populations depends on the predator’s ability to exploit available prey in space and time. Using a qPCR faecal DNA assay, we document significant association between numbers of Brazilian free-tailed bats (Tadarida brasiliensis) consumin...

  4. Commercial Sexual Exploitation of Children and the School Nurse

    Science.gov (United States)

    Grace, Lisa Goldblatt; Starck, Maureen; Potenza, Jane; Kenney, Patricia A.; Sheetz, Anne H.

    2012-01-01

    As trusted health professionals in the school setting, school nurses are well positioned to identify students who may be victims of commercial sexual exploitation of children (CSEC). However, until recently this issue has been clouded by lack of awareness, stigma, and/or denial. Since nationally the average age of entry for girls into the…

  5. A multidisciplinary response to commercial sexual exploitation of children.

    Science.gov (United States)

    Avila, Pamela T

    2016-11-19

    Commercial sexual exploitation of children (CSEC) is associated with child abuse, neglect, poverty, homelessness, and societal causes. Sex trafficking is the participation in commercial sex acts in which force, fraud, or coercion occur. This article discusses the scope of CSEC and sex trafficking, and the necessary identification skills and medical evaluations needed to help these patients.

  6. The Sexual Exploitation of Missing Children: A Research Review.

    Science.gov (United States)

    Hotaling, Gerald T.; Finkelhor, David

    This paper evaluates current knowledge about the prevalence, dynamics, and short- and long-term effects of sexual exploitation among missing children. It is based upon empirical research findings from books, papers presented at professional meetings, doctoral dissertations, works in progress, and more than 75 articles in professional journals.…

  7. Sexual Abuse, Incest, and Sexual Exploitation: Mental Health Practitioners' Perspective.

    Science.gov (United States)

    Freet, Mary A.; Scalise, Joseph J.; Ginter, Earl J.

    1996-01-01

    Reports on a 33-item questionnaire based on Alexander G. Zaphiris's conceptualization of the terminology of sexual mistreatment. Results indicate that mental health counselors (N=300) who encountered sexual abuse, incest, and sexual exploitation agreed with Zaphiris's conceptualization but did not use this system of classification in actual…

  8. Sexual Exploitation: What Parents of Handicapped Persons Should Know.

    Science.gov (United States)

    Washington State Dept. of Social and Health Services, Olympia.

    Directed toward parents of handicapped children, this brochure defines five major categories of sexual exploitation under Washington State laws: rape, attempted rape, incest, indecent liberties, and statutory rape. Changes in child behavior that may signal victimization are discussed, as well as immediate and long-term action that parents can…

  9. Sexual Abuse and Exploitation of People with Disabilities. Final Report.

    Science.gov (United States)

    Sobsey, Dick; Varnhagen, Connie

    The literature is reviewed on sexual abuse, assault, and exploitation of people with disabilities; and new data from two pilot studies are introduced. The pilot studies consisted of two surveys: (1) a survey of 19 Canadian community service agencies dealing with sexual abuse, focusing on types of services provided and self-evaluation of services…

  10. Exploitation of Bush Mango ( Irvingia wombolu and Irvingia ...

    African Journals Online (AJOL)

    The study was undertaken to assess the exploitation of Bush Mango Irvingia gabonensis and Irvingia wombolu (ogbono) among rural households in Enugu State, Nigeria. Interview schedule was used to collect data from 91 respondents and data were analyzed by use of descriptive statistics and factor analysis. The mean ...

  11. Indicators of Nuclear safety and exploitation in ANAV

    International Nuclear Information System (INIS)

    Quintana Prieto, M.; Jorda Alcove, M.

    2013-01-01

    The use of indicators by ANAV plants, aims to be a tool to facilitate the assessment of the behaviour of the plants nuclear over a specific time period. The following are and are they explain those related to Nuclear safety and exploitation.

  12. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    this shared pool of computing resources. Most affairs of ... logical and information layers including the users represent a .... These programs and data are prone to vulnerabilities that are exploitable. A search for vulnerabilities based on software flaws between January 2010 and October 2016 as contained in the National ...

  13. Exploiting Sun's Energy Effectively as a Source of Renewable Energy

    Indian Academy of Sciences (India)

    Deepa Khushalani is currently an Associate. Professor at TIFR, Mumbai. Her area of specialization involves materials chemistry with emphasis on exploiting alternate sources of clean energy involving photovoltaics and energy storage devices. Her group also works on drug delivery devices, photocatalysis, and.

  14. Exploiting Network Topology Information to Mitigate Ambiguities in VMP Localization

    DEFF Research Database (Denmark)

    Pedersen, Claus; Pedersen, Troels; Fleury, Bernard Henri

    2011-01-01

    We investigate an extension to the probabilistic model of a wireless sensor network (WSN) in the variational message passing localization algorithm. This extension exploits network topology information to mitigate ambiguities in WSN localization schemes. In a simulation case study we show that th...

  15. Fishery benefits from exploiting spawning aggregations not solely ...

    African Journals Online (AJOL)

    The vulnerability of spawning aggregations to exploitation varies among fisheries as a result of differences in the population-density changes associated with this behaviour. However, vulnerability to fishing is also influenced by technology, environmental factors, and fish and fisher behaviours. Focusing on a fishery for the ...

  16. Human trafficking and exploitation: A global health concern.

    Directory of Open Access Journals (Sweden)

    Cathy Zimmerman

    2017-11-01

    Full Text Available In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  17. Environmental impact assessment of bitumen exploitation on animal ...

    African Journals Online (AJOL)

    This study was carried out to assess the environmental impact of Bitumen exploitation on wildlife resources in Ode-Irele forest area of Ondo-State, Nigeria. The result of the study showed that there are 9 orders and 40 species of mammals in the study area. Primates recorded the highest specie number (13,) and rodentia as ...

  18. Exploiting Patient Labour at Kew Cottages, Australia, 1887-1950

    Science.gov (United States)

    Monk, Lee-Ann

    2010-01-01

    This article examines the exploitation of patient labour at Kew Cottages, Australia's first purpose-built state institution for people with learning disabilities. Analysing historical evidence for the period 1887-1950 shows that unpaid patient labour contributed significantly to the economy of the Cottages and so to the government department of…

  19. Human trafficking for labour exploitation: Interpreting the crime

    NARCIS (Netherlands)

    Coster van Voorhout, J.E.B.

    2007-01-01

    The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation

  20. Software defined radio receivers exploiting noise cancelling: A tutorial review

    NARCIS (Netherlands)

    Klumperink, Eric A.M.; Nauta, Bram

    2014-01-01

    Traditional radio receivers were narrowband and dedicated to a single frequency band exploiting LC tanks, whereas software defined radios target a flexibly programmable frequency. The broadband noise cancelling circuit technique has proven useful to achieve this target, as it breaks the traditional

  1. Exploiting serological data to understand the epidemiology of foot ...

    African Journals Online (AJOL)

    Exploiting serological data to understand the epidemiology of foot-and-mouth disease virus serotypes circulating in Libya. Ibrahim Eldaghayes, Abdunaser Dayhum, Abdulwahab Kammon, Monier Sharif, Giancarlo Ferrari, Christianus Bartels, Keith Sumption, Donald P. King, Santina Grazioli, Emiliana Brocchi ...

  2. Wideband Low Noise Amplifiers Exploiting Thermal Noise Cancellation

    NARCIS (Netherlands)

    Bruccoleri, F.; Klumperink, Eric A.M.; Nauta, Bram

    2005-01-01

    Low Noise Amplifiers (LNAs) are commonly used to amplify signals that are too weak for direct processing for example in radio or cable receivers. Traditionally, low noise amplifiers are implemented via tuned amplifiers, exploiting inductors and capacitors in resonating LC-circuits. This can render

  3. Rural Fuelwood Exploitation in Mbo Local Government Area – A ...

    African Journals Online (AJOL)

    Rural Fuelwood Exploitation in Mbo Local Government Area – A Nigerian Coastal Settlement. ... Ethiopian Journal of Environmental Studies and Management ... Result show that 90% of the total local energy requirement is from fuelwood, the average per capita production rate of fuelwood in the local area is 0.38m3 and the ...

  4. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation

    Science.gov (United States)

    Yoshioka, Katsunari; Inoue, Daisuke; Eto, Masashi; Hoshizawa, Yuji; Nogawa, Hiroki; Nakao, Koji

    Exploiting vulnerabilities of remote systems is one of the fundamental behaviors of malware that determines their potential hazards. Understanding what kind of propagation tactics each malware uses is essential in incident response because such information directly links with countermeasures such as writing a signature for IDS. Although recently malware sandbox analysis has been studied intensively, little work is done on securely observing the vulnerability exploitation by malware. In this paper, we propose a novel sandbox analysis method for securely observing malware's vulnerability exploitation in a totally isolated environment. In our sandbox, we prepare two victim hosts. We first execute the sample malware on one of these hosts and then let it attack the other host which is running multiple vulnerable services. As a simple realization of the proposed method, we have implemented a sandbox using Nepenthes, a low-interaction honeypot, as the second victim. Because Nepenthes can emulate a variety of vulnerable services, we can efficiently observe the propagation of sample malware. In the experiments, among 382 samples whose scan capabilities are confirmed, 381 samples successfully started exploiting vulnerabilities of the second victim. This indicates the certain level of feasibility of the proposed method.

  5. Grooming Cybervictims: The Psychosocial Effects of Online Exploitation for Youth.

    Science.gov (United States)

    Berson, Ilene R.

    2003-01-01

    Presents an overview of the benefits and risks of Web-based interactions for youth. Discusses, as an illustrative example, the psychosocial effects of online "grooming" practices that are designed to lure and exploit children by enticing them, typically in a nonsexual way, toward a sexual encounter. Suggests constructive solutions and a…

  6. Key points in biotechnological patents to be exploited.

    Science.gov (United States)

    García, Alfredo Mateos; López-Moya, José Rafael; Ramos, Patricia

    2013-08-01

    Patents in some biotechnological fields are controversial. Despite this fact, the number of patent applications increases every year. Total revenues in the global biotechnology market are expected to increase in the middle term. Nowadays, the bioeconomy is an important socio-economic area, which is reflected in the number of firms dedicated to or using biotechnology. The exploitation of biotechnological patents is an essential task in the management of intellectual capital. This paper explains the multiplicity of factors that influence the exploitation of biotechnological patents; specifically, the internal and external key points of patents exploitation. The external determining factors for patents are: (i) the market need for biotechnological products and services, (ii) the importance of the freedom to operate analysis before entering the market, and (iii) efficiency in prosecution by Patent Offices. This paper primarily focuses on the internal determining factors, more particularly, the characteristics that the patent's owner must take into consideration in order to have a strong, broad subject-matter in the granted patent. The experimentation needed to obtain an adequate scope of the subject- matter in the claims is a critical issue in the exploitation of a patent or patent application.

  7. Open pit coal exploitation viability. Margarita mine. Case of study

    International Nuclear Information System (INIS)

    Veloza, Julia; Molina, Jorge; Mejia, Humberto

    2006-01-01

    This paper provides an analysis of financial viability, planning and design for the new coal open pit exploitation for La Margarita mine, with coal-resources estimated on 440.139,7 ton. Dimension, design and economic evaluation were possible by three exploitation methods: (multiple bench, open cast contour, and terraces). Net present values (NVP) were calculated: $c 817,5; $c 518,5 and $c 645,2 respectively for each method (given in million current Colombian pesos $. $c 2380 are equivalent to $us 1) and rate of return (ROR) 78,33%; 34,0% and 38,62% respectively for each method. These indicators served as a parameter to choose the multiple bench method, which should be recalculated because it was necessary to work jointly with two pits and making feasible the project. in addition a general environmental evaluation was done, which is vital for the exploitation. Important impacts on the flower, animals, air, water were found, and measures of control, prevention and mitigation were stated. it is expected that this paper can be useful as a technical-economical support for the development of the open pit exploitation in the margarita mine

  8. Electrochemical Metal Ion Sensors. Exploiting Amino Acids and Peptides as Recognition Elements

    Directory of Open Access Journals (Sweden)

    Wenrong Yang

    2001-08-01

    Full Text Available Amino acids and peptides are known to bind metal ions, in some cases very strongly. There are only a few examples of exploiting this binding in sensors. The review covers the current literature on the interaction of peptides and metals and the electrochemistry of bound metal ions. Peptides may be covalently attached to surfaces. Of particular interest is the attachment to gold via sulfur linkages. Sulfur-containing peptides (eg cysteine may be adsorbed directly, while any amino group can be covalently attached to a carboxylic acid-terminated thiol. Once at a surface, the possibility for using the attached peptide as a sensor for metal ions becomes realised. Results from the authors’ laboratory and elsewhere have shown the potential for selective monitoring of metal ions at ppt levels. Examples of the use of poly-aspartic acid and the copper binding peptide Gly-Gly-His for detecting copper ions are given.

  9. A flow-based methodology for the calculation of TSO to TSO compensations for cross-border flows

    International Nuclear Information System (INIS)

    Glavitsch, H.; Andersson, G.; Lekane, Th.; Marien, A.; Mees, E.; Naef, U.

    2004-01-01

    In the context of the development of the European internal electricity market, several methods for the tarification of cross-border flows have been proposed. This paper presents a flow-based method for the calculation of TSO to TSO compensations for cross-border flows. The basic principle of this approach is the allocation of the costs of cross-border flows to the TSOs who are responsible for these flows. This method is cost reflective, non-transaction based and compatible with domestic tariffs. It can be applied when limited data are available. Each internal transmission network is then modelled as an aggregated node, called 'supernode', and the European network is synthesized by a graph of supernodes and arcs, each arc representing all cross-border lines between two adjacent countries. When detailed data are available, the proposed methodology is also applicable to all the nodes and lines of the transmission network. Costs associated with flows transiting through supernodes or network elements are forwarded through the network in a way reflecting how the flows make use of the network. The costs can be charged either towards loads and exports or towards generations and imports. Combination of the two charging directions can also be considered. (author)

  10. Target Localization with a Single Antenna via Directional Multipath Exploitation

    Directory of Open Access Journals (Sweden)

    Ali H. Muqaibel

    2015-01-01

    Full Text Available Target localization in urban sensing can benefit from angle dependency of the pulse shape at a radar receiver antenna. We propose a localization approach that utilizes the embedded directivity in ultra-wideband (UWB antennas to estimate target positions. A single radar unit sensing operation of indoor targets surrounded by interior walls is considered, where interior wall multipaths are exploited to provide target cross-range. This exploitation assumes resolvability of the multipath components, which is made possible by the virtue of using UWB radar signals. The proposed approach is most attractive when only few multipaths are detectable due to propagation obstructions or owing to low signal-to-noise ratios. Both simulated and experimental data are used to demonstrate the effectiveness of the proposed approach.

  11. Online child sexual exploitation: prevalence, process, and offender characteristics.

    Science.gov (United States)

    Kloess, Juliane A; Beech, Anthony R; Harkins, Leigh

    2014-04-01

    This review provides an overview of current knowledge and understanding of the process of sexual grooming and exploitation of children via the Internet. Specifically, the prevalence of online sexual grooming and exploitation is explored as well as associated challenges relating to the identification of its occurrence. This is complemented by a detailed outline and discussion of the process, both online and in the physical world, and legal responses to this phenomenon. A number of factors are examined to provide an explanation of the facilitating and contributing role they may play in offense processes online. Finally, current typologies are discussed in relation to characteristics of Internet offenders in general and "groomers"/chat room offenders specifically. This review concludes by offering suggestions for future research.

  12. Analysis Of Damage Arising From Exploitation Of The Aircraft

    Directory of Open Access Journals (Sweden)

    Woźny Piotr

    2014-12-01

    Full Text Available During exploitation, due to a variety of reasons, aircrafts are damaged or suffer from different failures. In the process of operation, using appropriate methods of diagnosis, failure, damage, and relative deregulation of individual elements or units can be detected. For this purpose, one can apply a number of indirect diagnostic methods with the use of recorded diagnostic signals or a direct diagnosis with the use of non-destructive methods. The proper identification of the technical condition allows to determine the causes of irregularities and take actions aimed at preventing their occurrence. The article presents the types of exploitation damage of a multi-purpose aircraft. In addition, the criteria for the division of damage and research methods of the causes of damage are presented. Furthermore, an analysis of the scope of activities to be performed during the research of causes of damage to the aircraft is made.

  13. Exploitation of the Virtual Worlds in Tourism and Tourism Education

    Directory of Open Access Journals (Sweden)

    Zejda Pavel

    2016-12-01

    Full Text Available Academics perceive a great potential of virtual worlds in various areas, including tourism and education. Efforts adapting the virtual worlds in practice are, however, still marginal. There is no clear definition of the virtual world. Therefore the author of this article attempts to provide one. The paper also focuses on the barriers of a wider exploitation of the virtual worlds and discusses the principles that might help to increase their potential in tourism area. One of the principles – gamification – favours a wider adaptation of the virtual worlds in tourism. Applying gamification principles provides visitors with some unique experiences while serving as a powerful marketing tool for institutions. The benefits of implementing tourism education activities based on cooperative principles set in an immersive environment of the virtual worlds are depicted afterwards. Finally, this paper includes successful case studies, which show advantages and drawbacks of some approaches in exploiting the virtual worlds in tourism and tourism education.

  14. Exploiting Social Media Sensor Networks through Novel Data Fusion Techniques

    Energy Technology Data Exchange (ETDEWEB)

    Kouri, Tina [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Unprecedented amounts of data are continuously being generated by sensors (“hard” data) and by humans (“soft” data), and this data needs to be exploited to its full potential. The first step in exploiting this data is determine how the hard and soft data are related to each other. In this project we fuse hard and soft data, using the attributes of each (e.g., time and space), to gain more information about interesting events. Next, we attempt to use social networking textual data to predict the present (i.e., predict that an interesting event is occurring and details about the event) using data mining, machine learning, natural language processing, and text analysis techniques.

  15. Environmental Impacts of Sand Exploitation. Analysis of Sand Market

    Directory of Open Access Journals (Sweden)

    Marius Dan Gavriletea

    2017-06-01

    Full Text Available Sand is an indispensable natural resource for any society. Despite society’s increasing dependence on sand, there are major challenges that this industry needs to deal with: limited sand resources, illegal mining, and environmental impact of sand mining. The purpose of this paper is twofold: to present an overview of the sand market, highlighting the main trends and actors for production, export and import, and to review the main environmental impacts associated with sand exploitation process. Based on these findings, we recommend different measures to be followed to reduce negative impacts. Sand mining should be done in a way that limits environmental damage during exploitation and restores the land after mining operations are completed.

  16. Exploitation of Natural Resources and the Public Sector in Greenland

    DEFF Research Database (Denmark)

    Nielsen, Søren Bo

    This paper considers the role of the public sector in future exploitation of non-renewable resources, especially minerals, in Greenland. The focus is on fiscal sustainability, principles for public sector involvement and the form of government take from mining activities. At present, the public...... to GDP. Hence, fiscal policy is quite far from being sustainable. Apart from a need for reforms, these facts also constrain the possible role of the public sector in future resource exploitation. In any case, the government should preferably adhere to strict principles when developing the mineral sector...... in Greenland. Furthermore, serious attention should be given to how to secure an appropriate government take from mineral activities. The paper discusses several types of taxes as well as financing models....

  17. Transformation-aware Exploit Generation using a HI-CFG

    Science.gov (United States)

    2013-05-16

    buffer structure (the chain of buffers used between transformations) of a program, and use this structure to construct an exploit input by inverting one...make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or... inverting one transformation at a time. We propose a new program representation, a hybrid information- and control-flow graph (HI-CFG), and give

  18. Exploitation of Technology by Tshwane Residents for Tourism Development Purposes

    OpenAIRE

    P. P. S. Sifolo; M. J. Maimela M. P. Tladi

    2014-01-01

    This article investigates technology used by Tshwane residents intended for tourism purposes. The aim is to contribute information for planning and management concerning technology within the tourism sector in the city of Tshwane, South Africa. This study identified the types of tourist related technologies used by the Tshwane residents, be it for business purposes or personal use. The study connected the exploitation of technology for tourism purposes through unpacking the tourism sector as ...

  19. Women trafficking for sexual exploitation in Portugal: Life narratives.

    OpenAIRE

    Neves, Sofia

    2011-01-01

    This paper describes a qualitative research about women trafficking for sexual exploitation in Portugal. The life experiences of a group of Brazilian women were characterised through the use of a comprehensive methodology – life narratives. The evidences found in this study, analysed and interpreted discursively from a feminist critical perspective, show us an unmistakable and intricate articulation between gender issues and poverty and social exclusion. Those conditions seem to establish the...

  20. Exploiting Lexical Regularities in Designing Natural Language Systems.

    Science.gov (United States)

    1988-04-01

    ELEMENT. PROJECT. TASKN Artificial Inteligence Laboratory A1A4WR NTumet 0) 545 Technology Square Cambridge, MA 02139 Ln *t- CONTROLLING OFFICE NAME AND...RO-RI95 922 EXPLOITING LEXICAL REGULARITIES IN DESIGNING NATURAL 1/1 LANGUAGE SYSTENS(U) MASSACHUSETTS INST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE...oes.ary and ftdou.Ip hr Nl wow" L,2This paper presents the lexical component of the START Question Answering system developed at the MIT Artificial

  1. Organizational Ambidexterity : Balancing Exploitation and Exploration in Organizations

    OpenAIRE

    Yigit, Mert

    2013-01-01

    Purpose: This paper aims to investigate necessity of ambidexterity for organizations. The main interest of this thesis is to investigate why organizations should be ambidextrous and how organizations can reach ambidexterity under the pressure of limited resources and competitive market condition. Findings: This thesis explored relations and tensions between exploitation and exploration in organizational and individual aspects. Findings in the research show that communication skill of the subu...

  2. Environmental Impacts of Sand Exploitation. Analysis of Sand Market

    OpenAIRE

    Marius Dan Gavriletea

    2017-01-01

    Sand is an indispensable natural resource for any society. Despite society’s increasing dependence on sand, there are major challenges that this industry needs to deal with: limited sand resources, illegal mining, and environmental impact of sand mining. The purpose of this paper is twofold: to present an overview of the sand market, highlighting the main trends and actors for production, export and import, and to review the main environmental impacts associated with sand exploitation process...

  3. Exploitation des ressources naturelles et dynamique actuelle de l ...

    African Journals Online (AJOL)

    The ground loss is on average 1-2 cm thickness on the summit, 1-12 cm on the cliff, and 1-6 cm on the mid-slopes. The impact of the exploitation of the natural resources resulted in a regression of the natural plant formations at the expense of the anthropic plant formations. On the whole, from 1949 to 2003, this regression ...

  4. The ESA Scientific Exploitation of Operational Missions element

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Zehner, Claus; Mathieu, Pierre-Philippe; Bojkov, Bojan; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Goryl, Philippe; Pinnock, Simon

    2015-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS,ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan has been established and is approved every year by ESA Members States. The 2015 SEOM work plan is covering the organisation of three Science users consultation workshops for Sentinel1/3/5P , the launch of new R&D studies for scientific exploitation of the Sentinels, the development of open-source multi-mission scientific toolboxes, the organisation of advanced international training courses, summer schools and educational materials, as well as activities for promoting the scientific use of EO data. The first SEOM projects have been tendered since 2013 including the development of Sentinel toolboxes, advanced INSAR algorithms for Sentinel-1 TOPS data exploitation, Improved Atmospheric Spectroscopic data-base (IAS), as well as grouped studies for Sentinel-1, -2, and -3 land and ocean applications and studies for exploiting the synergy between the Sentinels. The status and first results from these SEOM projects will be presented and an outlook for upcoming SEOM studies will be given.

  5. Exploitation Agricole des Berges : Une Strategie D'Adaptation aux ...

    African Journals Online (AJOL)

    renforçant la capacité d'exploitation des paysans pour le labour en contre saison des terres inondables lourdes au Tchad. Cependant les incidences environnementales sont négatives et se résument en la réduction progressive des réserves foncières, la dégradation et la fragilisation des sols, leur érosion et leur lessivage ...

  6. Exploiting Temporal Secondary Access Opportunities in Radar Spectrum

    OpenAIRE

    Tercero, Miurel; Sung, Ki Won; Zander, Jens

    2013-01-01

    In this paper, we quantify the temporal opportunities for secondary access to radar spectrum. Secondary users are assumed to be WLANs which opportunistically share the radar frequency band under the constraint that the aggregate interference does not harm radar operation. Each WLAN device employs dynamic frequency selection (DFS) as a mechanism to protect the radar from the interference. We also consider an advanced interference protection mechanism, which is termed temporal DFS. It exploits ...

  7. Exploiting Innocuous Activity for Correlating Users Across Sites

    OpenAIRE

    Goga , Oana; Lei , Howard; Parthasarathi , Sree Hari Krishnan; Friedland , Gerald; Sommer , Robin; Teixeira , Renata

    2013-01-01

    International audience; We study how potential attackers can identify accounts on different social network sites that all belong to the same user, exploiting only innocuous activity that inherently comes with posted content. We examine three specific features on Yelp, Flickr, and Twitter: the geo-location attached to a user's posts, the timestamp of posts, and the user's writing style as captured by language models. We show that among these three features the location of posts is the most powe...

  8. Neanderthal exploitation of ibex and chamois in southwestern Europe.

    Science.gov (United States)

    Yravedra, José; Cobo-Sánchez, Lucía

    2015-01-01

    There is increasing evidence that Neanderthals had a diverse and flexible diet. They exploited a wide range of resources from large proboscideans to small animals like turtles, rabbits, and marine species. Here, we discuss the importance of ibex and chamois in Neanderthal hunting strategies. The exploitation of both animals has traditionally been regarded as typical of Homo sapiens hunting behavior but was not a feature of Neanderthal behavior, which was thought to have focused on other kinds of game like deer, horses or large bovids. Our analysis of an extensive sample of Middle Paleolithic sites with faunal remains in the Iberian Peninsula reveals that Iberian ibex and chamois were frequently present throughout this period. Statistical analyses allowed us to assess the conditions that might have favored the presence or absence of these animals in the sites, while the taphonomic analyses enabled us to address the issue of whether ibex and chamois were indeed hunted by Neanderthals in the Iberian Peninsula. Our results indicate a better representation of both species in rocky and mountainous areas. The taphonomy of some sites reveals that chamois and ibex were hunted by Neanderthals, who showed great adaptive capacities to a wide variety of environments, including mountainous habitats. In contrast, other sites with favorable ecological conditions for ibex and chamois where these animals were not exploited by Neanderthals, who chose to hunt other species like deer, horses or aurochs, suggest behavioral complexity and large versatility. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Assessing uncertainty and risk in exploited marine populations

    International Nuclear Information System (INIS)

    Fogarty, M.J.; Mayo, R.K.; O'Brien, L.; Serchuk, F.M.; Rosenberg, A.A.

    1996-01-01

    The assessment and management of exploited fish and invertebrate populations is subject to several types of uncertainty. This uncertainty translates into risk to the population in the development and implementation of fishery management advice. Here, we define risk as the probability that exploitation rates will exceed a threshold level where long term sustainability of the stock is threatened. We distinguish among several sources of error or uncertainty due to (a) stochasticity in demographic rates and processes, particularly in survival rates during the early fife stages; (b) measurement error resulting from sampling variation in the determination of population parameters or in model estimation; and (c) the lack of complete information on population and ecosystem dynamics. The first represents a form of aleatory uncertainty while the latter two factors represent forms of epistemic uncertainty. To illustrate these points, we evaluate the recent status of the Georges Bank cod stock in a risk assessment framework. Short term stochastic projections are made accounting for uncertainty in population size and for random variability in the number of young surviving to enter the fishery. We show that recent declines in this cod stock can be attributed to exploitation rates that have substantially exceeded sustainable levels

  10. Commercial sexual exploitation and sex trafficking of adolescents.

    Science.gov (United States)

    Chung, Richard J; English, Abigail

    2015-08-01

    This review describes the current state of commercial sexual exploitation and sex trafficking of adolescents in the United States and globally, the legal and health implications of this severe form of abuse, and the roles that pediatric and adolescent healthcare providers can play in addressing this issue. Although this form of exploitation and abuse is shrouded in secrecy, pediatric and adolescent healthcare providers are well positioned to respond when it arises. However, awareness and understanding of the issue are generally lacking among healthcare professionals, currently limiting their effectiveness in combating this problem. Although the empirical evidence base available to guide clinical care of victims of trafficking remains limited given the secretive nature of the abuse, important contributions to the multidisciplinary literature on this issue have been made in recent years, including the Institute of Medicine's landmark report in the United States. Commercial sexual exploitation and sex trafficking of adolescents represent a human rights tragedy that remains inadequately addressed. As preeminent advocates for the health and well-being of adolescents, pediatric and adolescent healthcare providers can play a crucial role in advancing efforts not only to intervene but also to prevent further victimization of vulnerable youth.

  11. Combating sexual exploitation at the macro and micro levels.

    Science.gov (United States)

    Perpinan, M S

    1998-01-01

    The Third World Movement against the Exploitation of Women (TW-MAE-W) is an international nongovernmental organization based in the Philippines which conducts advocacy upon global issues such as the root causes of exploitation and campaigns against sex tourism and military prostitution. TW-MAE-W began providing direct services at the local level in 1987, and now has 7 drop-in centers and 3 homes around the country, run by 35 female staff members. In addition, the Bethany Transition Home in Quezon City, Manila, houses 10-20 women, all who have outside employment. The girls and women who come to TW-MAE-W's facilities have all been exploited in some way. For example, they may be battered wives, women who have experienced incest, or girls who have been sold or tricked into prostitution. They arrive after either calling a telephone hotline on their own or being referred by social workers and nongovernmental organizations. Following an initial 3-month course of recuperation, center residents are helped to either continue their academic training, receive vocational training, or find a job. Basic health services are provided to the residents and drop-in center clients.

  12. Distinct Urban Mines: Exploiting secondary resources in unique anthropogenic spaces.

    Science.gov (United States)

    Ongondo, F O; Williams, I D; Whitlock, G

    2015-11-01

    Fear of scarcity of resources highlight the need to exploit secondary materials from urban mines in the anthroposphere. Analogous to primary mines rich in one type of material (e.g. copper, gold, etc.), some urban mines are unique/distinct. We introduce, illustrate and discuss the concept of Distinct Urban Mines (DUM). Using the example of a university DUM in the UK, analogous to a primary mine, we illustrate potential product/material yields in respect of size, concentration and spatial location of the mine. Product ownership and replacement cycles for 17 high-value electrical and electronic equipment (EEE) among students showed that 20 tonnes of valuable e-waste were in stockpile in this DUM and a further 87 tonnes would 'soon' be available for exploitation. We address the opportunities and challenges of exploiting DUMs and conclude that they are readily available reservoirs for resource recovery. Two original contributions arise from this work: (i) a novel approach to urban mining with a potential for maximising resource recovery within the anthroposphere is conceptualised; and (ii) previously unavailable data for high-value products for a typical university DUM are presented and analysed. Copyright © 2015 Elsevier Ltd. All rights reserved.

  13. Fishing elevates variability in the abundance of exploited species.

    Science.gov (United States)

    Hsieh, Chih-Hao; Reiss, Christian S; Hunter, John R; Beddington, John R; May, Robert M; Sugihara, George

    2006-10-19

    The separation of the effects of environmental variability from the impacts of fishing has been elusive, but is essential for sound fisheries management. We distinguish environmental effects from fishing effects by comparing the temporal variability of exploited versus unexploited fish stocks living in the same environments. Using the unique suite of 50-year-long larval fish surveys from the California Cooperative Oceanic Fisheries Investigations we analyse fishing as a treatment effect in a long-term ecological experiment. Here we present evidence from the marine environment that exploited species exhibit higher temporal variability in abundance than unexploited species. This remains true after accounting for life-history effects, abundance, ecological traits and phylogeny. The increased variability of exploited populations is probably caused by fishery-induced truncation of the age structure, which reduces the capacity of populations to buffer environmental events. Therefore, to avoid collapse, fisheries must be managed not only to sustain the total viable biomass but also to prevent the significant truncation of age structure. The double jeopardy of fishing to potentially deplete stock sizes and, more immediately, to amplify the peaks and valleys of population variability, calls for a precautionary management approach.

  14. Relativistic quantum metrology: exploiting relativity to improve quantum measurement technologies.

    Science.gov (United States)

    Ahmadi, Mehdi; Bruschi, David Edward; Sabín, Carlos; Adesso, Gerardo; Fuentes, Ivette

    2014-05-22

    We present a framework for relativistic quantum metrology that is useful for both Earth-based and space-based technologies. Quantum metrology has been so far successfully applied to design precision instruments such as clocks and sensors which outperform classical devices by exploiting quantum properties. There are advanced plans to implement these and other quantum technologies in space, for instance Space-QUEST and Space Optical Clock projects intend to implement quantum communications and quantum clocks at regimes where relativity starts to kick in. However, typical setups do not take into account the effects of relativity on quantum properties. To include and exploit these effects, we introduce techniques for the application of metrology to quantum field theory. Quantum field theory properly incorporates quantum theory and relativity, in particular, at regimes where space-based experiments take place. This framework allows for high precision estimation of parameters that appear in quantum field theory including proper times and accelerations. Indeed, the techniques can be applied to develop a novel generation of relativistic quantum technologies for gravimeters, clocks and sensors. As an example, we present a high precision device which in principle improves the state-of-the-art in quantum accelerometers by exploiting relativistic effects.

  15. Host species exploitation and discrimination by animal parasites.

    Science.gov (United States)

    Forbes, Mark R; Morrill, André; Schellinck, Jennifer

    2017-05-05

    Parasite species often show differential fitness on different host species. We developed an equation-based model to explore conditions favouring host species exploitation and discrimination. In our model, diploid infective stages randomly encountered hosts of two species; the parasite's relative fitness in exploiting each host species, and its ability to discriminate between them, was determined by the parasite's genotype at two independent diallelic loci. Relative host species frequency determined allele frequencies at the exploitation locus, whereas differential fitness and combined host density determined frequency of discrimination alleles. The model predicts instances where populations contain mixes of discriminatory and non-discriminatory infective stages. Also, non-discriminatory parasites should evolve when differential fitness is low to moderate and when combined host densities are low, but not so low as to cause parasite extinction. A corollary is that parasite discrimination (and host-specificity) increases with higher combined host densities. Instances in nature where parasites fail to discriminate when differential fitness is extreme could be explained by one host species evolving resistance, following from earlier selection for parasite non-discrimination. Similar results overall were obtained for haploid extensions of the model. Our model emulates multi-host associations and has implications for understanding broadening of host species ranges by parasites.This article is part of the themed issue 'Opening the black box: re-examining the ecology and evolution of parasite transmission'. © 2017 The Authors.

  16. Parasite immune evasion and exploitation: reflections and projections.

    Science.gov (United States)

    Damian, R T

    1997-01-01

    Recent developments in parasite immune evasion and exploitation are reviewed with special reference to the papers presented in this volume. Parasites, broadly defined, of animals with good immune responses have evolved many strategies that adapt them to survive and reproduce. These strategies may be passive, or may involve active intervention with host immune regulation, and can be categorized as immune evasion, immune exploitation and molecular piracy. The concept of immune evasion began with Paul Ehrlich's demonstration of antigenic variation in African trypanosomes and was reinforced by later ideas on molecular mimicry. Molecular mimicry is updated in the light of recent discoveries about degeneracy and plasticity of TCR/MHC-peptide recognition. Possible connections between two of its postulated consequences, evasion and autoimmunity, are discussed. Another putative consequence of molecular mimicry, host antigenic polymorphism, is also updated. The concept of exploitation of host immune responses by parasites has been reinforced by new data on its first known examples, especially the immune dependence of schistosome egg excretion. Newer examples include use of host cytokines as parasite growth factors, virokines, viroreceptors and helminth pseudocytokines. Finally, questions of host gene capture by viruses and possible horizontal gene transfer between host and parasite mediated by retroviruses are examined. The latter is compared with molecular conservation as a source of molecular mimicry and other aspects of host--parasite coevolution.

  17. Neural action fields for optic flow based navigation: a simulation study of the fly lobula plate network.

    Directory of Open Access Journals (Sweden)

    Alexander Borst

    Full Text Available Optic flow based navigation is a fundamental way of visual course control described in many different species including man. In the fly, an essential part of optic flow analysis is performed in the lobula plate, a retinotopic map of motion in the environment. There, the so-called lobula plate tangential cells possess large receptive fields with different preferred directions in different parts of the visual field. Previous studies demonstrated an extensive connectivity between different tangential cells, providing, in principle, the structural basis for their large and complex receptive fields. We present a network simulation of the tangential cells, comprising most of the neurons studied so far (22 on each hemisphere with all the known connectivity between them. On their dendrite, model neurons receive input from a retinotopic array of Reichardt-type motion detectors. Model neurons exhibit receptive fields much like their natural counterparts, demonstrating that the connectivity between the lobula plate tangential cells indeed can account for their complex receptive field structure. We describe the tuning of a model neuron to particular types of ego-motion (rotation as well as translation around/along a given body axis by its 'action field'. As we show for model neurons of the vertical system (VS-cells, each of them displays a different type of action field, i.e., responds maximally when the fly is rotating around a particular body axis. However, the tuning width of the rotational action fields is relatively broad, comparable to the one with dendritic input only. The additional intra-lobula-plate connectivity mainly reduces their translational action field amplitude, i.e., their sensitivity to translational movements along any body axis of the fly.

  18. FAST Conformational Searches by Balancing Exploration/Exploitation Trade-Offs.

    Science.gov (United States)

    Zimmerman, Maxwell I; Bowman, Gregory R

    2015-12-08

    Molecular dynamics simulations are a powerful means of understanding conformational changes. However, it is still difficult to simulate biologically relevant time scales without the use of specialized supercomputers. Here, we introduce a goal-oriented sampling method, called fluctuation amplification of specific traits (FAST), for extending the capabilities of commodity hardware. This algorithm rapidly searches conformational space for structures with desired properties by balancing trade-offs between focused searches around promising solutions (exploitation) and trying novel solutions (exploration). FAST was inspired by the hypothesis that many physical properties have an overall gradient in conformational space, akin to the energetic gradients that are known to guide proteins to their folded states. For example, we expect that transitioning from a conformation with a small solvent-accessible surface area to one with a large surface area will require passing through a series of conformations with steadily increasing surface areas. We demonstrate that such gradients are common through retrospective analysis of existing Markov state models (MSMs). Then we design the FAST algorithm to exploit these gradients to find structures with desired properties by (1) recognizing and amplifying structural fluctuations along gradients that optimize a selected physical property whenever possible, (2) overcoming barriers that interrupt these overall gradients, and (3) rerouting to discover alternative paths when faced with insurmountable barriers. To test FAST, we compare its performance to other methods for three common types of problems: (1) identifying unexpected binding pockets, (2) discovering the preferred paths between specific structures, and (3) folding proteins. Our conservative estimate is that FAST outperforms conventional simulations and an adaptive sampling algorithm by at least an order of magnitude. Furthermore, FAST yields both the proper thermodynamics and

  19. Prognosis of surface subsidence affected by underground exploitation of ore vein deposits of Rozna type

    Czech Academy of Sciences Publication Activity Database

    Hortvík, Karel; Staš, Lubomír

    2005-01-01

    Roč. 15, č. 1 (2005), s. 296-301 ISSN 1003-6326 R&D Projects: GA ČR GP105/02/P026 Institutional research plan: CEZ:AV0Z3086906 Keywords : mining * subsidence * prognosis Subject RIV: DH - Mining, incl. Coal Mining Impact factor: 0.302, year: 2005

  20. On the Control of Surface Waves in Integrated Antennas : Analysis and Design Exploiting Artificial Dielectric Layers

    NARCIS (Netherlands)

    Syed, W.H.

    2015-01-01

    Planar printed antenna technologies, due to their light weight, low profile, cost effectiveness and ease of connection with the active devices (e.g., amplifiers etc.), are becoming an attractive solution for the commercial data-hungry applications, such as 60 GHz high-data rate communication.

  1. Essentials of the construction and exploitation of hydraulic tunnels in karst of eastern Herzegovina

    Directory of Open Access Journals (Sweden)

    Golijanin Aleksandar R.

    2016-01-01

    Full Text Available The main problem in the process of construction, and it also proved in practice during exploitation of hydrotechnical tunnels constructed in the karst of eastern Herzegovina, are caverns. Of all the problems that may occur in the process of construction and during exploitation of hydrotechnical tunnels constructed in the Upper Cretaceous limestone rocks, only caverns have the characteristics (size, shape, type of backfill, water inflow which, in extreme cases, represent a problem that is difficult to solve. In such circumstances, the tunnel construction is subject to unpredictable and sometimes devastating impairments. Cavern is a term that represents a wider area within the karst sediments, which can be partially backfilled with debris, sometimes completely empty, connected with the ground surface by karst channels. Accumulation tunnels for power plants, i.e. the tunnels where the water flow is under pressure, are particularly susceptible to these impairments. This study introduces practical problems that have occurred in hydrotechnical tunnels constructed in the hydropower system of Trebišnjica.

  2. Exploration and exploitation of Victorian science in Darwin's reading notebooks.

    Science.gov (United States)

    Murdock, Jaimie; Allen, Colin; DeDeo, Simon

    2017-02-01

    Search in an environment with an uncertain distribution of resources involves a trade-off between exploitation of past discoveries and further exploration. This extends to information foraging, where a knowledge-seeker shifts between reading in depth and studying new domains. To study this decision-making process, we examine the reading choices made by one of the most celebrated scientists of the modern era: Charles Darwin. From the full-text of books listed in his chronologically-organized reading journals, we generate topic models to quantify his local (text-to-text) and global (text-to-past) reading decisions using Kullback-Liebler Divergence, a cognitively-validated, information-theoretic measure of relative surprise. Rather than a pattern of surprise-minimization, corresponding to a pure exploitation strategy, Darwin's behavior shifts from early exploitation to later exploration, seeking unusually high levels of cognitive surprise relative to previous eras. These shifts, detected by an unsupervised Bayesian model, correlate with major intellectual epochs of his career as identified both by qualitative scholarship and Darwin's own self-commentary. Our methods allow us to compare his consumption of texts with their publication order. We find Darwin's consumption more exploratory than the culture's production, suggesting that underneath gradual societal changes are the explorations of individual synthesis and discovery. Our quantitative methods advance the study of cognitive search through a framework for testing interactions between individual and collective behavior and between short- and long-term consumption choices. This novel application of topic modeling to characterize individual reading complements widespread studies of collective scientific behavior. Copyright © 2016 Elsevier B.V. All rights reserved.

  3. The strv 1 microsatellite semes: Exploiting the geosynchronous transfer orbit

    Science.gov (United States)

    Blott, R. J.; Wells, N. S.; Eves, J.

    Following 3 successful years in orbit, the UK Defence Evaluation and Research Agency's two Space Technology Research Vehicle microsatellites (STRV) 1 a&b will be followed by a second mission. STRV 1 c&d are now in construction for a planned launch in 1999. The new mission, which includes 22 experimental payloads and developmental spacecraft bus technologies from European, US and Canadian military, civil and commercial sponsors, exploits the Geosynchronous Transfer Orbit (GTO) to offer an affordable, working space research tool for both government and industry. The STRV 1 programme objective is to promote the enhancement of military and civil space communications, remote sensing and navigation capabilities at reduced cost and risk. Additional aims are to help industry to achieve commercial benefit from investment in emerging technologies and to develop the synergy between government, commercial and civilian space applications. The paper explains how STRV 1 exploits the variable altitude and high radiation environment of GTO to investigate the performance of emerging technologies and techniques. This includes the accelerated life testing of components and materials, such as infra-red detectors, advanced microprocessors and solar cell technologies, and the prototyping of new techniques to improve communications and spacecraft autonomy. Experiments include implementing a secure version of the Consultative Committee for Space Data Systems (CCSDS) packet telecommand and telemetry standards, further development of the Internet-based Space Communication Protocol Standards (SCPS) and evaluating the exploitation of the Global Positioning System (GPS) in geosynchronous orbit. The new mission also builds on and extends the comprehensive environmental monitoring achieved by STRV 1 a&b.

  4. Examples of Sentinel-2A Mission Exploitation Results

    Science.gov (United States)

    Koetz, Benjamin; Hoersch, Bianca; Gascon, Ferran; Desnos, Yves-Louis; Seifert, Frank Martin; Paganini, Marc; Ramoino, Fabrizio; Arino, Olivier

    2017-04-01

    The Sentinel-2 Copernicus mission will bring significant breakthrough in the exploitation of space borne optical data. Sentinel-2 time series will transform land cover, agriculture, forestry, in-land water and costal EO applications from mapping to monitoring, from snapshot to time series data analysis, from image-based to pixel-based processing. The 5-days temporal revisiting of the Sentinel-2 satellites, when both units will be operated together, will usher us in a new era for time series analysis at high spatial resolutions (HR) of 10-20 meters. The monitoring of seasonal variations and processes in phenology and hydrology are examples of the many R&D areas to be studied. The mission's large swath and systematic acquisitions will further support unprecedented coverage at the national scale addressing information requirements of national to regional policies. Within ESA programs, such as the Data User Element (DUE), Scientific Exploitation of Operational Missions (SEOM) and Climate Change Initiative (CCI), several R&D activities are preparing the exploitation of the Sentinel-2 mission towards reliable measurements and monitoring of e.g. Essential Climate Variables and indicators for the Sustainable Development Goals. Early Sentinel-2 results will be presented related to a range of applications and scientific domains such as agricultural monitoring at national scale (DUE Sen2Agri), wetland extent and condition over African Ramsar sites (DUE GlobWetland-Africa), land cover mapping for climate change (CCI Land Cover), national land monitoring (Cadaster-Env), forest degradation (DUE ForMoSa), urban mapping (DUE EO4Urban), in-land water quality (DUE SPONGE), map of Mediterranean aquaculture (DUE SMART) and coral reef habitat mapping (SEOM S2-4Sci Coral). The above-mentioned activities are only a few examples from the very active international land imaging community building on the long-term Landsat and Spot heritage and knowledge.

  5. Using choice architecture to exploit a university Distinct Urban Mine.

    Science.gov (United States)

    Pierron, Xavier; Williams, Ian D; Shaw, Peter J; Cleaver, Victoria

    2017-10-01

    There are widespread concerns regarding the potential future scarcity of ferrous and non-ferrous materials. However, there are already potentially rich reserves of secondary materials via high ownership of Electrical and Electronic Equipment (EEE) in economically-developed nations. Young people are particularly high consumers of EEE, thus university students and campuses may present an opportunity to harness this potential. University Distinct Urban Mines (DUM) may be used to exemplify how potential reserves of secondary metals may be exploited, and could contribute to the transition from a linear to a circular economy. This study aimed to evaluate small household appliances (SHA) DUM from a UK university, with the objectives to identify and quantify student households' SHA ownership, WEEE recycling, stockpiling and discarding habits amongst student households, assess and evaluate the monetary potential of SHA DUM at UK level, and propose methods to exploit DUM for universities in the UK. To this purpose, a quantitative survey was undertaken to measure students' ownership and discarding behaviour with respect to SHA. The amounts of ferrous and non-ferrous materials were then estimated and converted to monetary values from secondary materials market data to appraise the SHA DUM overall value. Thirty-five per cent of SHA are discarded in the general refuse. Broken personal care appliances (PCA) tend to be discarded due to hygiene and small size factors. When in working order, SHA tend to be equally reused, recycled or stockpiled. We conclude that a total of 189 tonnes of ferrous and non-ferrous materials were available via discarding or being stockpiled at the University of Southampton. Extrapolated to UK higher education level, discarded and stockpiled SHA represent a potential worth ∼USD 11 million. To initiate DUM exploitation within Higher Education campuses, we suggest improving users' choice architecture by providing collection methods specific to broken SHA

  6. Human collective intelligence under dual exploration-exploitation dilemmas.

    Directory of Open Access Journals (Sweden)

    Wataru Toyokawa

    Full Text Available The exploration-exploitation dilemma is a recurrent adaptive problem for humans as well as non-human animals. Given a fixed time/energy budget, every individual faces a fundamental trade-off between exploring for better resources and exploiting known resources to optimize overall performance under uncertainty. Colonies of eusocial insects are known to solve this dilemma successfully via evolved coordination mechanisms that function at the collective level. For humans and other non-eusocial species, however, this dilemma operates within individuals as well as between individuals, because group members may be motivated to take excessive advantage of others' exploratory findings through social learning. Thus, even though social learning can reduce collective exploration costs, the emergence of disproportionate "information scroungers" may severely undermine its potential benefits. We investigated experimentally whether social learning opportunities might improve the performance of human participants working on a "multi-armed bandit" problem in groups, where they could learn about each other's past choice behaviors. Results showed that, even though information scroungers emerged frequently in groups, social learning opportunities reduced total group exploration time while increasing harvesting from better options, and consequentially improved collective performance. Surprisingly, enriching social information by allowing participants to observe others' evaluations of chosen options (e.g., Amazon's 5-star rating system in addition to choice-frequency information had a detrimental impact on performance compared to the simpler situation with only the choice-frequency information. These results indicate that humans groups can handle the fundamental "dual exploration-exploitation dilemmas" successfully, and that social learning about simple choice-frequencies can help produce collective intelligence.

  7. Exploiting N=2 in consistent coset reductions of type IIA

    Energy Technology Data Exchange (ETDEWEB)

    Cassani, Davide [Laboratoire de Physique Theorique, Ecole Normale Superieure, 24 rue Lhomond, 75231 Paris Cedex 05 (France); Dipartimento di Fisica, Universita di Roma ' Tor Vergata' , Via della Ricerca Scientifica, 00133 Roma (Italy)], E-mail: cassani@lpt.ens.fr; Kashani-Poor, Amir-Kian [Institut des Hautes Etudes Scientifiques, Le Bois-Marie, 35, route de Chartres, 91440 Bures-sur-Yvette (France)], E-mail: kashani@ihes.fr

    2009-08-11

    We study compactifications of type IIA supergravity on cosets exhibiting SU(3) structure. We establish the consistency of the truncation based on left-invariance, providing a justification for the choice of expansion forms which yields gauged N=2 supergravity in four dimensions. We explore N=1 solutions of these theories, emphasizing the requirements of flux quantization, as well as their non-supersymmetric companions. In particular, we obtain a no-go result for de Sitter solutions at string tree level, and, exploiting the enhanced leverage of the N=2 setup, provide a preliminary analysis of the existence of de Sitter vacua at all string loop order.

  8. Features for Exploiting Black-Box Optimization Problem Structure

    DEFF Research Database (Denmark)

    Tierney, Kevin; Malitsky, Yuri; Abell, Tinus

    2013-01-01

    Black-box optimization (BBO) problems arise in numerous scientic and engineering applications and are characterized by compu- tationally intensive objective functions, which severely limit the number of evaluations that can be performed. We present a robust set of features that analyze the tness...... landscape of BBO problems and show how an algorithm portfolio approach can exploit these general, problem indepen- dent features and outperform the utilization of any single minimization search strategy. We test our methodology on data from the GECCO Workshop on BBO Benchmarking 2012, which contains 21...

  9. Construct exploit constraint in crash analysis by bypassing canary

    Science.gov (United States)

    Huang, Ning; Huang, Shuguang; Huang, Hui; Chang, Chao

    2017-08-01

    Selective symbolic execution is a common program testing technology. Developed on the basis of it, some crash analysis systems are often used to test the fragility of the program by constructing exploit constraints, such as CRAX. From the study of crash analysis based on symbolic execution, this paper find that this technology cannot bypass the canary stack protection mechanisms. This paper makes the improvement uses the API hook in Linux. Experimental results show that the use of API hook can effectively solve the problem that crash analysis cannot bypass the canary protection.

  10. Exploitation of natural resources and conflict in Colombia

    Directory of Open Access Journals (Sweden)

    Luis Eduardo Sandoval

    2017-11-01

    Full Text Available Colombia has increasingly been specializing in the extraction of mineral and energy resources such as gold, coal, oil and ferronickel. These activities, in the context of state weakness, have engendered conflicts of different dimensions. This paper proposes an indicator of conflict related to mineral exploitation that classifies five dimensions of conflict: social, economic, cultural, political and environmental. The aggregate indicator shows that murders, displacement of Afrodescendent populations, flooding, pollution, fires, infant mortality, coca crops and sexual offenses are highly and positively correlated with the number of conflicts.

  11. Transformation of national economy and the problem of exploiting

    Directory of Open Access Journals (Sweden)

    Vodzinský Vladimír

    1997-03-01

    Full Text Available The present course of transformation of our society has been influenced by the process of continuous clarifying the content and the methods of attaining the "ultimate goal". Some disunited views on the realization of the transformation process caused its ambiguous development, as documented by the absence of the state raw material and energy policy needed for designating today´s position of the Slovak mining. A typical example is the situation of enterprises exploiting Slovak brown coal. This paper deals with a possibility of solving this problem.

  12. Space Mapping Optimization of Microwave Circuits Exploiting Surrogate Models

    DEFF Research Database (Denmark)

    Bakr, M. H.; Bandler, J. W.; Madsen, Kaj

    2000-01-01

    A powerful new space-mapping (SM) optimization algorithm is presented in this paper. It draws upon recent developments in both surrogate model-based optimization and modeling of microwave devices, SM optimization is formulated as a general optimization problem of a surrogate model. This model...... is a convex combination of a mapped coarse model and a linearized fine model. It exploits, in a novel way, a linear frequency-sensitive mapping. During the optimization iterates, the coarse and fine models are simulated at different sets of frequencies. This approach is shown to be especially powerful...

  13. Synergy in spreading processes: from exploitative to explorative foraging strategies.

    Science.gov (United States)

    Pérez-Reche, Francisco J; Ludlam, Jonathan J; Taraskin, Sergei N; Gilligan, Christopher A

    2011-05-27

    An epidemiological model which incorporates synergistic effects that allow the infectivity and/or susceptibility of hosts to be dependent on the number of infected neighbors is proposed. Constructive synergy induces an exploitative behavior which results in a rapid invasion that infects a large number of hosts. Interfering synergy leads to a slower and sparser explorative foraging strategy that traverses larger distances by infecting fewer hosts. The model can be mapped to a dynamical bond percolation with spatial correlations that affect the mechanism of spread but do not influence the critical behavior of epidemics. © 2011 American Physical Society

  14. Exploration versus Exploitation in Global Atomistic Structure Optimization

    DEFF Research Database (Denmark)

    Jorgensen, Mathias S.; Larsen, Uffe F.; Jacobsen, Karsten Wedel

    2018-01-01

    The ability to navigate vast energy landscapes of molecules, clusters, and solids is a necessity for discovering novel compounds in computational chemistry and materials science. For high-dimensional systems, it is only computationally feasible to search a small portion of the landscape, and hence......, the search strategy is of critical importance. Introducing Bayesian optimization concepts in an evolutionary algorithm framework, we quantify the concepts of exploration and exploitation in global minimum searches. The method allows us to control the balance between probing unknown regions of the landscape...... reconstruction. In addition, global search behaviors are analyzed to provide reasonable grounds for an optimal balance for different problems....

  15. The ESA Scientific Exploitation of Operational Missions element, first results

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Mathieu, Pierre-Philippe; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Pinnock, Simon; Foumelis, Michael; Ramoino, Fabrizio

    2016-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS, ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan is established and is approved every year by ESA Members States. During 2015 SEOM, Science users consultation workshops have been organized for Sentinel1/3/5P ( Fringe, S3 Symposium and Atmospheric science respectively) , new R&D studies for scientific exploitation of the Sentinels have been launched ( S3 for Science SAR Altimetry and Ocean Color , S2 for Science,) , open-source multi-mission scientific toolboxes have been launched (in particular the SNAP/S1-2-3 Toolbox). In addition two advanced international training courses have been organized in Europe to exploit the new S1-A and S2-A data for Land and Ocean remote sensing (over 120 participants from 25 countries) as well as activities for promoting the first scientific results ( e.g. Chili Earthquake) . In addition the First EO Open Science 2.0 was organised at ESA in October 2015 with 225 participants from 31 countries bringing together young EO scientists and data scientists. During the conference precursor activities in EO Open Science and Innovation were presented, while developing a Roadmap preparing for future ESA scientific exploitation activities. Within the conference, the first

  16. Fluid Dynamic Modeling to Support the Development of Flow-Based Hepatocyte Culture Systems for Metabolism Studies

    Science.gov (United States)

    Pedersen, Jenny M.; Shim, Yoo-Sik; Hans, Vaibhav; Phillips, Martin B.; Macdonald, Jeffrey M.; Walker, Glenn; Andersen, Melvin E.; Clewell, Harvey J.; Yoon, Miyoung

    2016-01-01

    Accurate prediction of metabolism is a significant outstanding challenge in toxicology. The best predictions are based on experimental data from in vitro systems using primary hepatocytes. The predictivity of the primary hepatocyte-based culture systems, however, is still limited due to well-known phenotypic instability and rapid decline of metabolic competence within a few hours. Dynamic flow bioreactors for three-dimensional cell cultures are thought to be better at recapitulating tissue microenvironments and show potential to improve in vivo extrapolations of chemical or drug toxicity based on in vitro test results. These more physiologically relevant culture systems hold potential for extending metabolic competence of primary hepatocyte cultures as well. In this investigation, we used computational fluid dynamics to determine the optimal design of a flow-based hepatocyte culture system for evaluating chemical metabolism in vitro. The main design goals were (1) minimization of shear stress experienced by the cells to maximize viability, (2) rapid establishment of a uniform distribution of test compound in the chamber, and (3) delivery of sufficient oxygen to cells to support aerobic respiration. Two commercially available flow devices – RealBio® and QuasiVivo® (QV) – and a custom developed fluidized bed bioreactor were simulated, and turbulence, flow characteristics, test compound distribution, oxygen distribution, and cellular oxygen consumption were analyzed. Experimental results from the bioreactors were used to validate the simulation results. Our results indicate that maintaining adequate oxygen supply is the most important factor to the long-term viability of liver bioreactor cultures. Cell density and system flow patterns were the major determinants of local oxygen concentrations. The experimental results closely corresponded to the in silico predictions. Of the three bioreactors examined in this study, we were able to optimize the experimental

  17. Exploiting first-class arrays in Fortran for accelerator programming

    International Nuclear Information System (INIS)

    Rasmussen, Craig E.; Weseloh, Wayne N.; Robey, Robert W.; Sottile, Matthew J.; Quinlan, Daniel; Overbey, Jeffrey

    2010-01-01

    Emerging architectures for high performance computing often are well suited to a data parallel programming model. This paper presents a simple programming methodology based on existing languages and compiler tools that allows programmers to take advantage of these systems. We will work with the array features of Fortran 90 to show how this infrequently exploited, standardized language feature is easily transformed to lower level accelerator code. Our transformations are based on a mapping from Fortran 90 to C++ code with OpenCL extensions. The sheer complexity of programming for clusters of many or multi-core processors with tens of millions threads of execution make the simplicity of the data parallel model attractive. Furthermore, the increasing complexity of todays applications (especially when convolved with the increasing complexity of the hardware) and the need for portability across hardware architectures make a higher-level and simpler programming model like data parallel attractive. The goal of this work has been to exploit source-to-source transformations that allow programmers to develop and maintain programs at a high-level of abstraction, without coding to a specific hardware architecture. Furthermore these transformations allow multiple hardware architectures to be targeted without changing the high-level source. It also removes the necessity for application programmers to understand details of the accelerator architecture or to know OpenCL.

  18. Exploiting GPUs in Virtual Machine for BioCloud

    Science.gov (United States)

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E) channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment. PMID:23710465

  19. A Novel Passive Tracking Scheme Exploiting Geometric and Intercept Theorems.

    Science.gov (United States)

    Zhou, Biao; Sun, Chao; Ahn, Deockhyeon; Kim, Youngok

    2018-03-17

    Passive tracking aims to track targets without assistant devices, that is, device-free targets. Passive tracking based on Radio Frequency (RF) Tomography in wireless sensor networks has recently been addressed as an emerging field. The passive tracking scheme using geometric theorems (GTs) is one of the most popular RF Tomography schemes, because the GT-based method can effectively mitigate the demand for a high density of wireless nodes. In the GT-based tracking scheme, the tracking scenario is considered as a two-dimensional geometric topology and then geometric theorems are applied to estimate crossing points (CPs) of the device-free target on line-of-sight links (LOSLs), which reveal the target's trajectory information in a discrete form. In this paper, we review existing GT-based tracking schemes, and then propose a novel passive tracking scheme by exploiting the Intercept Theorem (IT). To create an IT-based CP estimation scheme available in the noisy non-parallel LOSL situation, we develop the equal-ratio traverse (ERT) method. Finally, we analyze properties of three GT-based tracking algorithms and the performance of these schemes is evaluated experimentally under various trajectories, node densities, and noisy topologies. Analysis of experimental results shows that tracking schemes exploiting geometric theorems can achieve remarkable positioning accuracy even under rather a low density of wireless nodes. Moreover, the proposed IT scheme can provide generally finer tracking accuracy under even lower node density and noisier topologies, in comparison to other schemes.

  20. Film-induced, steps for a Real Exploitation in Europe

    Directory of Open Access Journals (Sweden)

    Francesco di Cesare

    2015-03-01

    Full Text Available One of the possible ways to enhance Europe visibility, its entirety rather than a set of destinations, is implementing cooperation between the Member States especially in creating and developing trans-border thematic tourist products and experiences. One of them could be the film-induced tourism. In looking back over the past two cycles of European programming it is possible to find some examples, described in the article, in which the theme of audiovisual productions in their shooting phase in European locations has been the subject of EU attention.This article refers to some previous research results reminding how movie-induced tourism seems to be used just through sporadic attempts and therefore not developed and exploited in a strategic way. Whether from demand-side is clear what potential is inherent in the relationship between movie and tourism, on the supply side there is still much to do.As the current EC funding period (2014-2020 is favouring, at least in the first calls for proposal that came out, SMEs projects and being aware of the apparent lack of such activities developed by private businesses, the article explores new opportunities to be gathered suggesting a new exploitation path.

  1. The exploration-exploitation dilemma: a multidisciplinary framework.

    Directory of Open Access Journals (Sweden)

    Oded Berger-Tal

    Full Text Available The trade-off between the need to obtain new knowledge and the need to use that knowledge to improve performance is one of the most basic trade-offs in nature, and optimal performance usually requires some balance between exploratory and exploitative behaviors. Researchers in many disciplines have been searching for the optimal solution to this dilemma. Here we present a novel model in which the exploration strategy itself is dynamic and varies with time in order to optimize a definite goal, such as the acquisition of energy, money, or prestige. Our model produced four very distinct phases: Knowledge establishment, Knowledge accumulation, Knowledge maintenance, and Knowledge exploitation, giving rise to a multidisciplinary framework that applies equally to humans, animals, and organizations. The framework can be used to explain a multitude of phenomena in various disciplines, such as the movement of animals in novel landscapes, the most efficient resource allocation for a start-up company, or the effects of old age on knowledge acquisition in humans.

  2. Cheating by Exploitation of Developmental Prestalk Patterning in Dictyostelium discoideum

    Science.gov (United States)

    Khare, Anupama; Shaulsky, Gad

    2010-01-01

    The cooperative developmental system of the social amoeba Dictyostelium discoideum is susceptible to exploitation by cheaters—strains that make more than their fair share of spores in chimerae. Laboratory screens in Dictyostelium have shown that the genetic potential for facultative cheating is high, and field surveys have shown that cheaters are abundant in nature, but the cheating mechanisms are largely unknown. Here we describe cheater C (chtC), a strong facultative cheater mutant that cheats by affecting prestalk differentiation. The chtC gene is developmentally regulated and its mRNA becomes stalk-enriched at the end of development. chtC mutants are defective in maintaining the prestalk cell fate as some of their prestalk cells transdifferentiate into prespore cells, but that defect does not affect gross developmental morphology or sporulation efficiency. In chimerae between wild-type and chtC mutant cells, the wild-type cells preferentially give rise to prestalk cells, and the chtC mutants increase their representation in the spore mass. Mixing chtC mutants with other cell-type proportioning mutants revealed that the cheating is directly related to the prestalk-differentiation propensity of the victim. These findings illustrate that a cheater can victimize cooperative strains by exploiting an established developmental pathway. PMID:20195510

  3. The HACMS program: using formal methods to eliminate exploitable bugs

    Science.gov (United States)

    Launchbury, John; Richards, Raymond

    2017-01-01

    For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-free errors, etc., and guaranteeing integrity and confidentiality. The CompCert Verifying C Compiler maps source C programs to provably equivalent assembly language, ensuring the absence of exploitable bugs in the compiler. A number of factors have enabled this revolution, including faster processors, increased automation, more extensive infrastructure, specialized logics and the decision to co-develop code and correctness proofs rather than verify existing artefacts. In this paper, we explore the promise and limitations of current formal-methods techniques. We discuss these issues in the context of DARPA’s HACMS program, which had as its goal the creation of high-assurance software for vehicles, including quadcopters, helicopters and automobiles. This article is part of the themed issue ‘Verified trustworthy software systems’. PMID:28871050

  4. JPEG2000-coded image error concealment exploiting convex sets projections.

    Science.gov (United States)

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach.

  5. A case study of exploiting enterprise resource planning requirements

    Science.gov (United States)

    Niu, Nan; Jin, Mingzhou; Cheng, Jing-Ru C.

    2011-05-01

    The requirements engineering (RE) processes have become a key to conceptualising corporate-wide integrated solutions based on packaged enterprise resource planning (ERP) software. The RE literature has mainly focused on procuring the most suitable ERP package. Little is known about how an organisation exploits the chosen ERP RE model to frame the business application development. This article reports an exploratory case study of a key tenet of ERP RE adoption, namely that aligning business applications to the packaged RE model leads to integral practices and economic development. The case study analysed a series interrelated pilot projects developed for a business division of a large IT manufacturing and service company, using Oracle's appl1ication implementation method (AIM). The study indicated that AIM RE improved team collaboration and project management experience, but needed to make hidden assumptions explicit to support data visibility and integrity. Our study can direct researchers towards rigorous empirical evaluations of ERP RE adoption, collect experiences and lessons learned for practitioners, and help generate more effective and mature processes when exploiting ERP RE methods.

  6. Noise-exploitation and adaptation in neuromorphic sensors

    Science.gov (United States)

    Hindo, Thamira; Chakrabartty, Shantanu

    2012-04-01

    Even though current micro-nano fabrication technology has reached integration levels where ultra-sensitive sensors can be fabricated, the sensing performance (resolution per joule) of synthetic systems are still orders of magnitude inferior to those observed in neurobiology. For example, the filiform hairs in crickets operate at fundamental limits of noise; auditory sensors in a parasitoid fly can overcome fundamental limitations to precisely localize ultra-faint acoustic signatures. Even though many of these biological marvels have served as inspiration for different types of neuromorphic sensors, the main focus these designs have been to faithfully replicate the biological functionalities, without considering the constructive role of "noise". In man-made sensors device and sensor noise are typically considered as a nuisance, where as in neurobiology "noise" has been shown to be a computational aid that enables biology to sense and operate at fundamental limits of energy efficiency and performance. In this paper, we describe some of the important noise-exploitation and adaptation principles observed in neurobiology and how they can be systematically used for designing neuromorphic sensors. Our focus will be on two types of noise-exploitation principles, namely, (a) stochastic resonance; and (b) noise-shaping, which are unified within our previously reported framework called Σ▵ learning. As a case-study, we describe the application of Σ▵ learning for the design of a miniature acoustic source localizer whose performance matches that of its biological counterpart(Ormia Ochracea).

  7. Exploitation of Clustering Techniques in Transactional Healthcare Data

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad Mahoto

    2014-03-01

    Full Text Available Healthcare service centres equipped with electronic health systems have improved their resources as well as treatment processes. The dynamic nature of healthcare data of each individual makes it complex and difficult for physicians to manually mediate them; therefore, automatic techniques are essential to manage the quality and standardization of treatment procedures. Exploratory data analysis, patternanalysis and grouping of data is managed using clustering techniques, which work as an unsupervised classification. A number of healthcare applications are developed that use several data mining techniques for classification, clustering and extracting useful information from healthcare data. The challenging issue in this domain is to select adequate data mining algorithm for optimal results. This paper exploits three different clustering algorithms: DBSCAN (Density-Based Clustering, agglomerative hierarchical and k-means in real transactional healthcare data of diabetic patients (taken as case study to analyse their performance in large and dispersed healthcare data. The best solution of cluster sets among the exploited algorithms is evaluated using clustering quality indexes and is selected to identify the possible subgroups of patients having similar treatment patterns

  8. Salmonella Typhimurium exploits inflammation to its own advantage in piglets.

    Science.gov (United States)

    Chirullo, Barbara; Pesciaroli, Michele; Drumo, Rosanna; Ruggeri, Jessica; Razzuoli, Elisabetta; Pistoia, Claudia; Petrucci, Paola; Martinelli, Nicola; Cucco, Lucilla; Moscati, Livia; Amadori, Massimo; Magistrali, Chiara F; Alborali, Giovanni L; Pasquali, Paolo

    2015-01-01

    Salmonella Typhimurium (S. Typhimurium) is responsible for foodborne zoonotic infections that, in humans, induce self-limiting gastroenteritis. The aim of this study was to evaluate whether the wild-type strain S. Typhimurium (STM14028) is able to exploit inflammation fostering an active infection. Due to the similarity between human and porcine diseases induced by S. Typhimurium, we used piglets as a model for salmonellosis and gastrointestinal research. This study showed that STM14028 is able to efficiently colonize in vitro porcine mono-macrophages and intestinal columnar epithelial (IPEC-J2) cells, and that the colonization significantly increases with LPS pre-treatment. This increase was then reversed by inhibiting the LPS stimulation through LPS antagonist, confirming an active role of LPS stimulation in STM14028-intracellular colonization. Moreover, LPS in vivo treatment increased cytokines blood level and body temperature at 4 h post infection, which is consistent with an acute inflammatory stimulus, capable to influence the colonization of STM14028 in different organs and tissues. The present study proves for the first time that in acute enteric salmonellosis, S. Typhimurium exploits inflammation for its benefit in piglets.

  9. Cheating by exploitation of developmental prestalk patterning in Dictyostelium discoideum.

    Directory of Open Access Journals (Sweden)

    Anupama Khare

    2010-02-01

    Full Text Available The cooperative developmental system of the social amoeba Dictyostelium discoideum is susceptible to exploitation by cheaters-strains that make more than their fair share of spores in chimerae. Laboratory screens in Dictyostelium have shown that the genetic potential for facultative cheating is high, and field surveys have shown that cheaters are abundant in nature, but the cheating mechanisms are largely unknown. Here we describe cheater C (chtC, a strong facultative cheater mutant that cheats by affecting prestalk differentiation. The chtC gene is developmentally regulated and its mRNA becomes stalk-enriched at the end of development. chtC mutants are defective in maintaining the prestalk cell fate as some of their prestalk cells transdifferentiate into prespore cells, but that defect does not affect gross developmental morphology or sporulation efficiency. In chimerae between wild-type and chtC mutant cells, the wild-type cells preferentially give rise to prestalk cells, and the chtC mutants increase their representation in the spore mass. Mixing chtC mutants with other cell-type proportioning mutants revealed that the cheating is directly related to the prestalk-differentiation propensity of the victim. These findings illustrate that a cheater can victimize cooperative strains by exploiting an established developmental pathway.

  10. The environmental impacts of foamed concrete production and exploitation

    Science.gov (United States)

    Namsone, E.; Korjakins, A.; Sahmenko, G.; Sinka, M.

    2017-10-01

    This paper presents a study focusing on the environmental impacts of foamed concrete production and exploitation. CO2 emissions are very important factor for describing durability and sustainability of any building material and its life cycle. The building sector is one of the largest energy-consuming sectors in the world. In this study CO2 emissions are evaluated with regard to three types of energy resources (gas, coal and eco-friendly fuel). The related savings on raw materials are up to 120 t of water per 1000 t of traditionally mixed foamed concrete and up to 350 t of sand per 1000 t of foamed concrete produced with intensive mixing technology. In addition, total reduction of CO2 emissions (up to 60 t per 1000 m3 of material) and total energy saving from introduction of foamed concrete production (depending on the type of fuel) were calculated. In order to analyze the conditions of exploitation, both thermal conductivity and thickness of wall was determined. All obtained and calculated results were compared to those of the commercially produced autoclaved aerated concrete.

  11. Exploiting GPUs in virtual machine for BioCloud.

    Science.gov (United States)

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E) channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.

  12. Human trafficking for labour exploitation:
    Interpreting the crime

    Directory of Open Access Journals (Sweden)

    Jill E.B. Coster van Voorhout

    2007-12-01

    Full Text Available The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation also falls short discouraging the aim of this legislation, namely harmonisation. Hence, another solution is required. This article does so by firstly challenging assumptions about human trafficking for labour exploitation that are generally pertinent, but nonetheless untrue. This accurate appraisal of the crime’s nature is followed by a synopsis of national legislation and adjudication in three Member States, so as to also focus on these actualities regarding the crime that are commonly not conceived. This article examines two countries that have implemented the Framework Decision, namely Belgium and the Netherlands, and one that has not yet done so, the United Kingdom. Thereafter remaining unexplained elements of the Framework Decision’s definition are interpreted with use of international, pan-European and European legislation and adjudication. Based upon all this, a suggested interpretation of the Framework Decision’s definition is provided so as to overcome all identified difficulties with it.

  13. Exploiting first-class arrays in Fortran for accelerator programming

    Energy Technology Data Exchange (ETDEWEB)

    Rasmussen, Craig E [Los Alamos National Laboratory; Weseloh, Wayne N [Los Alamos National Laboratory; Robey, Robert W [Los Alamos National Laboratory; Matthew, Sottile J [GALORIS, INC.; Quinlan, Daniel [LLNL; Overbye, Jeffrey [INDIANA UNIV.

    2010-12-15

    Emerging architectures for high performance computing often are well suited to a data parallel programming model. This paper presents a simple programming methodology based on existing languages and compiler tools that allows programmers to take advantage of these systems. We will work with the array features of Fortran 90 to show how this infrequently exploited, standardized language feature is easily transformed to lower level accelerator code. Our transformations are based on a mapping from Fortran 90 to C++ code with OpenCL extensions. The sheer complexity of programming for clusters of many or multi-core processors with tens of millions threads of execution make the simplicity of the data parallel model attractive. Furthermore, the increasing complexity of todays applications (especially when convolved with the increasing complexity of the hardware) and the need for portability across hardware architectures make a higher-level and simpler programming model like data parallel attractive. The goal of this work has been to exploit source-to-source transformations that allow programmers to develop and maintain programs at a high-level of abstraction, without coding to a specific hardware architecture. Furthermore these transformations allow multiple hardware architectures to be targeted without changing the high-level source. It also removes the necessity for application programmers to understand details of the accelerator architecture or to know OpenCL.

  14. Exploiting CMS data popularity to model the evolution of data management for Run-2 and beyond

    CERN Document Server

    Bonacorsi, D; Giordano, D; Girone, M; Neri, M; Magini, N; Kuznetsov, V; Wildish, T

    2015-01-01

    During the LHC Run-1 data taking, all experiments collected large data volumes from proton-proton and heavy-ion collisions. The collisions data, together with massive volumes of simulated data, were replicated in multiple copies, transferred among various Tier levels, transformed/slimmed in format/content. These data were then accessed (both locally and remotely) by large groups of distributed analysis communities exploiting the WorldWide LHC Computing Grid infrastructure and services. While efficient data placement strategies - together with optimal data redistribution and deletions on demand - have become the core of static versus dynamic data management projects, little effort has so far been invested in understanding the detailed data-access patterns which surfaced in Run-1. These patterns, if understood, can be used as input to simulation of computing models at the LHC, to optimise existing systems by tuning their behaviour, and to explore next-generation CPU/storage/network co-scheduling solutions. This...

  15. Space Tourism - The Moon and the Popular and Commercial Exploitation of Space

    Science.gov (United States)

    Taylor, R. L. S.

    Increasing numbers of people, within the space community, argue that the development of space tourism - initially to low-Earth-obit (LEO) and with `stop-over' orbiting hotel facilities - would provide an important and significant economic and financial driver for the further expansion and utilization of space resources. In this paper the case for space-tourism is reviewed and it is concluded that the long-term economic expansion of the use and exploitation of space to meet and fulfill human needs cannot be based on operating from the surface of the Earth. A stable and viable Earth-space economy has to be centred upon the Moon. The technological, engineering and scientific requirements and a possible development scenario are discussed briefly and some of the wider implications are noted.

  16. The anti corrosive design of structural metallic elements in buildings with large exploitation period

    International Nuclear Information System (INIS)

    Avila Ayon, V.; Rodriguez Quesada, A. L.

    2009-01-01

    The corrosion deterioration in metallic structural elements, with the consistent loss of his physical and mechanical properties, is cause by errors in the design or fabrication, that allows the accumulation of humidity and contaminants in the surfaces, or acceleration zones of the corrosion processes, as the bimetalics pairs. The aggressiveness of the environment and the productive processes that develop in industrial installations, causes the apparition of premature failures that engage the edification use. The identification of design errors is the first step in the conservation of these structures. the elimination and made a project adapted to the proper installations conditions, is essential procedures to prolong the edification useful life with an optimum and rational use of the resources that destined for this end. The investigation is about the results obtained in the diagnostic and the conservation of industrial installment, with large exploitation periods, in which existed evidences of failures by corrosion, specifically to the elimination of errors of design. (Author) 12 refs

  17. Exploiting the high-affinity phosphonate-hydroxyapatite nanoparticle interaction for delivery of radiation and drugs

    International Nuclear Information System (INIS)

    Ong, Hooi Tin; Loo, Joachim S. C.; Boey, Freddy Y. C.; Russell, Stephen J.; Ma Jan; Peng, Kah-Whye

    2008-01-01

    Hydroxyapatite is biocompatible and used in various biomedical applications. Here, we generated hydroxyapatite nanoparticles (HNPs) of various sizes (40-200 nm) and demonstrated that they can be stably loaded with drugs or radioisotopes by exploiting the high-affinity HA-(poly)phosphonate interaction. Clinically available phosphonates, clodronate, and Tc-99m-methylene-diphosphonate (Tc-99m-MDP), were efficiently loaded onto HNPs within 15 min. Biodistribution of radiolabeled HNP-MDP-Tc99m in mice was monitored non-invasively using microSPECT-CT. Imaging and dosimetry studies indicated that the HNPs, regardless of size, were quickly taken up by Kupffer cells in the liver after systemic administration into mice. Clodronate loaded onto HNPs remained biologically active and were able to result in selective depletion of Kupffer cells. This method of drug or isotope loading on HA is fast and easy as it eliminates the need for additional surface modifications of the nanoparticles

  18. The Potential Socio-economic Impacts of Gas Hydrate Exploitation

    Science.gov (United States)

    Riley, David; Schaafsma, Marije; Marin-Moreno, Héctor; Minshull, Tim A.

    2017-04-01

    Gas hydrate has garnered significant interest as a possible clean fossil fuel resource, especially in countries with limited energy supplies. Whilst the sector is still in its infancy, there has been escalating development towards commercial production. To the best of our knowledge it appears that, despite its potential, existing analyses of the social and economic impacts of hydrate exploitation have been very limited. Before any viable commercial production commences, the potential impacts across society must be considered. It is likely that such impact assessments will become a legislative requirement for hydrate exploitation, similar to their requirement in conventional oil and gas projects. Social impact analysis should guide hydrate development to have the highest possible net benefits to the human and natural environment. Without active commercial hydrate operations, potential socio-economic impacts can only be inferred from other fossil fuel resource focused communities, including those directly or indirectly affected by the oil and gas industry either in the vicinity of the well or further afield. This review attempts to highlight potential impacts by synthesising current literature, focusing on social impacts at the extraction stage of operation, over time. Using a DPSIR (Driving forces; Pressures; States; Impacts; Responses) framework, we focus on impacts upon: health and wellbeing, land use and access, services and infrastructure, population, employment opportunities, income and lifestyles. Human populations directly or indirectly related with fossil fuel extraction activities often show boom and bust dynamics, and so any impacts may be finite or change temporally. Therefore potential impacts have to be reassessed throughout the lifetime of the exploitation. Our review shows there are a wide range of possible positive and negative socio-economic impacts from hydrate development. Exploitation can bring jobs and infrastructure to remote areas, although

  19. Development of a Curriculum on Sexual Exploitation and Self-Protection for Handicapped Students.

    Science.gov (United States)

    Ryerson, Ellen; Sundem, Jennifer McGilvray

    1981-01-01

    To assist handicapped persons in preventing sexual exploitation, the Curriculum for Developing an Awareness of Sexual Exploitation and Teaching Self Protection Techniques was developed and pilot tested with 13 special education teachers in Seattle, Washington. (SB)

  20. Water Exploitation and Its Outcomes Caused by Capitalism as Reflected on Gore Verbinski's Rango Movie

    OpenAIRE

    SETIAWAN, DANIEL NUGRAHA

    2014-01-01

    Nugraha Setiawan, Daniel. 2014. Water Exploitation and Its Outcome Caused byCapitalism as Reflected on Gore Verbinski's Rango Movie. Study Program ofEnglish, Universitas Brawijaya.Supervisor: Yusri Fajar, Co-supervisor: Melania Shinta Harendika.Keywords: water exploitation, environment, capitalism, Rango movie. Water exploitation threats ecosystem and causes a great damage to environment. One of the causes of the water exploitation is capitalism. The movie entitled Rango reveals some causes a...

  1. Sporting Events, the Trafficking of Women for Sexual Exploitation and Human Rights

    OpenAIRE

    Caudwell, Jayne

    2018-01-01

    This chapter explores the possibilities of applying a human rights framework to sexual exploitation, sex work and sporting events. Human rights perspectives are emerging as useful ways to interrogate a range of global social injustices. However, defining sexual exploitation is not straightforward. First, I focus on how sexual exploitation and sex work are understood within human rights instruments. Second, I provide a vivid illustration of the trafficking of women for sexual exploitation. Thr...

  2. A DEMO relevant fast wave current drive high harmonic antenna exploiting the high impedance technique

    Energy Technology Data Exchange (ETDEWEB)

    Milanesio, D., E-mail: daniele.milanesio@polito.it; Maggiora, R. [Politecnico di Torino, Dipartimento di Elettronica e Telecomunicazioni (DET), Torino (Italy)

    2015-12-10

    Ion Cyclotron (IC) antennas are routinely adopted in most of the existing nuclear fusion experiments, even though their main goal, i.e. to couple high power to the plasma (MW), is often limited by rather severe drawbacks due to high fields on the antenna itself and on the unmatched part of the feeding lines. In addition to the well exploited auxiliary ion heating during the start-up phase, some non-ohmic current drive (CD) at the IC range of frequencies may be explored in view of the DEMO reactor. In this work, we suggest and describe a compact high frequency DEMO relevant antenna, based on the high impedance surfaces concept. High-impedance surfaces are periodic metallic structures (patches) usually displaced on top of a dielectric substrate and grounded by means of vertical posts embedded inside the dielectric, in a mushroom-like shape. These structures present a high impedance, within a given frequency band, such that the image currents are in-phase with the currents of the antenna itself, thus determining a significant efficiency increase. After a general introduction on the properties of high impedance surfaces, we analyze, by means of numerical codes, a dielectric based and a full metal solution optimized to be tested and benchmarked on the FTU experiment fed with generators at 433MHz.

  3. The exploitation of living resources in the Dutch Wadden Sea : a historical overview

    NARCIS (Netherlands)

    Wolff, W J

    An overview, based on written sources and personal observations, is presented of exploitation of living resources in and around the Dutch Wadden Sea during the past few centuries. It is concluded that before about 1900 exploitation was almost unrestricted. Exploitation of plants has been documented

  4. The Illusions and Juxtapositions of Commercial Sexual Exploitation among Youth: Identifying Effective Street-Outreach Strategies

    Science.gov (United States)

    Holger-Ambrose, Beth; Langmade, Cheree; Edinburgh, Laurel D.; Saewyc, Elizabeth

    2013-01-01

    To explore sexually exploited youths' perspectives of how street outreach workers can effectively provide outreach and connections to services, we conducted qualitative interviews with 13 female participants, ages 14 to 22, in a Midwest U.S. city. Participants reported multiple types of exploitation, most first exploited by age 13, plus substance…

  5. 25 CFR 20.516 - How are child abuse, neglect or exploitation cases to be handled?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How are child abuse, neglect or exploitation cases to be... FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Child Assistance Foster Care § 20.516 How are child abuse, neglect or exploitation cases to be handled? Reported child abuse, neglect or exploitation cases and the...

  6. To exploit or not to exploit: The structure and development of arguments over the use of wetlands

    Directory of Open Access Journals (Sweden)

    Tiina Korvela

    2013-07-01

    Full Text Available This paper considers the discourse surrounding the exploitation of wetlands (also called marshlands, bogs, mires and peatlands in Finland. The focus of the paper is on the development of the arguments used in the discourse – thus the paper also gives an insight into how the legal regimes concerning wetlands have developed. The arguments are analysed using the dualistic and deconstructive model developed in Critical Legal Studies by Martti Koskenniemi. The hypothesis is that, to some extent, the model developed for international law can be adapted to fit national laws, but that significant problems may still arise. Throughout the history of discourse on wetlands, legal arguments have essentially dealt with the conflict between the conservation of wetlands or their exploitation for peat, which is a source of energy. Three arguments are discussed in this paper: 1 The ‘sovereignty argument’; 2 The ‘no harm argument’; and 3 The ‘climate change argument’. The sovereignty argument has been dominant from the beginning of the industrialised production of peat, but the no harm argument has been steadily gaining weight. Interestingly, the climate change argument lacks traction in the discourse even though the importance of wetlands in adaptation to climate change is common knowledge. This paper argues that regional and national authorities use legislation and the no harm argument in innovative ways. These innovations may be useful for the aims underlying the climate change argument.

  7. Sentinel-2 data exploitation with ESA's Sentinel-2 Toolbox

    Science.gov (United States)

    Gascon, Ferran; Ramoino, Fabrizzio; deanos, Yves-louis

    2017-04-01

    The Sentinel-2 Toolbox is a project kicked off by ESA in early 2014, under the umbrella of the ESA SEOM programme with the aim to provide a tool for visualizing, analysing, and processing the Sentinel-2 datasets. The toolbox is an extension of the SeNtinel Application Platform (SNAP), a project resulting from the effort of the developers of the Sentinel-1, Sentinel-2 and Sentinel-3 toolbox to provide a single common application framework suited for the mixed exploitation of SAR, high resolution optical and medium resolution optical datasets. All three development teams collaborate to drive the evolution of the common SNAP framework in a developer forum. In this triplet, the Sentinel-2 toolbox is dedicated to enhance SNAP support for high resolution optical imagery. It is a multi-mission toolbox, already providing support for Sentinel-2, RapidEye, Deimos, SPOT 1 to SPOT 5 datasets. In terms of processing algorithms, SNAP provides tools specific to the Sentinel-2 mission : • An atmospheric correction module, Sen2Cor, is integrated into the toolbox, and provides scene classification, atmospheric correction, cirrus detection and correction. The output L2A products can be opened seamlessly in the toolbox. • A multitemporal synthesis processor (L3) • A biophysical products processor (L2B) • A water processor • A deforestation detector • OTB tools integration • SNAP Engine for Cloud Exploitation along with a set of more generic tools for high resolution optical data exploitation. Together with the generic functionalities of SNAP this provides an ideal environment for designing multi-missions processing chains and producing value-added products from raw datasets. The use of SNAP is manifold and the desktop tools provides a rich application for interactive visualization, analysis and processing of data. But all tools available from SNAP can be accessed via command-line through the Graph Processing Framework (GPT), the kernel of the SNAP processing engine. This

  8. Plamonics for Biomolecular Sensors and THz Metamaterial Waveguides (Near and Far-Field Interfaces to DNA. Guided Nanostructures from RF to Lightwave: Exploiting the Spectrum)

    Science.gov (United States)

    2014-12-17

    Spectrum for MURI- UCI 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: In THz frequencies, the textured surfaces on a subwavelength scale can support...Near and Far-Field Interfaces to DNA.Guided Nanostructures from RF to Lightwave: Exploiting the Spectrum for MURI- UCI Report Title In THz...interferometer and, more particularly, a Mach-Zehnder Interferometer having a doubly-corrugated spoofed surface plasmon polariton waveguide. ARO & MURI ( UCI

  9. Exploiting open data: a new era in pharmacoinformatics.

    Science.gov (United States)

    Goldmann, Daria; Montanari, Floriane; Richter, Lars; Zdrazil, Barbara; Ecker, Gerhard F

    2014-04-01

    Within the last decade open data concepts has been gaining increasing interest in the area of drug discovery. With the launch of ChEMBL and PubChem, an enormous amount of bioactivity data was made easily accessible to the public domain. In addition, platforms that semantically integrate those data, such as the Open PHACTS Discovery Platform, permit querying across different domains of open life science data beyond the concept of ligand-target-pharmacology. However, most public databases are compiled from literature sources and are thus heterogeneous in their coverage. In addition, assay descriptions are not uniform and most often lack relevant information in the primary literature and, consequently, in databases. This raises the question how useful large public data sources are for deriving computational models. In this perspective, we highlight selected open-source initiatives and outline the possibilities and also the limitations when exploiting this huge amount of bioactivity data.

  10. Exploiting mitochondria as targets for the development of new antifungals.

    Science.gov (United States)

    Li, Dongmei; Calderone, Richard

    2017-02-17

    Mitochondria are essential for cell growth and survival of most fungal pathogens. Energy (ATP) produced during oxidation/reduction reactions of the electron transport chain (ETC) Complexes I, III and IV (CI, CIII, CIV) fuel cell synthesis. The mitochondria of fungal pathogens are understudied even though more recent published data suggest critical functional assignments to fungal-specific proteins. Proteins of mammalian mitochondria are grouped into 16 functional categories. In this review, we focus upon 11 proteins from 5 of these categories in fungal pathogens, OXPHOS, protein import, stress response, carbon source metabolism, and fission/fusion morphology. As these proteins also are fungal-specific, we hypothesize that they may be exploited as targets in antifungal drug discovery. We also discuss published transcriptional profiling data of mitochondrial CI subunit protein mutants, in which we advance a novel concept those CI subunit proteins have both shared as well as specific responsibilities for providing ATP to cell processes.

  11. Waveform design for detection of weapons based on signature exploitation

    Science.gov (United States)

    Ahmad, Fauzia; Amin, Moeness G.; Dogaru, Traian

    2010-04-01

    We present waveform design based on signature exploitation techniques for improved detection of weapons in urban sensing applications. A single-antenna monostatic radar system is considered. Under the assumption of exact knowledge of the target orientation and, hence, known impulse response, matched illumination approach is used for optimal target detection. For the case of unknown target orientation, we analyze the target signatures as random processes and perform signal-to-noise-ratio based waveform optimization. Numerical electromagnetic modeling is used to provide the impulse responses of an AK-47 assault rifle for various target aspect angles relative to the radar. Simulation results depict an improvement in the signal-to-noise-ratio at the output of the matched filter receiver for both matched illumination and stochastic waveforms as compared to a chirp waveform of the same duration and energy.

  12. Synthetic biology approaches: Towards sustainable exploitation of marine bioactive molecules.

    Science.gov (United States)

    Seghal Kiran, G; Ramasamy, Pasiyappazham; Sekar, Sivasankari; Ramu, Meenatchi; Hassan, Saqib; Ninawe, A S; Selvin, Joseph

    2018-06-01

    The discovery of genes responsible for the production of bioactive metabolites via metabolic pathways combined with the advances in synthetic biology tools, has allowed the establishment of numerous microbial cell factories, for instance the yeast cell factories, for the manufacture of highly useful metabolites from renewable biomass. Genome mining and metagenomics are two platforms provide base-line data for reconstruction of genomes and metabolomes which is based in the development of synthetic/semi-synthetic genomes for marine natural products discovery. Engineered biofilms are being innovated on synthetic biology platform using genetic circuits and cell signalling systems as represillators controlling biofilm formation. Recombineering is a process of homologous recombination mediated genetic engineering, includes insertion, deletion or modification of any sequence specifically. Although this discipline considered new to the scientific domain, this field has now developed as promising endeavor on the accomplishment of sustainable exploitation of marine natural products. Copyright © 2018 Elsevier B.V. All rights reserved.

  13. Exploiting the instability of smart structure for reconfiguration

    Science.gov (United States)

    Zhang, Jiaying; Zhang, Chen; Hao, Lin; Nie, Rui; Qiu, Jinhao

    2017-08-01

    Aiming to verify the concept of using heteroclinic connections to reconfigure smart structures, a multistable buckled beam with integrated Shape Memory Alloy (SMA) wires is utilized as a high fidelity model. The Shape Memory Alloy (SMA) wires are resistively heated to provide the actuation force to stabilize the unstable configuration and the transition of the beam from one unstable equilibrium condition to the other. This concept provides a means of reducing the energy requirement for transitions between configurations of the structure, which is an energy-efficient reconfiguration scheme between equal-energy unstable (but actively controlled) equilibria. This letter presents a detailed design of the system, and how the active (heated) SMA wires control the structure stay in unstable configuration and drive the structure to achieve reconfiguration. Exploiting the instability of the smart structure has significant interests in many power reduction applications, including active flow control, reconfiguration of large deployable aerospace structures, and MEMS devices.

  14. La prostitution : profession ou exploitation ?

    OpenAIRE

    Lavallée, Diane

    2016-01-01

    La prostitution est-elle une profession comme une autre ou une forme d’exploitation des femmes ? Une simple activité génératrice de revenus ou une expression de violence à l’égard des femmes ? Un métier librement choisi ou une contrainte imposée ? Cet article présente quelques définitions de la prostitution et en identifie certaines causes. Il examine également la question du trafic sexuel et décrit un profil des clients de la prostitution, des proxénètes et des prostituées. Finalement, il tr...

  15. Commercial Sexual Exploitation of Children and State Child Welfare Systems.

    Science.gov (United States)

    Bounds, Dawn; Julion, Wrenetha A; Delaney, Kathleen R

    2015-01-01

    In several states, commercial sexual exploitation of children (CSEC) is now a reportable child abuse offense. Illinois has taken the lead in tackling the issue and the Illinois experience illuminates valuable lessons. This article delineates the protection, practice, and policy implications that evolve when CSEC falls under a state child welfare system. The specific aims are to (a) discuss CSEC, its victims, risks, harms, and challenges inherent in providing effective care; (b) use Illinois as an exemplar to explicate the consequences and implementation challenges of establishing a state reporting system that frames CSEC as a child welfare issue; (c) recommend strategies for developing effective state reporting models, and (d) demonstrate how nurses are well poised to advocate for victims of human trafficking on both state and national levels. Recommendations for improving the identification of CSEC victims and overcoming challenges to state implementation are offered. © The Author(s) 2015.

  16. Child sexual exploitation and youth offending: A research note.

    Science.gov (United States)

    Cockbain, Ella; Brayley, Helen

    2012-11-01

    Links between child sexual exploitation (CSE) and youth offending should be better recognised, according to these preliminary research findings from the UK. Data from a leading CSE service provider and Youth Offending Team were analysed for the period 2001-2010 inclusive. Of CSE victims, 40 percent had offending records and recidivism rates were high. Together they committed 1586 offences - 5 percent of all local youth crime. Male and female offending behaviour differed significantly. The types of offences identified were potentially symptomatic of CSE. Referral to CSE services typically post-dated arrest, indicating that children were recognised first as offenders. Challenges in researching the interactions between these two complex issues are discussed. This study has important implications for youth justice policy and practice, both nationally and internationally.

  17. Exploiting CRISPR/Cas: Interference Mechanisms and Applications

    Directory of Open Access Journals (Sweden)

    André Plagens

    2013-07-01

    Full Text Available The discovery of biological concepts can often provide a framework for the development of novel molecular tools, which can help us to further understand and manipulate life. One recent example is the elucidation of the prokaryotic adaptive immune system, clustered regularly interspaced short palindromic repeats (CRISPR/CRISPR-associated (Cas that protects bacteria and archaea against viruses or conjugative plasmids. The immunity is based on small RNA molecules that are incorporated into versatile multi-domain proteins or protein complexes and specifically target viral nucleic acids via base complementarity. CRISPR/Cas interference machines are utilized to develop novel genome editing tools for different organisms. Here, we will review the latest progress in the elucidation and application of prokaryotic CRISPR/Cas systems and discuss possible future approaches to exploit the potential of these interference machineries.

  18. Exploiting Biocatalysis in the Synthesis of Supramolecular Polymers

    Science.gov (United States)

    Roy, Sangita; Ulijn, Rein V.

    This chapter details the exploitation of biocatalysis in generating supramolecular polymers. This approach provides highly dynamic supramolecular structures, inspired by biological polymeric systems found in the intra- and extracellular space. The molecular design of the self-assembling precursors is discussed in terms of enzyme recognition, molecular switching mechanisms and non-covalent interactions that drive the supramolecular polymerisation process, with an emphasis on aromatic peptide amphiphiles. We discuss a number of unique features of these systems, including spatiotemporal control of nucleation and growth of supramolecular polymers and the possibility of kinetically controlling mechanical properties. Fully reversible systems that operate under thermodynamic control allow for defect correction and selection of the most stable structures from mixtures of monomers. Finally, a number of potential applications of enzymatic supramolecular polymerisations are discussed in the context of biomedicine and nanotechnology.

  19. SMARTS: Exploiting Temporal Locality and Parallelism through Vertical Execution

    International Nuclear Information System (INIS)

    Beckman, P.; Crotinger, J.; Karmesin, S.; Malony, A.; Oldehoeft, R.; Shende, S.; Smith, S.; Vajracharya, S.

    1999-01-01

    In the solution of large-scale numerical prob- lems, parallel computing is becoming simultaneously more important and more difficult. The complex organization of today's multiprocessors with several memory hierarchies has forced the scientific programmer to make a choice between simple but unscalable code and scalable but extremely com- plex code that does not port to other architectures. This paper describes how the SMARTS runtime system and the POOMA C++ class library for high-performance scientific computing work together to exploit data parallelism in scientific applications while hiding the details of manag- ing parallelism and data locality from the user. We present innovative algorithms, based on the macro -dataflow model, for detecting data parallelism and efficiently executing data- parallel statements on shared-memory multiprocessors. We also desclibe how these algorithms can be implemented on clusters of SMPS

  20. Microbial biosurfactants: challenges and opportunities for future exploitation.

    Science.gov (United States)

    Marchant, Roger; Banat, Ibrahim M

    2012-11-01

    The drive for industrial sustainability has pushed biosurfactants to the top of the agenda of many companies. Biosurfactants offer the possibility of replacing chemical surfactants, produced from nonrenewable resources, with alternatives produced from cheap renewable feedstocks. Biosurfactants are also attractive because they are less damaging to the environment yet are robust enough for industrial use. The most promising biosurfactants at the present time are the glycolipids, sophorolipids produced by Candida yeasts, mannosylerythritol lipids (MELs) produced by Pseudozyma yeasts, and rhamnolipids produced by Pseudomonas. Despite the current enthusiasm for these compounds several residual problems remain. This review highlights remaining problems and indicates the prospects for imminent commercial exploitation of a new generation of microbial biosurfactants. Copyright © 2012 Elsevier Ltd. All rights reserved.

  1. Exploiting the Undesired: Beam-Gas Interactions in the LHC

    CERN Document Server

    Versaci, R; Baglin, V; Mereghetti, A

    2012-01-01

    The vacuum inside the LHC pipes has a key role in correct operation of the accelerator. The interaction of the beam with residual gas in the pipes can lead to the loss of the beam itself and damage accelerator components. Nevertheless, beam-gas interactions can be exploited to indirectly measure the gas pressure inside the beam pipe, detecting the secondaries produced. The showers generated are detected by Beam Loss Monitors, whose signals depend on the gas pressure. This technique would also allow to punctually measure the gas pressure in sections of the accelerator where vacuum gauges are not frequent, such as the arcs. The problem has been addressed by means of FLUKA simulations and the results have been benchmarked with direct measurements performed in the LHC in 2011.

  2. Exploiting PV technology for basic need provision in Nigeria

    International Nuclear Information System (INIS)

    Gyoh, L.; Gyoh, S.

    2004-01-01

    Transitional economies are confronted with ever declining standard of living and low per capita income. Development institutions around the world have come to realize the strategic importance of Sustainable Energy as a Basic Need in the development process. Despite the efforts made by emerging democracies to eradicate poverty, there are still millions of people without access to electricity. Unreliable energy supply currently presents a constant obstacle to many poverty alleviation programmes. Against this background, some states government in Nigeria are exploiting the unique advantage offered by PV technology in the provision of Basic Needs. This study appraises some of the scheme in which the authors have been heavily involved with. This paper identifies some of the strategic policies that might accelerate the successful implementation of PV technology as a poverty alleviation tool in terms of electricity provision in transitional economies. (authors)

  3. International petroleum exploration and exploitation agreements: a comprehensive environmental appraisal

    International Nuclear Information System (INIS)

    Zhiguo Gao

    1994-01-01

    The evolution of the environmental aspects of international petroleum exploration and exploitation is outlined. Four case studies of modern petroleum contracts from four developing countries are presented. These are Thailand's modern concession contract, Indonesia's production sharing contract, Brazil's risk service contract and China's hybrid contract. The failure of these four countries to provide adequate environmental regulation through their petroleum contracts is typical of many countries in the developing world. An urgent need exists to recognise that important environmental and resource consequences are associated with the developments authorised by petroleum contracts and that appropriate legal changes must be made to take them into account. Environmental sustainability should be an explicit part of all investment arrangements. (UK)

  4. Exploiting nonlinearities of micro-machined resonators for filtering applications

    KAUST Repository

    Ilyas, Saad

    2017-06-21

    We demonstrate the exploitation of the nonlinear behavior of two electrically coupled microbeam resonators to realize a band-pass filter. More specifically, we combine their nonlinear hardening and softening responses to realize a near flat pass band filter with sharp roll-off characteristics. The device is composed of two near identical doubly clamped and electrostatically actuated microbeams made of silicon. One of the resonators is buckled via thermal loading to produce a softening frequency response. It is then further tuned to create the desired overlap with the second resonator response of hardening behavior. This overlapping improves the pass band flatness. Also, the sudden jumps due to the softening and hardening behaviors create sharp roll-off characteristics. This approach can be promising for the future generation of filters with superior characteristics.

  5. Exploiting CRISPR/Cas: Interference Mechanisms and Applications

    Science.gov (United States)

    Richter, Hagen; Randau, Lennart; Plagens, André

    2013-01-01

    The discovery of biological concepts can often provide a framework for the development of novel molecular tools, which can help us to further understand and manipulate life. One recent example is the elucidation of the prokaryotic adaptive immune system, clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated (Cas) that protects bacteria and archaea against viruses or conjugative plasmids. The immunity is based on small RNA molecules that are incorporated into versatile multi-domain proteins or protein complexes and specifically target viral nucleic acids via base complementarity. CRISPR/Cas interference machines are utilized to develop novel genome editing tools for different organisms. Here, we will review the latest progress in the elucidation and application of prokaryotic CRISPR/Cas systems and discuss possible future approaches to exploit the potential of these interference machineries. PMID:23857052

  6. Exploiting existing software in libraries : successes, failures, and reasons why.

    Energy Technology Data Exchange (ETDEWEB)

    Gropp, W.

    1999-01-13

    The PETSc (Portable Extensible Tools for Scientific computing) library arose from research into domain decomposition methods which require combining many different solutions in a single application. The initial efforts tried to use existing numerical software but had limited success. The problems include everything from faulty assumptions about the computing environment (e.g., how many processes there are) to implicit (yet deadly) global state. More recently, PETSC and PVODE have found a way to cooperate, and new techniques that exploit dynamically linked libraries offer a more general approach to interoperable components. The paper highlights some of the issues in building sharable component software and discussing mistakes still often made in designing, maintaining, documenting, and testing components.

  7. Analysis of ecological environment impact of coal exploitation and utilization

    Science.gov (United States)

    Zhang, Baoliu; Luo, Hong; Lv, Lianhong; Wang, Jian; Zhang, Baoshi

    2018-02-01

    Based on the theory of life cycle assessment, the ecological and environmental impacts of coal mining, processing, utilization and transportation will be analyzed, with analysing the status of china’s coal exploitation and utilization as the basis, it will find out the ecological and environmental impact in the development and utilization of coal, mainly consist of ecological impact including land damage, water resource destructionand biodiversity loss, etc., while the environmental impact include air, water, solid waste pollutions. Finally with a summary of the ecological and environmental problems, to propose solutionsand countermeasures to promote the rational development and consumption of coal, as well as to reduce the impact of coal production and consumption on the ecological environment, finally to achieve the coordinated development of energy and the environment.

  8. ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES

    Directory of Open Access Journals (Sweden)

    Himanshu Shewale

    2014-03-01

    Full Text Available Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

  9. Mangrove exploitation effects on biodiversity and ecosystem services

    DEFF Research Database (Denmark)

    Malik, Abdul; Fensholt, Rasmus; Mertz, Ole

    2015-01-01

    Mangrove forests are one of the most important coastal ecosystems as they support many local communities. However, over the last two decades harvesting of mangrove forests has been extensive with effects on mangrove biodiversity and ecosystem services. We investigate the effect of mangrove...... with local forestry and fishery workers to determine the level of exploitation. Ten mangrove species were recorded (Avicennia alba, Bruguiera gymnorrhiza, Ceriops tagal, Excoecaria agallocha, Lumnitzera racemosa, Nypa fruticans, Rhizophora apiculata, Rhizophora mucronata, Rhizophora stylosa, and Sonneratia...... alba) belonging to six families (Avicenniaceae, Rhizophoraceae, Euphorbiaceae, Combretaceae, Arecaceae and Sonneratiaceae). Mangrove forests are now dominated by saplings and seedlings, with few trees above 15 cm diameter at breast height. Rhizophora sp. were found to be the most important and dominant...

  10. Exploiting CRISPR-Cas to manipulate Enterococcus faecalis populations.

    Science.gov (United States)

    Hullahalli, Karthik; Rodrigues, Marinelle; Palmer, Kelli L

    2017-06-23

    CRISPR-Cas provides a barrier to horizontal gene transfer in prokaryotes. It was previously observed that functional CRISPR-Cas systems are absent from multidrug-resistant (MDR) Enterococcus faecalis , which only possess an orphan CRISPR locus, termed CRISPR2, lacking cas genes. Here, we investigate how the interplay between CRISPR-Cas genome defense and antibiotic selection for mobile genetic elements shapes in vitro E. faecalis populations. We demonstrate that CRISPR2 can be reactivated for genome defense in MDR strains. Interestingly, we observe that E. faecalis transiently maintains CRISPR targets despite active CRISPR-Cas systems. Subsequently, if selection for the CRISPR target is present, toxic CRISPR spacers are lost over time, while in the absence of selection, CRISPR targets are lost over time. We find that forced maintenance of CRISPR targets induces a fitness cost that can be exploited to alter heterogeneous E. faecalis populations.

  11. Television production, Funding Models and Exploitation of Content

    Directory of Open Access Journals (Sweden)

    Gillian Doyle

    2016-07-01

    Full Text Available The rise of digital platforms has transformative implications for strategies of financing media production and for exploitation of the economic value in creative content. In the television industry, changes in technologies for distribution and the emergence of SVOD services such as Netflix are gradually shifting audiences and financial power away from broadcasters while at the same time creating unprecedented opportunities for programme-makers.  Drawing on findings from recent RCUK-funded research, this article examines how these shifts are affecting production financing and the economics of supplying television content.  In particular, it focuses on how changes in the dynamics of rights markets and in strategic approaches towards the financing of television production might mean for markets, industries and for policies intended to support the economic sustainability of independent television content production businesses.

  12. Exploitation and Benefits of BIM in Construction Project Management

    Science.gov (United States)

    Mesároš, Peter; Mandičák, Tomáš

    2017-10-01

    BIM is increasingly getting into the awareness in construction industry. BIM is the process of creating and data managing of the building during its life cycle. BIM became a part of management tools in modern construction companies. Construction projects have a number of participants. It means difficulty process of construction project management and a serious requirement for processing the huge amount of information including design, construction, time and cost parameters, economic efficiency and sustainability. Progressive information and communication technologies support cost management and management of construction project. One of them is Building Information Modelling. Aim of the paper is to examine the impact of BIM exploitation and benefits on construction project management in Slovak companies.

  13. Sensor Exposure, Exploitation, and Experimentation Environment (SE4)

    Science.gov (United States)

    Buell, D.; Duff, F.; Goding, J.; Bankston, M.; McLaughlin, T.; Six, S.; Taylor, S.; Wootton, S.

    2011-09-01

    As the resident space object population increases from new launches and events such as the COSMOS/IRIDIUM collision, the maintenance of high-level Space Situational Awareness (SSA) has become increasingly difficult. To maintain situational awareness of the changing environment, new systems and methods must be developed. The Sensor Exposure, Exploitation and Experimentation Environment (SE4) provides a platform to illustrate “The Art of the Possible” that shows the potential benefit of enriched sensor data collections and real-time data sharing. Through modeling and simulation, and a net-centric architecture, SE4 shows the added value of sharing data in real-time and exposing new types of sensor data. The objective of SE4 is to develop an experimentation and innovation environment for sensor data exposure, composable sensor capabilities, reuse, and exploitation that accelerates the delivery of needed Command and Control, Intelligence, Surveillance, and Reconnaissance capabilities to the warfighter. Through modeling, simulation and rapid prototyping, the art of the possible for a fully-connected, net-centric space Command and Control (C2) and sensor enterprise can be demonstrated. This paper provides results that demonstrate the potential for faster cataloging of breakup events and additional event monitoring that are possible with data available today in the Space Surveillance Network (SSN). Demonstrating the art of the possible for the enterprise will guide net-centric requirements definition and facilitate discussions with stakeholder organizations on the Concept of Operations (CONOPS), policy, and Tactics, Techniques, and Procedures (TTP) evolution necessary to take full advantage of net-centric operations. SE4 aligns with direction from Secretary Gates and the Chairman Joint Chief of Staff that emphasizes the need to get the most out of our existing systems. Continuing to utilize SE4 will enable the enterprise by demonstrating the benefits of applying

  14. Detect and exploit hidden structure in fatty acid signature data

    Science.gov (United States)

    Budge, Suzanne; Bromaghin, Jeffrey; Thiemann, Gregory

    2017-01-01

    Estimates of predator diet composition are essential to our understanding of their ecology. Although several methods of estimating diet are practiced, methods based on biomarkers have become increasingly common. Quantitative fatty acid signature analysis (QFASA) is a popular method that continues to be refined and extended. Quantitative fatty acid signature analysis is based on differences in the signatures of prey types, often species, which are recognized and designated by investigators. Similarly, predator signatures may be structured by known factors such as sex or age class, and the season or region of sample collection. The recognized structure in signature data inherently influences QFASA results in important and typically beneficial ways. However, predator and prey signatures may contain additional, hidden structure that investigators either choose not to incorporate into an analysis or of which they are unaware, being caused by unknown ecological mechanisms. Hidden structure also influences QFASA results, most often negatively. We developed a new method to explore signature data for hidden structure, called divisive magnetic clustering (DIMAC). Our DIMAC approach is based on the same distance measure used in diet estimation, closely linking methods of data exploration and parameter estimation, and it does not require data transformation or distributional assumptions, as do many multivariate ordination methods in common use. We investigated the potential benefits of the DIMAC method to detect and subsequently exploit hidden structure in signature data using two prey signature libraries with quite different characteristics. We found that the existence of hidden structure in prey signatures can increase the confusion between prey types and thereby reduce the accuracy and precision of QFASA diet estimates. Conversely, the detection and exploitation of hidden structure represent a potential opportunity to improve predator diet estimates and may lead to new

  15. Automated motion imagery exploitation for surveillance and reconnaissance

    Science.gov (United States)

    Se, Stephen; Laliberte, France; Kotamraju, Vinay; Dutkiewicz, Melanie

    2012-06-01

    Airborne surveillance and reconnaissance are essential for many military missions. Such capabilities are critical for troop protection, situational awareness, mission planning and others, such as post-operation analysis / damage assessment. Motion imagery gathered from both manned and unmanned platforms provides surveillance and reconnaissance information that can be used for pre- and post-operation analysis, but these sensors can gather large amounts of video data. It is extremely labour-intensive for operators to analyse hours of collected data without the aid of automated tools. At MDA Systems Ltd. (MDA), we have previously developed a suite of automated video exploitation tools that can process airborne video, including mosaicking, change detection and 3D reconstruction, within a GIS framework. The mosaicking tool produces a geo-referenced 2D map from the sequence of video frames. The change detection tool identifies differences between two repeat-pass videos taken of the same terrain. The 3D reconstruction tool creates calibrated geo-referenced photo-realistic 3D models. The key objectives of the on-going project are to improve the robustness, accuracy and speed of these tools, and make them more user-friendly to operational users. Robustness and accuracy are essential to provide actionable intelligence, surveillance and reconnaissance information. Speed is important to reduce operator time on data analysis. We are porting some processor-intensive algorithms to run on a Graphics Processing Unit (GPU) in order to improve throughput. Many aspects of video processing are highly parallel and well-suited for optimization on GPUs, which are now commonly available on computers. Moreover, we are extending the tools to handle video data from various airborne platforms and developing the interface to the Coalition Shared Database (CSD). The CSD server enables the dissemination and storage of data from different sensors among NATO countries. The CSD interface allows

  16. Nontrilocality: Exploiting nonlocality from three-particle systems

    Science.gov (United States)

    Mukherjee, Kaushiki; Paul, Biswajit; Sarkar, Debasis

    2017-08-01

    Branciard et al. [Phys. Rev. Lett. 104, 170401 (2010), 10.1103/PhysRevLett.104.170401] first characterized the correlations arising in an entanglement swapping network under the assumption that the sources generating the initially uncorrelated quantum systems are independent. Precisely speaking, Branciard et al. [Phys. Rev. Lett. 104, 170401 (2010), 10.1103/PhysRevLett.104.170401 and later in Phys. Rev. A 85, 032119 (2012), 10.1103/PhysRevA.85.032119] analyzed the importance of bilocal (source independence) assumption to lower the restrictions over correlations for revealing quantumness in the network where each of two sources generates a bipartite entangled state. In this context, one may find interest to characterize correlations in a network involving independent sources which can correlate more than two initially uncorrelated multipartite entangled quantum systems. Our present topic of discussion basically analyzes such a network scenario. Specifically, we introduce a trilocal network scenario where each of three sources independently generates a tripartite entangled quantum system, thereby exploring the role of source independence assumption to exploit nonlocality in a network involving multipartite entanglement analogous to bilocal assumption in a network where only bipartite entanglement was considered. Interestingly, genuine entanglement content did not turn out to be an essential requirement for exploiting nonlocality in such a scenario. Moreover, it is interesting to explore whether such a scenario can be generalized so as to characterize correlations arising in a network involving n number of n -partite systems for any finite value of n ≥4 under source independence assumption.

  17. Toward a dynamic perspective on explorative and exploitative innovation activities: a longitudinal study of innovation in the wind blade industry

    NARCIS (Netherlands)

    de Visser, Matthias

    2010-01-01

    Innovation requires a combination of explorative and exploitative innovation activities. Previous studies have provided valuable insights in the antecedents of investing in explorative and exploitative activities, the structural governance of exploration and exploitation and the performance

  18. Toward a dynamic perspective on explorative and exploitative innovation activities: A longitudinal study of innovation in the wind blade industry

    NARCIS (Netherlands)

    de Visser, Matthias; Faems, D.L.M.

    2010-01-01

    Innovation requires a combination of explorative and exploitative innovation activities. Previous studies have provided valuable insights in the antecedents of investing in explorative and exploitative activities, the structural governance of exploration and exploitation and the performance

  19. Analytical caustic surfaces

    Science.gov (United States)

    Schmidt, R. F.

    1987-01-01

    This document discusses the determination of caustic surfaces in terms of rays, reflectors, and wavefronts. Analytical caustics are obtained as a family of lines, a set of points, and several types of equations for geometries encountered in optics and microwave applications. Standard methods of differential geometry are applied under different approaches: directly to reflector surfaces, and alternatively, to wavefronts, to obtain analytical caustics of two sheets or branches. Gauss/Seidel aberrations are introduced into the wavefront approach, forcing the retention of all three coefficients of both the first- and the second-fundamental forms of differential geometry. An existing method for obtaining caustic surfaces through exploitation of the singularities in flux density is examined, and several constant-intensity contour maps are developed using only the intrinsic Gaussian, mean, and normal curvatures of the reflector. Numerous references are provided for extending the material of the present document to the morphologies of caustics and their associated diffraction patterns.

  20. Rare earth elements exploitation, geopolitical implications and raw materials trading

    Science.gov (United States)

    Chemin, Marie-Charlotte

    2015-04-01

    Rare earth elements (REE) correspond to seventeen elements of the periodic table. They are used in high technology, cracking, electric cars' magnet, metal alloy for batteries, and also in phone construction or ceramics for electronic card. REEs are an important resource for high technology. This project targets 16 years old students in the subject "personalized aid" and will last six weeks. The purpose of this project is to develop autonomy and research in groups for a transdisciplinary work. This project gathers knowledge in geology, geography and economics. During the first session students analyze the geology applications of the REE. They begin the analysis with learning the composition in different rocks such as basalt and diorite to make the link with crystallization. Then they compare it with adakite to understand the formation of these rocks. In the second session, they study REE exploitation. We can find them as oxides in many deposits. The principal concentrations of rare earth elements are associated with uncommon varieties of igneous rocks, such as carbonatites. They can use Qgis, to localize this high concentration. In the third session, they study the environmental costs of REE exploitation. Indeed, the exploitation produces thorium and carcinogenic toxins: sulphates, ammonia and hydrochloric acid. Processing one ton of rare earths produces 2,000 tons of toxic waste. This session focuses, first, on Baotou's region, and then on an example they are free to choose. In the fourth session, they study the geopolitical issues of REE with a focus on China. In fact this country is the largest producer of REE, and is providing 95% of the overall production. REE in China are at the center of a geopolitical strategy. In fact, China implements a sort of protectionism. Indeed, the export tax on REE is very high so, as a foreign company, it is financially attractive to establish a manufacturing subsidiary in China in order to use REE. As a matter of fact

  1. The Surveillance and On-demand Sentinel-1 SBAS Services on the Geohazards Exploitation Platforms

    Science.gov (United States)

    Casu, F.; de Luca, C.; Zinno, I.; Manunta, M.; Lanari, R.

    2017-12-01

    The Geohazards Exploitation Platform (GEP) is an ESA R&D activity of the EO ground segment to demonstrate the benefit of new technologies for large scale processing of EO data. GEP aims at providing on-demand processing services for specific user needs, as well as systematic processing services to address the need of the geohazards community for common information layers and, finally, to integrate newly developed processors for scientists and other expert users. In this context, a crucial role is played by the recently launched Sentinel-1 (S1) constellation that, with its global acquisition policy, has flooded the scientific community with a huge amount of data acquired over large part of the Earth on a regular basis (down to 6-days with both Sentinel-1A and 1B passes). The Sentinel-1 data, as part of the European Copernicus program, are openly and freely accessible, thus fostering their use for the development of automated and systematic tools for Earth surface monitoring. In particular, due to their specific SAR Interferometry (InSAR) design, Sentinel-1 satellites can be exploited to build up operational services for the easy and rapid generation of advanced InSAR products useful for risk management and natural hazard monitoring. In this work we present the activities carried out for the development, integration, and deployment of two SBAS Sentinel-1 services of CNR-IREA within the GEP framework, namely the Surveillance and On-demand services. The Surveillance service consists on the systematic and automatic processing of Sentinel-1 data over selected Areas of Interest (AoI) to generate updated surface displacement time series via the SBAS-InSAR algorithm. We built up a system that is automatically triggered by every new Sentinel-1 acquisition over the AoI, once it is available on the S1 catalogue. Then, the system processes the new acquisitions only, thus saving storage space and computing time. The processing, which relies on the Parallel version of the SBAS (P

  2. Analysis of energetic exploitation of straw in Vojvodina

    International Nuclear Information System (INIS)

    Dodic, Sinisa N.; Dodic, Jelena M.; Popov, Stevan D.; Zekic, Vladislav N.; Rodic, Vesna O.; Tica, Nedeljko Lj.

    2011-01-01

    The Autonomous Province of Vojvodina is an autonomous province in the Republic of Serbia. It is located in the northern part of the country, in the Pannonia plain. Vojvodina is an energy-deficient province. The average yearly quantity of the cellulose wastes in Vojvodina amounts to about 9 millions tons barely in the agriculture, and the same potential on the level of Serbia estimates to almost 13 million tons. This study gives the analysis of energetic exploitation of straws from stubble cereals processed in different forms. Costs for the equipment that uses biomass in the EU are approximately two times higher with respect to those for the equipment for combustion of natural gas or of fuel oil. Costs of investments for combustion of biomass in Vojvodina if compared with the cited data are approximately for 40-50% lower. The difference of the investment costs for the construction of such units is because units for straw combustion designed and constructed in our country, have neither the complicated devices for manipulation of fuels, nor the devices for the waste gasses processing. The definite conclusions about the economic justification of the energetic exploitation of stubble straws can be obtained only by comparison of costs of the so obtained energy, with the costs of energy obtained through the combustion of classical fuels. Previous comparisons were the most often based on the comparisons of value of prices of the equivalent straw quantity with the process of fuel oil of other classical fuels. Such the comparisons leaded to the very positive evaluations of the economical effects of straws, without taking into account the realizability of the named method. Namely, comparisons of straw and fuel oil hardly could lead to the conclusion that these two fuels are mutually substitutable. According to its physical properties, straw is most similar to firewood, but the preciousness and lacking of this the very resource excludes it from the comparative analysis, so

  3. Exploiting optical near fields for phase change memories

    OpenAIRE

    Leiprecht, P.; Kühler, P.; Longo, M.; Leiderer, P.; Afonso, Carmen N.; Siegel, Jan

    2011-01-01

    We apply a recently developed technique based on optical near fields to achieve reversible phase switching in Ge2 Sb2 Te 5 films. By placing dielectric microspheres at the film surface and exposing them to pulsed laser light, a complex intensity distribution due to the optical near field can be created at the film surface. We demonstrate writing and erasing operations of patterns through phase switching. Spheres can be removed after an operation by optical near fields without ablation. Data e...

  4. Phylloremediation of Air Pollutants: Exploiting the Potential of Plant Leaves and Leaf-Associated Microbes

    Directory of Open Access Journals (Sweden)

    Xiangying Wei

    2017-07-01

    Full Text Available Air pollution is air contaminated by anthropogenic or naturally occurring substances in high concentrations for a prolonged time, resulting in adverse effects on human comfort and health as well as on ecosystems. Major air pollutants include particulate matters (PMs, ground-level ozone (O3, sulfur dioxide (SO2, nitrogen dioxides (NO2, and volatile organic compounds (VOCs. During the last three decades, air has become increasingly polluted in countries like China and India due to rapid economic growth accompanied by increased energy consumption. Various policies, regulations, and technologies have been brought together for remediation of air pollution, but the air still remains polluted. In this review, we direct attention to bioremediation of air pollutants by exploiting the potentials of plant leaves and leaf-associated microbes. The aerial surfaces of plants, particularly leaves, are estimated to sum up to 4 × 108 km2 on the earth and are also home for up to 1026 bacterial cells. Plant leaves are able to adsorb or absorb air pollutants, and habituated microbes on leaf surface and in leaves (endophytes are reported to be able to biodegrade or transform pollutants into less or nontoxic molecules, but their potentials for air remediation has been largely unexplored. With advances in omics technologies, molecular mechanisms underlying plant leaves and leaf associated microbes in reduction of air pollutants will be deeply examined, which will provide theoretical bases for developing leaf-based remediation technologies or phylloremediation for mitigating pollutants in the air.

  5. The possibility of increasing the efficiency of accessible coal deposits by optimizing dimensions of protective pillars or the scope of exploitation

    Science.gov (United States)

    Bańka, Piotr; Badura, Henryk; Wesołowski, Marek

    2017-11-01

    One of the ways to protect objects exposed to the influences of mining exploitation is establishing protective pillars for them. Properly determined pillar provides effective protection of the object for which it was established. Determining correct dimensions of a pillar requires taking into account contradictory requirements. Protection measures against the excessive influences of mining exploitation require designing the largest possible pillars, whereas economic requirements suggest a maximum reduction of the size of resources left in the pillar. This paper presents algorithms and programs developed for determining optimal dimensions of protective pillars for surface objects and shafts. The issue of designing a protective pillar was treated as a nonlinear programming task. The objective function are the resources left in a pillar while nonlinear limitations are the deformation values evoked by the mining exploitation. Resources in the pillar may be weighted e.g. by calorific value or by the inverse of output costs. The possibility of designing pillars of any polygon shape was taken into account. Because of the applied exploitation technologies the rectangular pillar shape should be considered more advantageous than the oval one, though it does not ensure the minimization of resources left in a pillar. In this article there is also presented a different approach to the design of protective pillars, which instead of fixing the pillar boundaries in subsequent seams, the length of longwall panels of the designed mining exploitation is limited in a way that ensures the effective protection of an object while maximizing the extraction ratio of the deposit.

  6. IN A PARALLEL UNIVERSE: HOW ART EXPLOITS TECHNOLOGY

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Technical innovation in the arts creates new opportunities for perceptual shifts that lead to lasting achievements. One of the most important events took place in the 15th century not far from CERN on the other side of the Alps in Venice. Titian, in one life time, exploited these new material developments to expand the range of expression like no other artist of his generation. Titian was able to harness these new innovations to emerge as the supreme competitor and hustler, a notion that seems very much a part of the modern promotion of art as exemplified by Warhol , Jeff Koons and Damian Hirst. The language of science and technology has created social networks, changed the mediums and the subject of fine art. Fast forward to CERN 2012, the most expensive experiment in the history of science. The knowledge of dark matter will either help confirm, or not, the Standard Model. This information will be part of what Michel Foucault calls "epistemological breaks", shifts in consciousness that change our p...

  7. Child sexual abuse and exploitation-A global glimpse.

    Science.gov (United States)

    Dubowitz, Howard

    2017-04-01

    The view of what constitutes child abuse and neglect is dependent on the laws, cultural context, local thresholds and the availability. Since 1982, the International Society for the Prevention of Child Abuse and Neglect (ISPCAN) has conducted surveillance of child maltreatment and child protection every two years, published in World Perspectives on Child Abuse. It is hoped that up to date information will inform the development of laws, policies and programs to better address child abuse and neglect. This article is based on data on child sexual abuse and exploitation from 73 countries gathered online in 2015-16 for the 12 edition of World Perspectives. Respondents were key informants who were knowledgeable professionals in the child protection field. They were encouraged to consult with colleagues so as to provide accurate information. Countries were grouped into different regions of the world and into income level categories. The findings focus on definitions of abuse and neglect, laws, policies and programs to address and prevent maltreatment and barriers to prevention. It is evident that there is considerable variability across regions and country income categories, and that programs and services need to be considerably strengthened, even in high income countries. Copyright © 2017. Published by Elsevier Ltd.

  8. Commercial imagery archive, management, exploitation, and distribution product development

    Science.gov (United States)

    Hollinger, Bruce; Sakkas, Alysa

    1999-12-01

    The Lockheed Martin (LM) team had garnered over a decade of operational experience on the U.S. Government's IDEX II (Imagery Dissemination and Exploitation) system. Recently, it set out to create a new commercial product to serve the needs of large-scale imagery archiving and analysis markets worldwide. LM decided to provide a turnkey commercial solution to receive, store, retrieve, process, analyze and disseminate in 'push' or 'pull' modes imagery, data and data products using a variety of sources and formats. LM selected 'best of breed' hardware and software components and adapted and developed its own algorithms to provide added functionality not commercially available elsewhere. The resultant product, Intelligent Library System (ILS)TM, satisfies requirements for (a) a potentially unbounded, data archive (5000 TB range) (b) automated workflow management for increased user productivity; (c) automatic tracking and management of files stored on shelves; (d) ability to ingest, process and disseminate data volumes with bandwidths ranging up to multi- gigabit per second; (e) access through a thin client-to-server network environment; (f) multiple interactive users needing retrieval of files in seconds from both archived images or in real time, and (g) scalability that maintains information throughput performance as the size of the digital library grows.

  9. Commercial imagery archive, management, exploitation, and distribution project development

    Science.gov (United States)

    Hollinger, Bruce; Sakkas, Alysa

    1999-10-01

    The Lockheed Martin (LM) team had garnered over a decade of operational experience on the U.S. Government's IDEX II (Imagery Dissemination and Exploitation) system. Recently, it set out to create a new commercial product to serve the needs of large-scale imagery archiving and analysis markets worldwide. LM decided to provide a turnkey commercial solution to receive, store, retrieve, process, analyze and disseminate in 'push' or 'pull' modes imagery, data and data products using a variety of sources and formats. LM selected 'best of breed' hardware and software components and adapted and developed its own algorithms to provide added functionality not commercially available elsewhere. The resultant product, Intelligent Library System (ILS)TM, satisfies requirements for (1) a potentially unbounded, data archive (5000 TB range) (2) automated workflow management for increased user productivity; (3) automatic tracking and management of files stored on shelves; (4) ability to ingest, process and disseminate data volumes with bandwidths ranging up to multi- gigabit per second; (5) access through a thin client-to-server network environment; (6) multiple interactive users needing retrieval of files in seconds from both archived images or in real time, and (7) scalability that maintains information throughput performance as the size of the digital library grows.

  10. Augmented reality enabling intelligence exploitation at the edge

    Science.gov (United States)

    Kase, Sue E.; Roy, Heather; Bowman, Elizabeth K.; Patton, Debra

    2015-05-01

    Today's Warfighters need to make quick decisions while interacting in densely populated environments comprised of friendly, hostile, and neutral host nation locals. However, there is a gap in the real-time processing of big data streams for edge intelligence. We introduce a big data processing pipeline called ARTEA that ingests, monitors, and performs a variety of analytics including noise reduction, pattern identification, and trend and event detection in the context of an area of operations (AOR). Results of the analytics are presented to the Soldier via an augmented reality (AR) device Google Glass (Glass). Non-intrusive AR devices such as Glass can visually communicate contextually relevant alerts to the Soldier based on the current mission objectives, time, location, and observed or sensed activities. This real-time processing and AR presentation approach to knowledge discovery flattens the intelligence hierarchy enabling the edge Soldier to act as a vital and active participant in the analysis process. We report preliminary observations testing ARTEA and Glass in a document exploitation and person of interest scenario simulating edge Soldier participation in the intelligence process in disconnected deployment conditions.

  11. Efficient Resource Scheduling by Exploiting Relay Cache for Cellular Networks

    Directory of Open Access Journals (Sweden)

    Chun He

    2015-01-01

    Full Text Available In relay-enhanced cellular systems, throughput of User Equipment (UE is constrained by the bottleneck of the two-hop link, backhaul link (or the first hop link, and access link (the second hop link. To maximize the throughput, resource allocation should be coordinated between these two hops. A common resource scheduling algorithm, Adaptive Distributed Proportional Fair, only ensures that the throughput of the first hop is greater than or equal to that of the second hop. But it cannot guarantee a good balance of the throughput and fairness between the two hops. In this paper, we propose a Two-Hop Balanced Distributed Scheduling (TBS algorithm by exploiting relay cache for non-real-time data traffic. The evolved Node Basestation (eNB adaptively adjusts the number of Resource Blocks (RBs allocated to the backhaul link and direct links based on the cache information of relays. Each relay allocates RBs for relay UEs based on the size of the relay UE’s Transport Block. We also design a relay UE’s ACK feedback mechanism to update the data at relay cache. Simulation results show that the proposed TBS can effectively improve resource utilization and achieve a good trade-off between system throughput and fairness by balancing the throughput of backhaul and access link.

  12. Exploitation of parallelism in climate models. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Baer, Ferdinand; Tribbia, Joseph J.; Williamson, David L.

    2001-02-05

    This final report includes details on the research accomplished by the grant entitled 'Exploitation of Parallelism in Climate Models' to the University of Maryland. The purpose of the grant was to shed light on (a) how to reconfigure the atmospheric prediction equations such that the time iteration process could be compressed by use of MPP architecture; (b) how to develop local subgrid scale models which can provide time and space dependent parameterization for a state-of-the-art climate model to minimize the scale resolution necessary for a climate model, and to utilize MPP capability to simultaneously integrate those subgrid models and their statistics; and (c) how to capitalize on the MPP architecture to study the inherent ensemble nature of the climate problem. In the process of addressing these issues, we created parallel algorithms with spectral accuracy; we developed a process for concurrent climate simulations; we established suitable model reconstructions to speed up computation; we identified and tested optimum realization statistics; we undertook a number of parameterization studies to better understand model physics; and we studied the impact of subgrid scale motions and their parameterization in atmospheric models.

  13. Fit for purpose quality management system for military forensic exploitation.

    Science.gov (United States)

    Wilson, Lauren Elizabeth; Gahan, Michelle Elizabeth; Robertson, James; Lennard, Chris

    2018-03-01

    In a previous publication we described a systems approach to forensic science applied in the military domain. The forensic science 'system of systems' describes forensic science as a sub-system in the larger criminal justice, law enforcement, intelligence, and military systems, with quality management being an important supporting system. Quality management systems help to ensure that organisations achieve their objective and continually improve their capability. Components of forensic science quality management systems can include standardisation of processes, accreditation of facilities to national/international standards, and certification of personnel. A fit for purpose quality management system should be balanced to allow organisations to meet objectives, provide continuous improvement; mitigate risk; and impart a positive quality culture. Considerable attention over the last decades has been given to the need for forensic science quality management systems to meet criminal justice and law enforcement objectives. More recently, the need for the forensic quality management systems to meet forensic intelligence objectives has been considered. This paper, for the first time, discusses the need for a fit for purpose quality management system for military forensic exploitation. Crown Copyright © 2018. Published by Elsevier B.V. All rights reserved.

  14. Exploiting budding yeast natural variation for industrial processes.

    Science.gov (United States)

    Cubillos, Francisco A

    2016-11-01

    For the last two decades, the natural variation of the yeast Saccharomyces cerevisiae has been massively exploited with the aim of understanding ecological and evolutionary processes. As a result, many new genetic variants have been uncovered, providing a large catalogue of alleles underlying complex traits. These alleles represent a rich genetic resource with the potential to provide new strains that can cope with the growing demands of industrial fermentation processes. When surveyed in detail, several of these variants have proven useful in wine and beer industries by improving nitrogen utilisation, fermentation kinetics, ethanol production, sulphite resistance and aroma production. Here, I illustrate how allele-specific expression and polymorphisms within the coding region of GDB1 underlie fermentation kinetic differences in synthetic wine must. Nevertheless, the genetic basis of how GDB1 variants and other natural alleles interact in foreign genetic backgrounds remains unclear. Further studies in large sets of strains, recombinant hybrids and multiple parental pairs will broaden our knowledge of the molecular and genetic basis of trait adaptation for utilisation in applied and industrial processes.

  15. Bacterial multidrug efflux pumps: mechanisms, physiology and pharmacological exploitations.

    Science.gov (United States)

    Sun, Jingjing; Deng, Ziqing; Yan, Aixin

    2014-10-17

    Multidrug resistance (MDR) refers to the capability of bacterial pathogens to withstand lethal doses of structurally diverse drugs which are capable of eradicating non-resistant strains. MDR has been identified as a major threat to the public health of human being by the World Health Organization (WHO). Among the four general mechanisms that cause antibiotic resistance including target alteration, drug inactivation, decreased permeability and increased efflux, drug extrusion by the multidrug efflux pumps serves as an important mechanism of MDR. Efflux pumps not only can expel a broad range of antibiotics owing to their poly-substrate specificity, but also drive the acquisition of additional resistance mechanisms by lowering intracellular antibiotic concentration and promoting mutation accumulation. Over-expression of multidrug efflux pumps have been increasingly found to be associated with clinically relevant drug resistance. On the other hand, accumulating evidence has suggested that efflux pumps also have physiological functions in bacteria and their expression is subject tight regulation in response to various of environmental and physiological signals. A comprehensive understanding of the mechanisms of drug extrusion, and regulation and physiological functions of efflux pumps is essential for the development of anti-resistance interventions. In this review, we summarize the development of these research areas in the recent decades and present the pharmacological exploitation of efflux pump inhibitors as a promising anti-drug resistance intervention. Copyright © 2014 The Authors. Published by Elsevier Inc. All rights reserved.

  16. Cosimulation of electromagnetics-circuit systems exploiting DGTD and MNA

    KAUST Repository

    Li, Ping

    2014-06-01

    A hybrid electromagnetics (EM)-circuit simulator exploiting the discontinuous Galerkin time domain (DGTD) method and the modified nodal analysis (MNA) algorithm is developed for analyzing hybrid distributive and nonlinear multiport lumped circuit systems. The computational domain is split into two subsystems. One is the EM subsystem that is analyzed by DGTD, while the other is the circuit subsystem that is solved by the MNA method. The coupling between the EM and circuit subsystems is enforced at the lumped port where related field and circuit unknowns are coupled via the use of numerical flux, port voltages, and current sources. Since the spatial operations of DGTD are localized, thanks to the use of numerical flux, coupling matrices between EM and circuit subsystems are small and are directly inverted. To handle nonlinear devices within the circuit subsystem, the standard Newton-Raphson method is applied to the nonlinear coupling matrix system. In addition, a local time-stepping scheme is applied to improve the efficiency of the hybrid solver. Numerical examples including single and multiport linear/nonlinear circuit networks are presented to validate the proposed solver. © 2014 IEEE.

  17. Nuclear techniques in the prospecting and exploitation of petroleum

    International Nuclear Information System (INIS)

    Balcazar, M.; Lopez, A.; Castellanos, J.P.

    2003-01-01

    The apatite is a mineral that is found in the perforation nucleus of petroleum exploration whose natural content of Uranium is of around 10 ppm. This uranium is spontaneously fissioned producing fission traces whose number it is proportional to the age of the apatite and whose longitudes remained stable to temperatures smaller than 60 C, they decreased partially in the temperature range of 60 to 120 C and they faded totally if the nucleus of perforation was to temperatures bigger than 120 C. This agreement in the call 'thermal formation window' of the petroleum among 60 and 120 C and the partial erased of the longitudes of fission traces in the apatite, it allows to use this to determine not only the age of the petroleum field, but also their geologic thermal history (paleo temperature), it also allows to model the formation of the petroleum field and to contribute to outline to PEMEX on exploitation and exploration strategies. In this work it is presented: the visualization of the fission traces in the apatite of Cerro de Mercado, Durango, considered as an international standard of dating; the basic principles of this nuclear technique that allow to determine the age of the apatite; the formation of horizontal fission traces inside the apatite, by irradiation with fission fragments; and as the analysis of the thermal instability of the lengths of the fission traces it provides information of the paleo temperature of the petroleum basin. (Author)

  18. The business of exploiting induced pluripotent stem cells.

    Science.gov (United States)

    Prescott, Catherine

    2011-08-12

    Induced pluripotent stem cells (iPS cells) can be exploited for both research and clinical applications. The first part of this review seeks to provide an understanding of the financial drivers and key elements of a successful business strategy that underpin a company focused on developing iPS-related products and services targeted at the research market. The latter part of the review highlights some of the reasons as to why the reprogramming of somatic cells is currently being used to develop cell-based models to screen for small molecules with drug-like properties rather than to develop cell-based regenerative medicines per se. The latter may be used to repair or replace a patient's damaged cells and thereby have the potential to 'cure' a disease and, in doing so, prevent or delay the onset of associated medical conditions. However, the cost of an expensive regenerative medicine and time to accrue any benefit linked to a decrease in co-morbidity expenditure may not outweigh the benefit for a healthcare community that has finite resources. The implications of this are discussed together with evidence that the UK National Institute for Health and Clinical Excellence (NICE) and the National Health Service (NHS) have established a precedent for a cost-sharing strategy with the pharmaceutical industry.

  19. Exploitation réseau électrique Bilan 2000

    CERN Document Server

    Cumer, G

    2001-01-01

    Ce document présente le bilan annuel d'exploitation du réseau électrique pour l'année 2000. Après une présentation succincte des nouvelles sous-stations et équipements mis en service cette année, ce bilan est proposé au travers des statistiques des pannes et des demandes d'interventions des salles de contrôles PCR, MCR et PCR. Cette année 2000 aura été marquée par quelques pannes majeures ayant affecté le LEP et le SPS. L'analyse de ces incidents en fait apparaître les causes d'origines techniques, humaines ou extérieures au CERN, détaille les catégories d'équipements concernés. Ces données permettent de souligner l'impact et les conséquences lourdes de la moindre coupure électrique sur le fonctionnement des accélérateurs. Elles permettent d'autre part de mettre en lumière les points faibles actuels que sont les contrôleurs Micène, les câbles et les protections 18 kV SPS. Dans ce contexte et au vu des incidents de ces dernières années, un historique des pannes survenues sur les...

  20. CellSs: Scheduling Techniques to Better Exploit Memory Hierarchy

    Directory of Open Access Journals (Sweden)

    Pieter Bellens

    2009-01-01

    Full Text Available Cell Superscalar's (CellSs main goal is to provide a simple, flexible and easy programming approach for the Cell Broadband Engine (Cell/B.E. that automatically exploits the inherent concurrency of the applications at a task level. The CellSs environment is based on a source-to-source compiler that translates annotated C or Fortran code and a runtime library tailored for the Cell/B.E. that takes care of the concurrent execution of the application. The first efforts for task scheduling in CellSs derived from very simple heuristics. This paper presents new scheduling techniques that have been developed for CellSs for the purpose of improving an application's performance. Additionally, the design of a new scheduling algorithm is detailed and the algorithm evaluated. The CellSs scheduler takes an extension of the memory hierarchy for Cell/B.E. into account, with a cache memory shared between the SPEs. All new scheduling practices have been evaluated showing better behavior of our system.

  1. Compressed Sensing MR Image Reconstruction Exploiting TGV and Wavelet Sparsity

    Directory of Open Access Journals (Sweden)

    Di Zhao

    2014-01-01

    Full Text Available Compressed sensing (CS based methods make it possible to reconstruct magnetic resonance (MR images from undersampled measurements, which is known as CS-MRI. The reference-driven CS-MRI reconstruction schemes can further decrease the sampling ratio by exploiting the sparsity of the difference image between the target and the reference MR images in pixel domain. Unfortunately existing methods do not work well given that contrast changes are incorrectly estimated or motion compensation is inaccurate. In this paper, we propose to reconstruct MR images by utilizing the sparsity of the difference image between the target and the motion-compensated reference images in wavelet transform and gradient domains. The idea is attractive because it requires neither the estimation of the contrast changes nor multiple times motion compensations. In addition, we apply total generalized variation (TGV regularization to eliminate the staircasing artifacts caused by conventional total variation (TV. Fast composite splitting algorithm (FCSA is used to solve the proposed reconstruction problem in order to improve computational efficiency. Experimental results demonstrate that the proposed method can not only reduce the computational cost but also decrease sampling ratio or improve the reconstruction quality alternatively.

  2. Design principles of a conditional futile cycle exploited for regulation.

    Science.gov (United States)

    Tolla, Dean A; Kiley, Patricia J; Lomnitz, Jason G; Savageau, Michael A

    2015-07-01

    In this report, we characterize the design principles of futile cycling in providing rapid adaptation by regulatory proteins that act as environmental sensors. In contrast to the energetically wasteful futile cycles that are avoided in metabolic pathways, here we describe a conditional futile cycle exploited for a regulatory benefit. The FNR (fumarate and nitrate reduction) cycle in Escherichia coli operates under two regimes - a strictly futile cycle in the presence of O2 and as a pathway under anoxic conditions. The computational results presented here use FNR as a model system and provide evidence that cycling of this transcription factor and its labile sensory cofactor between active and inactive states affords rapid signaling and adaptation. We modify a previously developed mechanistic model to examine a family of FNR models each with different cycling speeds but mathematically constrained to be otherwise equivalent, and we identify a trade-off between energy expenditure and response time that can be tuned by evolution to optimize cycling rate of the FNR system for a particular ecological context. Simulations mimicking experiments with proposed double mutant strains offer suggestions for experimentally testing our predictions and identifying potential fitness effects. Our approach provides a computational framework for analyzing other conditional futile cycles, which when placed in their larger biological context may be found to confer advantages to the organism.

  3. Energy harvesting from human motion: exploiting swing and shock excitations

    International Nuclear Information System (INIS)

    Ylli, K; Hoffmann, D; Willmann, A; Becker, P; Folkmer, B; Manoli, Y

    2015-01-01

    Modern compact and low power sensors and systems are leading towards increasingly integrated wearable systems. One key bottleneck of this technology is the power supply. The use of energy harvesting techniques offers a way of supplying sensor systems without the need for batteries and maintenance. In this work we present the development and characterization of two inductive energy harvesters which exploit different characteristics of the human gait. A multi-coil topology harvester is presented which uses the swing motion of the foot. The second device is a shock-type harvester which is excited into resonance upon heel strike. Both devices were modeled and designed with the key constraint of device height in mind, in order to facilitate the integration into the shoe sole. The devices were characterized under different motion speeds and with two test subjects on a treadmill. An average power output of up to 0.84 mW is achieved with the swing harvester. With a total device volume including the housing of 21 cm 3 a power density of 40 μW cm −3 results. The shock harvester generates an average power output of up to 4.13 mW. The power density amounts to 86 μW cm −3 for the total device volume of 48 cm 3 . Difficulties and potential improvements are discussed briefly. (paper)

  4. MAPI: towards the integrated exploitation of bioinformatics Web Services

    Directory of Open Access Journals (Sweden)

    Karlsson Johan

    2011-10-01

    Full Text Available Abstract Background Bioinformatics is commonly featured as a well assorted list of available web resources. Although diversity of services is positive in general, the proliferation of tools, their dispersion and heterogeneity complicate the integrated exploitation of such data processing capacity. Results To facilitate the construction of software clients and make integrated use of this variety of tools, we present a modular programmatic application interface (MAPI that provides the necessary functionality for uniform representation of Web Services metadata descriptors including their management and invocation protocols of the services which they represent. This document describes the main functionality of the framework and how it can be used to facilitate the deployment of new software under a unified structure of bioinformatics Web Services. A notable feature of MAPI is the modular organization of the functionality into different modules associated with specific tasks. This means that only the modules needed for the client have to be installed, and that the module functionality can be extended without the need for re-writing the software client. Conclusions The potential utility and versatility of the software library has been demonstrated by the implementation of several currently available clients that cover different aspects of integrated data processing, ranging from service discovery to service invocation with advanced features such as workflows composition and asynchronous services calls to multiple types of Web Services including those registered in repositories (e.g. GRID-based, SOAP, BioMOBY, R-bioconductor, and others.

  5. Exploration and exploitation during information search and experimential choice

    Directory of Open Access Journals (Sweden)

    Cleotilde Gonzalez

    2016-07-01

    Full Text Available Before making a choice we often search and explore the options available. For example, we try clothes on before selecting the one to buy and we search for career options before deciding a career to pursue. Although the exploration process, where one is free to sample available options is pervasive, we know little about how and why humans explore an environment before making choices. This research contributes to the clarification of some of the phenomena that describes how people perform search during free sampling: we find a gradual decrease of exploration and, in parallel, a tendency to explore and choose options of high value. These patterns provide support to the existence of learning and an exploration-exploitation tradeoff that may occur during free sampling. Thus, explorations in free sampling is not led by the purely epistemic value of the available options. Rather, exploration during free sampling is a learning process that is influenced by memory effects and by the value of the options available, where participants pursue options of high value more frequently. These parallel processes predict the consequential choice.

  6. Bats Track and Exploit Changes in Insect Pest Populations

    Science.gov (United States)

    McCracken, Gary F.; Westbrook, John K.; Brown, Veronica A.; Eldridge, Melanie; Federico, Paula; Kunz, Thomas H.

    2012-01-01

    The role of bats or any generalist predator in suppressing prey populations depends on the predator's ability to track and exploit available prey. Using a qPCR fecal DNA assay, we document significant association between numbers of Brazilian free-tailed bats (Tadarida brasiliensis) consuming corn earworm (CEW) moths (Helicoverpa zea) and seasonal fluctuations in CEW populations. This result is consistent with earlier research linking the bats' diet to patterns of migration, abundance, and crop infestation by important insect pests. Here we confirm opportunistic feeding on one of the world's most destructive insects and support model estimates of the bats' ecosystem services. Regression analysis of CEW consumption versus the moth's abundance at four insect trapping sites further indicates that bats track local abundance of CEW within the regional landscape. Estimates of CEW gene copies in the feces of bats are not associated with seasonal or local patterns of CEW abundance, and results of captive feeding experiments indicate that our qPCR assay does not provide a direct measure of numbers or biomass of prey consumed. Our results support growing evidence for the role of generalist predators, and bats specifically, as agents for biological control and speak to the value of conserving indigenous generalist predators. PMID:22952782

  7. Exploiting the WNT Signaling Pathway for Clinical Purposes.

    Science.gov (United States)

    Johnson, Mark L; Recker, Robert R

    2017-06-01

    The goal of this paper is to evaluate critically the literature published over the past 3 years regarding the Wnt signaling pathway. The Wnt pathway was found to be involved in bone biology in 2001-2002 with the discovery of a (G171V) mutation in the lipoprotein receptor-related protein 5 (LRP5) that resulted in high bone mass and another mutation that completely inactivated Lrp5 function and resulted in osteoporosis pseudoglioma syndrome (OPPG). The molecular biology has been complex, and very interesting. It has provided many opportunities for exploitation to develop new clinical treatments, particularly for osteoporosis. More clinical possibilities include: treatments for fracture healing, corticosteroid osteoporosis, osteogenesis imperfecta, and others. In addition, we wish to provide historical information coming from distant publications (~350 years ago) regarding bone biology that have been confirmed by study of Wnt signaling. A recent finding is the development of an antibody to sclerostin that is under study as a treatment for osteoporosis. Development of treatments for other forms of osteoporosis, such as corticosteroid osteoporosis, is also underway. The full range of the applications of the work is not yet been achieved.

  8. Exploiting Data Sparsity for Large-Scale Matrix Computations

    KAUST Repository

    Akbudak, Kadir

    2018-02-24

    Exploiting data sparsity in dense matrices is an algorithmic bridge between architectures that are increasingly memory-austere on a per-core basis and extreme-scale applications. The Hierarchical matrix Computations on Manycore Architectures (HiCMA) library tackles this challenging problem by achieving significant reductions in time to solution and memory footprint, while preserving a specified accuracy requirement of the application. HiCMA provides a high-performance implementation on distributed-memory systems of one of the most widely used matrix factorization in large-scale scientific applications, i.e., the Cholesky factorization. It employs the tile low-rank data format to compress the dense data-sparse off-diagonal tiles of the matrix. It then decomposes the matrix computations into interdependent tasks and relies on the dynamic runtime system StarPU for asynchronous out-of-order scheduling, while allowing high user-productivity. Performance comparisons and memory footprint on matrix dimensions up to eleven million show a performance gain and memory saving of more than an order of magnitude for both metrics on thousands of cores, against state-of-the-art open-source and vendor optimized numerical libraries. This represents an important milestone in enabling large-scale matrix computations toward solving big data problems in geospatial statistics for climate/weather forecasting applications.

  9. Exploiting communication concurrency on high performance computing systems

    Energy Technology Data Exchange (ETDEWEB)

    Chaimov, Nicholas [Univ. of Oregon, Eugene, OR (United States); Ibrahim, Khaled Z. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Williams, Samuel [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Iancu, Costin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-01-01

    Although logically available, applications may not exploit enough instantaneous communication concurrency to maximize hardware utilization on HPC systems. This is exacerbated in hybrid programming models such as SPMD+OpenMP. We present the design of a "multi-threaded" runtime able to transparently increase the instantaneous network concurrency and to provide near saturation bandwidth, independent of the application configuration and dynamic behavior. The runtime forwards communication requests from application level tasks to multiple communication servers. Our techniques alleviate the need for spatial and temporal application level message concurrency optimizations. Experimental results show improved message throughput and bandwidth by as much as 150% for 4KB bytes messages on InfiniBand and by as much as 120% for 4KB byte messages on Cray Aries. For more complex operations such as all-to-all collectives, we observe as much as 30% speedup. This translates into 23% speedup on 12,288 cores for a NAS FT implemented using FFTW. We also observe as much as 76% speedup on 1,500 cores for an already optimized UPC+OpenMP geometric multigrid application using hybrid parallelism.

  10. Exploiting Seams and Closing Gaps: Lessons from Mumbai and Beyond

    Directory of Open Access Journals (Sweden)

    Dr. Andrea J. Dew

    2012-01-01

    Full Text Available This article analyzes a single event—the 2008 Mumbai attacks—in order to consider the strategic and operational lessons for dealing with other armed groups. How and why was Lashkar-e-Tayyiba (LeT able to carry out such a sophisticated attack in the heart of Mumbai? And what lessons does Mumbai hold for strategists seeking to counter other armed groups around the world? While tactical level lessons from Mumbai have been well documented, it is important to also consider what the Mumbai attacks tell us at the strategic and operational levels. Specifically, the Mumbai attacks provide valuable insight into how armed groups use the maritime environment, and how they use surprise, denial, and deception to mask intention and invite over-reaction by states. In addition, studying the Mumbai attacks provides insight into some of the strategic and operational seams and gaps that armed groups seek to exploit. These include environmental and geographical factors; institutional, bureaucratic, and jurisdictional seams and gaps between agencies; cognitive seams and gaps that made the use of the sea by LeT so difficult to conceptualize; and the diplomatic seams and gaps that led to heightened tensions among states— in this case, India, Pakistan, and the United States. This article discusses how to categorize these seams and gaps in order to better address the problems they create, and how states might best direct and focus their limited resources when faced with similar challenges.

  11. Exploiting MO Crystals and Faraday Effect in Magnetic Sensing

    Science.gov (United States)

    White, Robert C.

    2002-02-01

    Magneto-optics (MO) technology is believed to be far more advanced in the former Soviet Union when compared to the US. This is evidenced by the existence of factories geared for the production of Yttrium Iron Garnet (YIG) wafers. The potential advantages to MO Crystal Technology over other magnetic sensing technologies are (1) light weight and compact construction, (2) low cost, and (3) low power implementation concepts. A candidate sensor consists of a low power laser, polarizers, sensors, and housing. Such components can be combined in a fashion to keep weight down by using light-weight construction in the housing. Cost can be reduced by mass producing components. Tera Research purchased a wafer for evaluation. This wafer yielded over 100 crystals for individual use. When mass produced, the engineering recurring cost will be far less. The other components will be commercial off the shelf parts that when ordered in bulk quantities will be inexpensive as well. The required power is determined by the laser supply, processing computer and any necessary signal generators. The first two can easily be manufactured from low power semiconductor components. The latter is a separate engineering task which can exploit low data rates and low background noise transponder frequencies or modulations.

  12. Experimental demonstration of an OpenFlow based software-defined optical network employing packet, fixed and flexible DWDM grid technologies on an international multi-domain testbed.

    Science.gov (United States)

    Channegowda, M; Nejabati, R; Rashidi Fard, M; Peng, S; Amaya, N; Zervas, G; Simeonidou, D; Vilalta, R; Casellas, R; Martínez, R; Muñoz, R; Liu, L; Tsuritani, T; Morita, I; Autenrieth, A; Elbers, J P; Kostecki, P; Kaczmarek, P

    2013-03-11

    Software defined networking (SDN) and flexible grid optical transport technology are two key technologies that allow network operators to customize their infrastructure based on application requirements and therefore minimizing the extra capital and operational costs required for hosting new applications. In this paper, for the first time we report on design, implementation & demonstration of a novel OpenFlow based SDN unified control plane allowing seamless operation across heterogeneous state-of-the-art optical and packet transport domains. We verify and experimentally evaluate OpenFlow protocol extensions for flexible DWDM grid transport technology along with its integration with fixed DWDM grid and layer-2 packet switching.

  13. Monitoring environmental effects of shale gas exploitation at Wysin in Poland.

    Science.gov (United States)

    Lasocki, Stanislaw; Mirek, Janusz; Bialon, Wojciech; Cielesta, Szymon; Lasak, Mateusz; Cesca, Simone; Lopez Comino, Jose Angel; Dahm, Torsten; Scarpa, Roberto; Gunning, Andrew; Montcoudiol, Nelly; Isherwood, Catherine; Jaroslawski, Janusz; Guzikowski, Jakub

    2017-04-01

    Environmental effects of shale gas exploration and exploitation are extensively studied in the framework of "Shale Gas Exploration and Exploitation Induced Risks" project (SHEER, H2020-LCE 16-2014-1). One of the main component of this study is on-site monitoring of the effects at Wysin shale-gas play of Polish Oil and Gas Company in Poland. This includes monitoring of seismicity and water and air quality. Surface seismic monitoring network consists of 6 surface broadband (BB) seismometers and 25 surface short-period (SP) seismometers The SPs are assembled into three small aperture arrays with 9, 8 and 8 stations, respectively, distributed in a triangle geometry at a distance of about 2-4 km from the hydrofracturing rig. Each array is complemented with one BB station. The three remaining BBs are located up to about 5 km from the rig. In addition 3 borehole broadband seismometers are located in three shallow boreholes. The groundwater monitoring makes use of four wells, which reach a main underground water reservoir. Three complementary datasets are collected: continuous monitoring of borehole data, laboratory analyses of water samples and field monitoring of water quality parameters. The continuous monitoring makes use of down-hole probes, which have been installed in each borehole. The probes record absolute pressure, temperature and electrical conductivity. In addition, a barometric probe has been installed above ground to record atmospheric pressure in order to allow conversion of absolute pressure to a water level. After collection, water samples are sent to an accredited laboratory for analysis. The field monitoring is undertaken during the sampling visits. Whilst the borehole is being purged, physico-chemical parameters are monitored using a multi-parameter probe. This measures and records temperature, specific conductivity, pH, dissolved oxygen and oxidation-reduction potential within the water. Hydrocarbon gas content within the water is below detection

  14. Surface Detection using Round Cut

    DEFF Research Database (Denmark)

    Dahl, Vedrana Andersen; Dahl, Anders Bjorholm; Larsen, Rasmus

    2014-01-01

    We propose an iterative method for detecting closed surfaces in a volumetric data, where an optimal search is performed in a graph build upon a triangular mesh. Our approach is based on previous techniques for detecting an optimal terrain-like or tubular surface employing a regular grid. Unlike...... similar adaptations for triangle meshes, our method is capable of capturing complex geometries by iteratively refining the surface, where we obtain a high level of robustness by applying explicit mesh processing to intermediate results. Our method uses on-surface data support, but it also exploits data...... information about the region inside and outside the surface. This provides additional robustness to the algorithm. We demonstrate the capabilities of the approach by detecting surfaces of CT scanned objects....

  15. Soft swimming: exploiting deformable interfaces for low reynolds number locomotion.

    Science.gov (United States)

    Trouilloud, Renaud; Yu, Tony S; Hosoi, A E; Lauga, Eric

    2008-07-25

    Reciprocal movement cannot be used for locomotion at low Reynolds number in an infinite fluid or near a rigid surface. Here we show that this limitation is relaxed for a body performing reciprocal motions near a deformable interface. Using physical arguments and scaling relationships, we show that the nonlinearities arising from reciprocal flow-induced interfacial deformation rectify the periodic motion of the swimmer, leading to locomotion. Such a strategy can be used to move toward, away from, and parallel to any deformable interface as long as the length scales involved are smaller than intrinsic scales, which we identify. A macroscale experiment of flapping motion near a free surface illustrates this new result.

  16. Exploiting node mobility for energy optimization in wireless sensor networks

    Science.gov (United States)

    El-Moukaddem, Fatme Mohammad

    Wireless Sensor Networks (WSNs) have become increasingly available for data-intensive applications such as micro-climate monitoring, precision agriculture, and audio/video surveillance. A key challenge faced by data-intensive WSNs is to transmit the sheer amount of data generated within an application's lifetime to the base station despite the fact that sensor nodes have limited power supplies such as batteries or small solar panels. The availability of numerous low-cost robotic units (e.g. Robomote and Khepera) has made it possible to construct sensor networks consisting of mobile sensor nodes. It has been shown that the controlled mobility offered by mobile sensors can be exploited to improve the energy efficiency of a network. In this thesis, we propose schemes that use mobile sensor nodes to reduce the energy consumption of data-intensive WSNs. Our approaches differ from previous work in two main aspects. First, our approaches do not require complex motion planning of mobile nodes, and hence can be implemented on a number of low-cost mobile sensor platforms. Second, we integrate the energy consumption due to both mobility and wireless communications into a holistic optimization framework. We consider three problems arising from the limited energy in the sensor nodes. In the first problem, the network consists of mostly static nodes and contains only a few mobile nodes. In the second and third problems, we assume essentially that all nodes in the WSN are mobile. We first study a new problem called max-data mobile relay configuration (MMRC ) that finds the positions of a set of mobile sensors, referred to as relays, that maximize the total amount of data gathered by the network during its lifetime. We show that the MMRC problem is surprisingly complex even for a trivial network topology due to the joint consideration of the energy consumption of both wireless communication and mechanical locomotion. We present optimal MMRC algorithms and practical distributed

  17. THE INFLUENCE OF DISCONTINUITY FABRIC AND OTHER FACTORS ON OPTIMUM EXPLOITATION OF DIMENSION STONE

    OpenAIRE

    Ivan Tomašić

    1994-01-01

    Dimension stone as a specific nonmetallic raw material, regarding deposit conditions, exploitation methods and processing, demands an adequate estimate of dimensioning i.e. opti-malizalion of the exploitation in relation to the structural elements. The analyzed and presented examples show that in natural conditions adaptation of the exploitation technology to the discontinuity fabric could result in considerable gains in utilization of rock mass in stone blocks, specialy if these blocks ar...

  18. Experiences of Labor Exploitation : Case study of some male migrant workers in Finnish facility industries

    OpenAIRE

    Chukwu, Dominic-Savior

    2012-01-01

    The aim of this study is to describe the experiences of some male migrant workers who have encountered labor exploitation in their workplaces in Finnish facility industries, specifically in the cleaning companies. This study considered the various types of labor exploitations that migrant workers face in their workplaces. It equally look at the effects of labor exploitation on migrant workers, and suggested possible ways that migrant workers could make themselves less vulnerable to workplace ...

  19. Improving Quay Cranes Exploitation by Implementing a Port Equipment Management System

    Directory of Open Access Journals (Sweden)

    Cristina Dragomir

    2011-09-01

    Full Text Available Port operators use almost all type of port equipments, from a range of heavy equipments to light machines. Port activities efficiency can be achieved by improving the exploitation of the necessary port equipment for handling cargo. Objectives of research are based on establishing factors that influence management activities of quay cranes exploitation. A better exploitation management of quay cranes can be achieved by implementing a proper port equipment management system

  20. Sexual Exploitation and Abuse by UN Peacekeepers: A Threat to Impartiality

    OpenAIRE

    Grady, Kate

    2010-01-01

    This article reconceptualizes the idea of the impartiality of UN peacekeeping in light of allegations of sexual exploitation and abuse by peacekeeping personnel. It considers the role that sexual exploitation and abuse play both during and after conflict. The paper argues that sexual exploitation and abuse are political acts that bring about financial and propagandist benefits for the warring parties. It then tracks the history of neutrality in UN peacekeeping – originally defined as objectiv...

  1. Risk and resiliency factors influencing onset and adolescence-limited commercial sexual exploitation of disadvantaged girls.

    Science.gov (United States)

    Reid, Joan A

    2014-12-01

    Previous research into age-related variables relevant to girls and young women being involved in commercial sexual exploitation (including prostitution) has not distinguished between its onset and limitation to adolescence and its early onset and persistence into adult life. The aims of this study were to examine variables associated with adolescent versus adult onset of commercial sexual exploitation and identify potential risk and resiliency factors differentiating adolescence-limited sexual exploitation and early-onset-adult persistent exploitation. Interviews with 174 vulnerable mostly African-American women, 23% of whom reported commercial sexual exploitation in adolescence and/or adulthood, yielded data, which were analysed using multinomial logistic regressions. Adolescent sexual victimisation, younger age at first alcohol/drug use, being a victim of intimate partner violence and sense of stigmatisation of sexual self/others were all variables associated with adolescent onset of commercial sexual exploitation. Educational attainment differentiated adolescence limited from adolescent-adult persistent exploitation; exploitation had ceased by adulthood among over two-thirds of those who completed at least high school education, but only 13% of those exploited into adult life had finished high school. As level of education was linked to cessation of exploitation by adulthood, support for vulnerable girls to complete education at least to high school level may be protective.The link between early onset of substance misuse and persistent exploitation suggests that education and support specifically targeted within this field could reduce likelihood of persistent abuse.Work directed at improvement of self-image may also reduce risk of persistent exploitation. Copyright © 2014 John Wiley & Sons, Ltd.

  2. Mechanisms of sexual exploitation of children and teenagers around the river port of Pucallpa

    OpenAIRE

    Mujica, Jaris; Cavagnou, Robin

    2012-01-01

    The sexual exploitation of children and adolescents is a phenomenon that has grown with the expansion of extractive industries (timber, oil, minerals and gas) in the Peruvian Amazon. The article is part of a long research in the city of Pucallpa and the route north of the Ucayali River. Its central objective is to demonstrate the economic dynamics of the mechanisms of commercial sexual exploitation of children and adolescents around the river port. We study the mechanisms of exploitation of l...

  3. Women in mining still exploited and sexually harassed

    Directory of Open Access Journals (Sweden)

    Doret Botha

    2016-11-01

    Full Text Available Orientation: Globally, women have become an essential part of the mining workforce. Among other jobs, they fulfil management positions, operate heavy machinery and are involved in artisanal mining processes. In South Africa, new mining legislation not only prohibits the exclusion of women but requires from companies to actively change the demographic profile of their workforce. Mining companies are obliged to also employ women in core mining activities. Although well intended, women appointed in core positions work side by side with men, often in isolation, and are frequently at risk of sexual abuse and/or harassment. Research purpose: This research determined perceptions regarding the occurrence of sexual harassment among women working in core mining positions. Motivation for the study: Currently, there is a paucity of published data on the occurrence of sexual harassment in the mining industry. Method: A mixed-method research design was used including quantitative and qualitative research paradigms. Quantitative data were collected by means of a structured questionnaire. Qualitative data were collected by means of individual and group interviews. Main findings: From the literature review and the empirical findings, it is evident that women are still exploited and sexually harassed in the mining industry. Incidents taking place on a daily basis vary from whistling; name calling; use of vulgar or derogatory language; display of body parts; physical contact, ranging from touching to sexual assault and rape; to the exchange of sexual favours for promotion. Practical/managerial implications: It is evident from the research that a holistic approach is required to effectively eradicate sexual harassment in the mining industry, involving the commitment of relevant state departments, human resource managers and labour experts. Contribution: Practical recommendations are made to effectively address sexual harassment in the mining industry.

  4. Birds of a feather: Neanderthal exploitation of raptors and corvids.

    Science.gov (United States)

    Finlayson, Clive; Brown, Kimberly; Blasco, Ruth; Rosell, Jordi; Negro, Juan José; Bortolotti, Gary R; Finlayson, Geraldine; Sánchez Marco, Antonio; Giles Pacheco, Francisco; Rodríguez Vidal, Joaquín; Carrión, José S; Fa, Darren A; Rodríguez Llanes, José M

    2012-01-01

    The hypothesis that Neanderthals exploited birds for the use of their feathers or claws as personal ornaments in symbolic behaviour is revolutionary as it assigns unprecedented cognitive abilities to these hominins. This inference, however, is based on modest faunal samples and thus may not represent a regular or systematic behaviour. Here we address this issue by looking for evidence of such behaviour across a large temporal and geographical framework. Our analyses try to answer four main questions: 1) does a Neanderthal to raptor-corvid connection exist at a large scale, thus avoiding associations that might be regarded as local in space or time?; 2) did Middle (associated with Neanderthals) and Upper Palaeolithic (associated with modern humans) sites contain a greater range of these species than Late Pleistocene paleontological sites?; 3) is there a taphonomic association between Neanderthals and corvids-raptors at Middle Palaeolithic sites on Gibraltar, specifically Gorham's, Vanguard and Ibex Caves? and; 4) was the extraction of wing feathers a local phenomenon exclusive to the Neanderthals at these sites or was it a geographically wider phenomenon?. We compiled a database of 1699 Pleistocene Palearctic sites based on fossil bird sites. We also compiled a taphonomical database from the Middle Palaeolithic assemblages of Gibraltar. We establish a clear, previously unknown and widespread, association between Neanderthals, raptors and corvids. We show that the association involved the direct intervention of Neanderthals on the bones of these birds, which we interpret as evidence of extraction of large flight feathers. The large number of bones, the variety of species processed and the different temporal periods when the behaviour is observed, indicate that this was a systematic, geographically and temporally broad, activity that the Neanderthals undertook. Our results, providing clear evidence that Neanderthal cognitive capacities were comparable to those of

  5. Exploiting Aura OMI Level 2 Data with High Resolution Visualization

    Science.gov (United States)

    Wei, J. C.; Yang, W.; Johnson, J. E.; Zhao, P.; Gerasimov, I. V.; Pham, L.; Vicente, G. A.; Shen, S.

    2014-12-01

    Satellite data products are important for a wide variety of applications that can bring far-reaching benefits to the science community and the broader society. These benefits can best be achieved if the satellite data are well utilized and interpreted, such as model inputs from satellite, or extreme event (such as volcano eruption, dust storm, …etc) interpretation from satellite. Unfortunately, this is not always the case, despite the abundance and relative maturity of numerous satellite data products provided by NASA and other organizations. One way to help users better understand the satellite data is to provide data along with 'Images', including accurate pixel-level (Level 2) information, pixel coverage area delineation, and science team recommended quality screening for individual geophysical parameters. Goddard Earth Sciences Data and Information Services Center (GES DISC) always strives to best support (i.e., Software-as-a-service, SaaS) the user-community for NASA Earth Science Data. In this case, we will present a new visualization tool that helps users exploiting Aura Ozone Monitoring Instrument (OMI) Level 2 data. This new visualization service utilizes Open Geospatial Consortium (OGC) standard-compliant Web Mapping Service (WMS) and Web Coverage Service (WCS) calls in the backend infrastructure. The functionality of the service allows users to select data sources (e.g., multiple parameters under the same measurement, like NO2 and SO2 from OMI Level 2 or same parameter with different methods of aggregation, like NO2 in OMNO2G and OMNO2D products), defining area-of-interest and temporal extents, zooming, panning, overlaying, sliding, and data subsetting and reformatting. The interface will also be able to connect to other OGC WMS and WCS servers, which will greatly enhance its expandability to integrate additional outside data/map sources (such as Global Imagery Browse Services (GIBS)).

  6. Trends in the exploitation of South Atlantic shark populations.

    Science.gov (United States)

    Barreto, Rodrigo; Ferretti, Francesco; Flemming, Joanna M; Amorim, Alberto; Andrade, Humber; Worm, Boris; Lessa, Rosangela

    2016-08-01

    Approximately 25% of globally reported shark catches occur in Atlantic pelagic longline fisheries. Strong declines in shark populations have been detected in the North Atlantic, whereas in the South Atlantic the situation is less clear, although fishing effort has been increasing in this region since the late 1970s. We synthesized information on shark catch rates (based on 871,177 sharks caught on 86,492 longline sets) for the major species caught by multiple fleets in the South Atlantic between 1979 and 2011. We complied records from fishing logbooks of fishing companies, fishers, and onboard observers that were supplied to Brazilian institutions. By using exploratory data analysis and literature sources, we identified 3 phases of exploitation in these data (Supporting Information). From 1979 to 1997 (phase A), 5 fleets (40 vessels) fished mainly for tunas. From 1998 to 2008 (phase B), 20 fleets (100 vessels) fished for tunas, swordfishes, and sharks. From 2008 to 2011 (phase C), 3 fleets (30 vessels) fished for multiple species, but restrictive measures were implemented. We used generalized linear models to standardize catch rates and identify trends in each of these phases. Shark catch rates increased from 1979 to 1997, when fishing effort was low, decreased from 1998 to 2008, when fishing effort increased substantially, and remained stable or increased from 2008 to 2011, when fishing effort was again low. Our results indicate that most shark populations affected by longlines in the South Atlantic are currently depleted, but these populations may recover if fishing effort is reduced accordingly. In this context, it is problematic that comprehensive data collection, monitoring, and management of these fisheries ceased after 2012. Concurrently with the fact that Brazil is newly identified by FAO among the largest (and in fastest expansion) shark sub-products consumer market worldwide. © 2015 Society for Conservation Biology.

  7. Exploitation of marine bacteria for production of gold nanoparticles

    Directory of Open Access Journals (Sweden)

    Sharma Nishat

    2012-06-01

    Full Text Available Abstract Background Gold nanoparticles (AuNPs have found wide range of applications in electronics, biomedical engineering, and chemistry owing to their exceptional opto-electrical properties. Biological synthesis of gold nanoparticles by using plant extracts and microbes have received profound interest in recent times owing to their potential to produce nanoparticles with varied shape, size and morphology. Marine microorganisms are unique to tolerate high salt concentration and can evade toxicity of different metal ions. However, these marine microbes are not sufficiently explored for their capability of metal nanoparticle synthesis. Although, marine water is one of the richest sources of gold in the nature, however, there is no significant publication regarding utilization of marine micro-organisms to produce gold nanoparticles. Therefore, there might be a possibility of exploring marine bacteria as nanofactories for AuNP biosynthesis. Results In the present study, marine bacteria are exploited towards their capability of gold nanoparticles (AuNPs production. Stable, monodisperse AuNP formation with around 10 nm dimension occur upon exposure of HAuCl4 solution to whole cells of a novel strain of Marinobacter pelagius, as characterized by polyphasic taxonomy. Nanoparticles synthesized are characterized by Transmission electron microscopy, Dynamic light scattering and UV-visible spectroscopy. Conclusion The potential of marine organisms in biosynthesis of AuNPs are still relatively unexplored. Although, there are few reports of gold nanoparticles production using marine sponges and sea weeds however, there is no report on the production of gold nanoparticles using marine bacteria. The present work highlighted the possibility of using the marine bacterial strain of Marinobacter pelagius to achieve a fast rate of nanoparticles synthesis which may be of high interest for future process development of AuNPs. This is the first report of Au

  8. Incentive Use in Research: Protecting Vulnerable Populations from Exploitation

    Directory of Open Access Journals (Sweden)

    Haruna Muwonge

    2013-06-01

    Full Text Available Global investment in Medical Research and Development has markedly increased in the last few decades. However, due to the decreasing public altruism, researchers have come under increased pressures from the funding bodies to produce results. Out of desperation, some researchers have resorted to using incentives as a means of sourcing for volunteers. Consequently, the research burden has disproportionately been shared among the most vulnerable populations in the society. Incentives especially monetary ones present an ethical dilemma because of the uncertainties’ surrounding the morality, amount and type of payment, vulnerability of volunteers and possible threats to voluntary participation. Several studies done on the use of incentives in medical research have noted that financial motivation was the number one reason for subjects to volunteer in Medical research. Mutual benefit and freedom of choice by participants were given as reasons to support their use. However, scientists who are against the use of incentives believe that they are coercive or undue inducements, and may influence a subjects’ ability to give an informed consent. Guidelines exist that protect vulnerable groups from exploitation, although none sheds light into the use of incentives. Nonetheless, in the face of the waning public altruism, the benefits of using incentives far outweigh the dangers, although researchers should avoid situations where their use may become problematic. As a mode of payment to research subjects, researchers should adopt a combination of the Dickerts’ Wage and re-imbursement models as guides in quantifying the incentive. [Archives Medical Review Journal 2013; 22(3.000: 408-417

  9. Optimization of hydraulic machinery by exploiting previous successful designs

    Energy Technology Data Exchange (ETDEWEB)

    Kyriacou, S A; Giannakoglou, K C [National Technical University of Athens, Parallel CFD and Optimization Unit, PO Box 64069, Athens 15710 (Greece); Weissenberger, S; Grafenberger, P, E-mail: stelios.Kyriacou@gmail.co [Andritz HYDRO, RD, Lunzerstrasse 78, 4031 Linz (Austria)

    2010-08-15

    A design-optimization method for hydraulic machinery is proposed. Optimal designs are obtained using the appropriate CFD evaluation software driven by an evolutionary algorithm which is also assisted by artificial neural networks used as surrogate evaluation models or metamodels. As shown in a previous IAHR paper by the same authors, such an optimization method substantially reduces the CPU cost, since the metamodels can discard numerous non-promising candidate solutions generated during the evolution, at almost negligible CPU cost, without evaluating them by means of the costly CFD tool. The present paper extends the optimization method of the previous paper by making it capable to accommodate and exploit pieces of useful information archived during previous relevant successful designs. So, instead of parameterizing the geometry of the hydraulic machine components, which inevitably leads to many design variables, enough to slow down the design procedure, in the proposed method all new designs are expressed as weighted combinations of the archived ones. The archived designs act as the design space bases. The role of the optimization algorithms is to find the set (or sets, for more than one objectives, where the Pareto front of non-dominated solutions is sought) of weight values, corresponding to the hydraulic machine configuration(s) with optimal performance. Since the number of weights is much less that the number of design variables of the conventional shape parameterization, the design space dimension reduces and the CPU cost of the metamodel-assisted evolutionary algorithm is much lower. The design of a Francis runner is used to demonstrate the capabilities of the proposed method.

  10. Impact of Natural Gas Exploitation Plant on the Environment

    International Nuclear Information System (INIS)

    Cackovic, M.; Marovic, G.; Pehnec, G.; Sencar, J.; Vadic, V.

    2013-01-01

    Exploitation of natural gas at the gas field Molve has been provided more than 20 years. Natural gas and gas condensate have been extracted from 34 bores in Podravina on an area wider than 200 km 2 . The gas is then transported to the central gas station CPS Molve using a closed collection and transportation system. In addition to hydrocarbons, natural gas contains many other substances such as CO 2 , H 2 S, mercaptanes, Hg, and water which have to be removed at the Molve station by different technological processes. This paper presents the results of H 2 S, mercaptanes and SO 2 monitoring at measuring sites MOLVE-9, MOLVE-10, and MOLVE-CGS in the area of influence of a central natural gas station Molve in 2011. Measurements were carried out one month in the summer and one month in the autumn. H 2 S levels exceeded the Croatian limit values (LV) at all three measuring sites, while the mercaptan levels exceeded the Croatian LV at MOLVE-10 in the autumn. The obtained results showed that the levels of SO 2 mass concentrations were below LV. During the same measuring periods, at the same measuring sites, radiation was measured using ALARA dosimeters (expressed here as mean daily dose rates). Absorbed dose measurements were calculated on yearly base. At MOLVE-9 yearly equivalent dose was 0.680 ± 0.064 mSv, at MOLVE-10 0.855 ± 0.079 mSv and at MOLVE-CGS 0.772 ± 0.067 mSv. The measurements also showed that the refining processes at the gas station did not increase radioactivity in the environment. Observed variations were within the normal fluctuations.(author)

  11. CCRK is a novel signalling hub exploitable in cancer immunotherapy.

    Science.gov (United States)

    Mok, Myth T; Zhou, Jingying; Tang, Wenshu; Zeng, Xuezhen; Oliver, Antony W; Ward, Simon E; Cheng, Alfred S

    2018-03-01

    Cyclin-dependent kinase 20 (CDK20), or more commonly referred to as cell cycle-related kinase (CCRK), is the latest member of CDK family with strong linkage to human cancers. Accumulating studies have reported the consistent overexpression of CCRK in cancers arising from brain, colon, liver, lung and ovary. Such aberrant up-regulation of CCRK is clinically significant as it correlates with tumor staging, shorter patient survival and poor prognosis. Intriguingly, the signalling molecules perturbed by CCRK are divergent and cancer-specific, including the cell cycle regulators CDK2, cyclin D1, cyclin E and RB in glioblastoma, ovarian carcinoma and colorectal cancer, and KEAP1-NRF2 cytoprotective pathway in lung cancer. In hepatocellular carcinoma (HCC), CCRK mediates virus-host interaction to promote hepatitis B virus-associated tumorigenesis. Further mechanistic analyses reveal that CCRK orchestrates a self-reinforcing circuitry comprising of AR, GSK3β, β-catenin, AKT, EZH2, and NF-κB signalling for transcriptional and epigenetic regulation of oncogenes and tumor suppressor genes. Notably, EZH2 and NF-κB in this circuit have been recently shown to induce IL-6 production to facilitate tumor immune evasion. Concordantly, in a hepatoma preclinical model, ablation of Ccrk disrupts the immunosuppressive tumor microenvironment and enhances the therapeutic efficacy of immune checkpoint blockade via potentiation of anti-tumor T cell responses. In this review, we summarized the multifaceted tumor-intrinsic and -extrinsic functions of CCRK, which represents a novel signalling hub exploitable in cancer immunotherapy. Copyright © 2018 Elsevier Inc. All rights reserved.

  12. Geomechanical issues of anthropogenic CO2 sequestration in exploited gas fields

    International Nuclear Information System (INIS)

    Ferronato, Massimiliano; Gambolati, Giuseppe; Janna, Carlo; Teatini, Pietro

    2010-01-01

    Anthropogenic CO 2 sequestration in deep geological formations may represent a viable option to fulfil the requirements of the 1997 Kyoto protocol on the reduction of greenhouse gas emissions. Scenarios of CO 2 sequestration through three injection wells in an exploited gas field located in the Po sedimentary basin (Italy) are simulated with the final target to understand the geomechanical consequences of the injection of carbon dioxide. Investigated scenarios include, as a hypothetical case, the long-term injection of CO 2 until the initial reservoir pressure is exceeded by as much as 40% over a period of about 100 years. The process is analyzed from the geomechanical point of view using a finite element-interface element (FE-IE) model with the following main issues addressed: (1) prediction of the possible land vertical uplift and corresponding impact on the ground infrastructures; (2) evaluation of the stress state induced in the reservoir formation with the possible generation of fractures and (3) a risk analysis for the activation of existing faults. The geomechanical constitutive law of the Northern Adriatic basin relying on the radioactive marker interpretation is implemented into the FE model, while an elasto-plastic relationship based on the Mohr-Coulomb criterion is used for the IE reproducing the fault behaviour. The in situ stress prior to the gas field exploitation is compressive with the principal horizontal stress in the direction perpendicular to the major faults equal to the vertical stress. The results show that the ground surface rebound due to the overpressure generated by the CO 2 sequestration partially mitigates the land subsidence experienced by the area because of the previous gas field depletion with differential displacements that are confined within the safety bounds suggested in the literature for the surface infrastructures. Activation of a few faults lying close to the northern reservoir boundary points to a slip of a couple of

  13. Coupled modeling of land hydrology–regional climate including human carbon emission and water exploitation

    Directory of Open Access Journals (Sweden)

    Zheng-Hui Xie

    2017-06-01

    Full Text Available Carbon emissions and water use are two major kinds of human activities. To reveal whether these two activities can modify the hydrological cycle and climate system in China, we conducted two sets of numerical experiments using regional climate model RegCM4. In the first experiment used to study the climatic responses to human carbon emissions, the model were configured over entire China because the impacts of carbon emissions can be detected across the whole country. Results from the first experiment revealed that near-surface air temperature may significantly increase from 2007 to 2059 at a rate exceeding 0.1 °C per decade in most areas across the country; southwestern and southeastern China also showed increasing trends in summer precipitation, with rates exceeding 10 mm per decade over the same period. In summer, only northern China showed an increasing trend of evapotranspiration, with increase rates ranging from 1 to 5 mm per decade; in winter, increase rates ranging from 1 to 5 mm per decade were observed in most regions. These effects are believed to be caused by global warming from human carbon emissions. In the second experiment used to study the effects of human water use, the model were configured over a limited region—Haihe River Basin in the northern China, because compared with the human carbon emissions, the effects of human water use are much more local and regional, and the Haihe River Basin is the most typical region in China that suffers from both intensive human groundwater exploitation and surface water diversion. We incorporated a scheme of human water regulation into RegCM4 and conducted the second experiment. Model outputs showed that the groundwater table severely declined by ∼10 m in 1971–2000 through human groundwater over-exploitation in the basin; in fact, current conditions are so extreme that even reducing the pumping rate by half cannot eliminate the groundwater depletion cones observed in the area

  14. Exploitation of distributed scatterers in synthetic aperture radar interferometry

    NARCIS (Netherlands)

    Samiei Esfahany, S.

    2017-01-01

    During the last decades, time-series interferometric synthetic aperture radar (InSAR) has emerged as a powerful technique to measure various surface deformation phenomena of the earth. Early generations of time-series InSAR methodologies, i.e. Persistent Scatterer Interferometry (PSI), focused on

  15. Rethinking research on sexual exploitation of boys: Methodological challenges and recommendations to optimize future knowledge generation.

    Science.gov (United States)

    Mitchell, Katherine; Moynihan, Melissa; Pitcher, Claire; Francis, Annabel; English, Abigail; Saewyc, Elizabeth

    2017-04-01

    Research and policies on child and adolescent sexual exploitation frequently focus on the sexual exploitation of girls and fail to recognize the experiences of sexually exploited boys, including their potentially unique health care and social support needs. This oversight limits the ability of health care and social service providers to offer both targeted and evidence informed care to sexually exploited boys. As a first step in a larger grant to understand the experiences of sexually exploited boys and to develop interventions for this specific population, we conducted a systematic review to address the question, "What is the state of the research on sexually exploited boys internationally?" As we undertook this review, we faced a number of significant challenges that made the process more difficult than anticipated. In this paper we discuss four key methodological challenges we encountered: lack of a consistent definition of child and adolescent sexual exploitation, difficulties in differentiating sexual exploitation as a specific concept within child sexual abuse, failure to disaggregate data usefully across multiple variables, and limited epidemiological studies to inform prevalence. We reflect on how these challenges limited our ability to systematically analyze, synthesize, and interpret the available research. We conclude by making recommendations to improve the state of the research regarding sexually exploited boys with the aim of better informing future policy and practice. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  16. Financial Exploitation Is Associated With Structural and Functional Brain Differences in Healthy Older Adults.

    Science.gov (United States)

    Spreng, R Nathan; Cassidy, Benjamin N; Darboh, Bri S; DuPre, Elizabeth; Lockrow, Amber W; Setton, Roni; Turner, Gary R

    2017-10-01

    Age-related brain changes leading to altered socioemotional functioning may increase vulnerability to financial exploitation. If confirmed, this would suggest a novel mechanism leading to heightened financial exploitation risk in older adults. Development of predictive neural markers could facilitate increased vigilance and prevention. In this preliminary study, we sought to identify structural and functional brain differences associated with financial exploitation in older adults. Financially exploited older adults (n = 13, 7 female) and a matched cohort of older adults who had been exposed to, but avoided, a potentially exploitative situation (n = 13, 7 female) were evaluated. Using magnetic resonance imaging, we examined cortical thickness and resting state functional connectivity. Behavioral data were collected using standardized cognitive assessments, self-report measures of mood and social functioning. The exploited group showed cortical thinning in anterior insula and posterior superior temporal cortices, regions associated with processing affective and social information, respectively. Functional connectivity encompassing these regions, within default and salience networks, was reduced, while between network connectivity was increased. Self-reported anger and hostility was higher for the exploited group. We observed financial exploitation associated with brain differences in regions involved in socioemotional functioning. These exploratory and preliminary findings suggest that alterations in brain regions implicated in socioemotional functioning may be a marker of financial exploitation risk. Large-scale, prospective studies are necessary to validate this neural mechanism, and develop predictive markers for use in clinical practice. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America.

  17. 75 FR 40838 - Establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation

    Science.gov (United States)

    2010-07-14

    ..., training, and coordination. Membership and Designation The Secretary is soliciting nominations for... experience and expertise in elder abuse, neglect, and exploitation prevention, detection, treatment...

  18. Integrated light-sheet imaging and flow-based enquiry (iLIFE) system for 3D in-vivo imaging of multicellular organism

    Science.gov (United States)

    Rasmi, Chelur K.; Padmanabhan, Sreedevi; Shirlekar, Kalyanee; Rajan, Kanhirodan; Manjithaya, Ravi; Singh, Varsha; Mondal, Partha Pratim

    2017-12-01

    We propose and demonstrate a light-sheet-based 3D interrogation system on a microfluidic platform for screening biological specimens during flow. To achieve this, a diffraction-limited light-sheet (with a large field-of-view) is employed to optically section the specimens flowing through the microfluidic channel. This necessitates optimization of the parameters for the illumination sub-system (illumination intensity, light-sheet width, and thickness), microfluidic specimen platform (channel-width and flow-rate), and detection sub-system (camera exposure time and frame rate). Once optimized, these parameters facilitate cross-sectional imaging and 3D reconstruction of biological specimens. The proposed integrated light-sheet imaging and flow-based enquiry (iLIFE) imaging technique enables single-shot sectional imaging of a range of specimens of varying dimensions, ranging from a single cell (HeLa cell) to a multicellular organism (C. elegans). 3D reconstruction of the entire C. elegans is achieved in real-time and with an exposure time of few hundred micro-seconds. A maximum likelihood technique is developed and optimized for the iLIFE imaging system. We observed an intracellular resolution for mitochondria-labeled HeLa cells, which demonstrates the dynamic resolution of the iLIFE system. The proposed technique is a step towards achieving flow-based 3D imaging. We expect potential applications in diverse fields such as structural biology and biophysics.

  19. Host exploitation strategies of the social parasite Maculinea alcon

    DEFF Research Database (Denmark)

    Fürst, Matthias Alois

    into the nest where it will feed on ant regurgitations and ant brood. It is thus crucial for the caterpillar's survival to attract the host ant, get picked up and brought back to the ant's colony. My study shows that 3rd and 4th instar caterpillars are distinct from each other not only morphologically but also...... in their surface chemistry. 3rd instars are passively gaining parts of their surface chemistry from the food plant, while 4th instar caterpillars are actively mimicking the cuticular hydrocarbons of the host ant's brood, ensuring their adoption and integration into the ants nest. As the caterpillar constitutes...... factors including genetic-, chemical- and physical-distance, queen number, and whether they are from an area where the social parasite is present. Ants rely on chemical cues to discriminate nestmates from non-nestmates. The recognition cues are not static though and ants have evolved to adapt to the ever...

  20. Surface Plasmon Nanophotonics

    CERN Document Server

    Brongersma, Mark L

    2007-01-01

    The development of advanced dielectric photonic structures has enabled tremendous control over the propagation and manipulation of light. Structures such as waveguides, splitters, mixers, and resonators now play a central role in the telecommunications industry. This book will discuss an exciting new class of photonic devices, known as surface plasmon nanophotonic structures. Surface plasmons are easily accessible excitations in metals and semiconductors and involve a collective motion of the conduction electrons. These excitations can be exploited to manipulate electromagnetic waves at optical frequencies ("light") in new ways that are unthinkable in conventional dielectric structures. The field of plasmon nanophotonics is rapidly developing and impacting a wide range of areas including: electronics, photonics, chemistry, biology, and medicine. The book will highlight several exciting new discoveries that have been made, while providing a clear discussion of the underlying physics, the nanofabrication issues...

  1. The Logic and Realism of the Hypothesis of Exploitation Ecosystems.

    Science.gov (United States)

    Oksanen, Lauri; Oksanen, Tarja

    2000-06-01

    Hypotheses on trophic dynamics in terrestrial ecosystems fall into two major categories: those in which plants are assumed to be invulnerable to their consumers and those in which the build-up of plant biomass is assumed to require top-down control of folivores. The hypothesis of exploitation ecosystems (EEH) belongs to the latter category and focuses particularly on the consequences of the high energetic costs of maintenance of endotherms. Carnivorous endotherms require relatively high prey densities in order to break even. Moreover, they are dependent on folivorous prey during the limiting season, at least at high latitudes. The endotherm branch of the grazing web is thus predicted to collapse from three-link trophic dynamics (carnivores → folivores → plants → inorganic resources) to two-link dynamics (folivores → plants → inorganic resources) along gradients of decreasing primary productivity. Consequently, the vegetation of cold and unproductive areas is predicted to be under intense winter grazing pressure, which prevents the accumulation of aboveground plant biomass and excludes erect woody plants. In the most extreme habitats (e.g., polar deserts and their high alpine counterparts), even folivorous endotherms are predicted to be absent, and the scanty vegetation is predicted to be structured by preemptive competition. Within temperature-determined productivity gradients, EEH is corroborated by biomass patterns, by patterns in the structure and dynamics of carnivore, folivore, and plant communities, and by experimental results. The general idea of top-down trophic dynamics is supported for other autotroph-based systems, too, but the relevance and sufficiency of the energy constraint in explaining patterns in trophic dynamics appears to be variable. Moreover, critical empirical evidence for or against the capacity of folivorous insects to regulate plant biomass has not yet been obtained. Another open question is the ability of boreal and temperate

  2. Exploiting the systematic review protocol for classification of medical abstracts.

    Science.gov (United States)

    Frunza, Oana; Inkpen, Diana; Matwin, Stan; Klement, William; O'Blenis, Peter

    2011-01-01

    To determine whether the automatic classification of documents can be useful in systematic reviews on medical topics, and specifically if the performance of the automatic classification can be enhanced by using the particular protocol of questions employed by the human reviewers to create multiple classifiers. The test collection is the data used in large-scale systematic review on the topic of the dissemination strategy of health care services for elderly people. From a group of 47,274 abstracts marked by human reviewers to be included in or excluded from further screening, we randomly selected 20,000 as a training set, with the remaining 27,274 becoming a separate test set. As a machine learning algorithm we used complement naïve Bayes. We tested both a global classification method, where a single classifier is trained on instances of abstracts and their classification (i.e., included or excluded), and a novel per-question classification method that trains multiple classifiers for each abstract, exploiting the specific protocol (questions) of the systematic review. For the per-question method we tested four ways of combining the results of the classifiers trained for the individual questions. As evaluation measures, we calculated precision and recall for several settings of the two methods. It is most important not to exclude any relevant documents (i.e., to attain high recall for the class of interest) but also desirable to exclude most of the non-relevant documents (i.e., to attain high precision on the class of interest) in order to reduce human workload. For the global method, the highest recall was 67.8% and the highest precision was 37.9%. For the per-question method, the highest recall was 99.2%, and the highest precision was 63%. The human-machine workflow proposed in this paper achieved a recall value of 99.6%, and a precision value of 17.8%. The per-question method that combines classifiers following the specific protocol of the review leads to better

  3. Virtual Geophysics Laboratory: Exploiting the Cloud and Empowering Geophysicsts

    Science.gov (United States)

    Fraser, Ryan; Vote, Josh; Goh, Richard; Cox, Simon

    2013-04-01

    Over the last five decades geoscientists from Australian state and federal agencies have collected and assembled around 3 Petabytes of geoscience data sets under public funding. As a consequence of technological progress, data is now being acquired at exponential rates and in higher resolution than ever before. Effective use of these big data sets challenges the storage and computational infrastructure of most organizations. The Virtual Geophysics Laboratory (VGL) is a scientific workflow portal addresses some of the resulting issues by providing Australian geophysicists with access to a Web 2.0 or Rich Internet Application (RIA) based integrated environment that exploits eResearch tools and Cloud computing technology, and promotes collaboration between the user community. VGL simplifies and automates large portions of what were previously manually intensive scientific workflow processes, allowing scientists to focus on the natural science problems, rather than computer science and IT. A number of geophysical processing codes are incorporated to support multiple workflows. For example a gravity inversion can be performed by combining the Escript/Finley codes (from the University of Queensland) with the gravity data registered in VGL. Likewise, tectonic processes can also be modeled by combining the Underworld code (from Monash University) with one of the various 3D models available to VGL. Cloud services provide scalable and cost effective compute resources. VGL is built on top of mature standards-compliant information services, many deployed using the Spatial Information Services Stack (SISS), which provides direct access to geophysical data. A large number of data sets from Geoscience Australia assist users in data discovery. GeoNetwork provides a metadata catalog to store workflow results for future use, discovery and provenance tracking. VGL has been developed in collaboration with the research community using incremental software development practices and open

  4. Exploitation dynamics of small fish stocks like Arctic cisco

    Science.gov (United States)

    Nielsen, Jennifer L.

    2004-01-01

    Potential impacts to the Arctic cisco population fall into both demographic and behavioral categories. Possible demographic impacts include stock recruitment effects, limited escapement into marine habitats, and variable age-class reproductive success. Potential behavioral impacts involve migratory patterns, variable life histories, and strategies for seasonal feeding. Arctic cisco stocks are highly susceptible to over-exploitation due to our limited basic knowledge of the highly variable Arctic environment and the role they play in this dynamic ecosystem.Our knowledge of potential demographic changes is very limited, and it is necessary to determine the abundance and recruitment of the hypothesized Mackenzie River source population, the extent of the coastal migratory corridor, growth patterns, and coastal upwelling and mixing effects on population dynamics for this species. Information needed to answer some of the demographic questions includes basic evolutionary history and molecular genetics of Arctic cisco (for instance, are there contributions to the Arctic cisco stock from the Yukon?), what is the effective population size (i.e., breeding population size), and potential links to changes in climate. The basic behavioral questions include migratory and variable life history questions. For instance, the extent of movement back and forth between freshwater and the sea, age-specific differences in food web dynamics, and nearshore brackish and high salinity habitats are topics that should be studied. Life history data should be gathered to understand the variation in age at reproduction, salinity tolerance, scale and duration of the freshwater stage, survival, and adult migration. Both molecular and ecological tools should be integrated to manage the Arctic cisco stock(s), such as understanding global climate changes on patterns of harvest and recruitment, and the genetics of population structure and colonization. Perhaps other populations are contributing to the

  5. On the exploitation of seismic resonances for cavity detection

    Science.gov (United States)

    Schneider, Felix M.; Esterhazy, Sofi; Perugia, Ilaria; Bokelmann, Götz

    2017-04-01

    . In synthetic seismograms calculated in the surrounding elastic domain, the acoustic resonances of gas-filled cavities show up as persisting oscillations. However, due to the weak acoustic-elastic coupling in this case the amplitudes of the oscillations are very low. Due to a lower impedance contrast, a fluid-filled cavity has a stronger acoustic-elastic coupling, which results in wide spectral peaks of lower amplitudes. In the synthetic seismograms derived in the surrounding medium of fluid-filled cavities, acoustic resonances show up as strong but fast decaying reverberations. Based on the analytical modeling methods for exploitation of these resonance features are developed and discussed.

  6. Perfected oil rig for offshore drilling and exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Ninger, M.; Thomas, P.A.; Naudin, J.C.

    1988-01-15

    An oil rig consisting of a shell supported by legs resting on the sea bed is presented. At least one of the legs contains a space in which is found the equipment linking the shell to the sea bed. The drilling platform is in the shell, and can be moved above the crosswise section of the leg containing the equipment. This equipment is protected in a more efficient fashion, and the well head can be brought to the surface without stressing the rig.

  7. Lake Erie: Effects of exploitation, environmental changes and new species on the fishery resources

    Science.gov (United States)

    Hartman, Wilbur L.

    1972-01-01

    In no other lake as large as Lake Erie (surface area, 25,690 km2) have such extensive changes taken place in the drainage basin, the lake environment, and the fish populations over the last 100 years. Deforestation and prairie burning led to erosion and siltation of valuable spawning grounds. Marsh spawning areas were drained. Lake-to-river spawning migrations were blocked by mill dams. Accelerated cultural nutrient loading increased total dissolved solids by nearly 50% (1920-70). Average summer water temperatures increased 1.1 C. Phytoplankton and zooplankton abundance increased severalfold. Severe oxygen depletion developed in the bottom waters of all three basins of the lake. Lake sturgeon were fished out as nuisance fish in the late 1800s. The commercial fisheries for lake trout, lake whitefish, and lake herring collapsed by 1940 and those for blue pike and walleye by 1960. Yellow perch production became unstable in the 1960s. The effects of exploitation, environmental changes, and new species on these fish populations are discussed.

  8. Data mining tools for Sentinel 1 and Sentinel 2 data exploitation

    Science.gov (United States)

    Espinoza Molina, Daniela; Datcu, Mihai

    2016-10-01

    With the new planned Sentinel missions, the availability of Earth Observation data is increasing everyday offering a larger number of applications that can be created using these data. Currently, three of the five missions were launched and they are delivering a wealth of data and imagery of the Earth's surface as, for example, the Sentinel-1 carries an advanced radar instrument to provide an all-weather, day-and-night supply of Earth imagery. The second mission, the Sentinel-2, carries an optical instrument payload that will sample 13 spectral bands at different resolutions. Even though, we count on tools for automated loading and visual exploration of the Sentinel data, we still face the problem of extracting relevant structures from the images, finding similar patterns in a scene, exploiting the data, and creating final user applications based on these processed data. In this paper, we present our approach for processing radar and multi-spectral Sentinel data. Our approach is mainly composed of three steps: 1) the generation of a data model that explains the information contained in a Sentinel product. The model is formed by primitive descriptors and metadata entries, 2) the storage of this model in a database system, 3) the semantic definition of the image content based on machine learning algorithms and relevance feedback methods.

  9. Plant defense against herbivorous pests: exploiting resistance and tolerance traits for sustainable crop protection

    Directory of Open Access Journals (Sweden)

    Carolyn Mitchell

    2016-07-01

    Full Text Available Interactions between plants and insect herbivores are important determinants of plant productivity in managed and natural vegetation. In response to attack, plants have evolved a range of defenses to reduce the threat of injury and loss of productivity. Crop losses from damage caused by arthropod pests can exceed 15% annually. Crop domestication and selection for improved yield and quality can alter the defensive capability of the crop, increasing reliance on artificial crop protection. Sustainable agriculture, however, depends on reduced chemical inputs. There is an urgent need, therefore, to identify plant defensive traits for crop improvement. Plant defense can be divided into resistance and tolerance strategies. Plant traits that confer herbivore resistance typically prevent or reduce herbivore damage through expression of traits that deter pests from settling, attaching to surfaces, feeding and reproducing, or that reduce palatability. Plant tolerance of herbivory involves expression of traits that limit the negative impact of herbivore damage on productivity and yield. Identifying the defensive traits expressed by plants to deter herbivores or limit herbivore damage, and understanding the underlying defense mechanisms, is crucial for crop scientists to exploit plant defensive traits in crop breeding. In this review, we assess the traits and mechanisms underpinning herbivore resistance and tolerance, and conclude that physical defense traits, plant vigor and herbivore-induced plant volatiles show considerable utility in pest control, along with mixed species crops. We highlight emerging approaches for accelerating the identification of plant defensive traits and facilitating their deployment to improve the future sustainability of crop protection.

  10. Exploiting Free-Energy Minima to Design Novel EphA2 Protein-Protein Antagonists: From Simulation to Experiment and Return.

    Science.gov (United States)

    Russo, Simonetta; Callegari, Donatella; Incerti, Matteo; Pala, Daniele; Giorgio, Carmine; Brunetti, Jlenia; Bracci, Luisa; Vicini, Paola; Barocelli, Elisabetta; Capoferri, Luigi; Rivara, Silvia; Tognolini, Massimiliano; Mor, Marco; Lodola, Alessio

    2016-06-06

    The free-energy surface (FES) of protein-ligand binding contains information useful for drug design. Here we show how to exploit a free-energy minimum of a protein-ligand complex identified by metadynamics simulations to design a new EphA2 antagonist with improved inhibitory potency. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Aspects économiques de l'exploitation des resources halieutiques ...

    African Journals Online (AJOL)

    Aspects économiques de l'exploitation des resources halieutiques des petits barrages du Nord de la Côte d' lvoire : Economic aspects of the exploitation of halieutic resources of petits barrages inland waters in the north of Côte d'lvoire.

  12. Exploiting the opportunities of Internet and multi-channel pricing : An exploratory research

    NARCIS (Netherlands)

    Sotgiu, Francesca; Ancarani, Fabio

    2004-01-01

    Smart firms are not worried about the impact of the Internet on pricing, but realise that they have the unique opportunity to exploit new options and improve their marketing performance. Multi-channel pricing is one of the most interesting opportunities firms can exploit in the digital economy.

  13. Social Workers' Knowledge of and Experience with Sexual Exploitation by Psychotherapists.

    Science.gov (United States)

    Sloan, Lacey; Edmond, Tonya; Rubin, Allen; Doughty, Michael

    1998-01-01

    Surveyed social workers in Texas to determine (1) if they treat those who have been sexually exploited by psychotherapists and (2) if they are aware of recent state legislation regarding this issue. Results show that Texas social workers do work with victims of sexual exploitation and that education for social workers concerning the legislation is…

  14. EM-Based Optimization Exploiting Partial Space Mapping and Exact Sensitivities

    DEFF Research Database (Denmark)

    Bandler, J. W.; Mohamed, A. S.; Bakr, M. H.

    2002-01-01

    We present a family of robust techniques for exploiting sensitivities in EM-based circuit optimization through Space Mapping (SM). We utilize derivative Information for parameter extractions and mapping updates. We exploit a Partial Space Mapping (PSM) concept where a reduced set of parameters...

  15. Exploration and exploitation within SMEs: connecting the CEO's cognitive style to product innovation performance.

    NARCIS (Netherlands)

    de Visser, Matthias; Faems, D.L.M.; van den Top, Peter

    2011-01-01

    Previous research on exploration and exploitation focuses on the firm and business unit level. Therefore, conceptual and empirically validated understanding about exploration and exploitation at the individual level of analysis is scarce. This paper addresses this gap in the literature by

  16. Sequential Ambidexterity in Practice : A Longitudinal study on shifts from exploration to exploitation and vice versa

    NARCIS (Netherlands)

    de Visser, Matthias; Faems, Dries; Visscher, Klaasjan; de Weerd-Nederhof, Petronella C.

    2017-01-01

    The poster shows highlights of a study aimed at providing in-depth insights into the dynamics of a growing organization’s exploration and exploitation levels, demonstrating how structural and individual factors change an organization’s exploration and exploitation over time. A fast-growing research

  17. The Role of Ambidexterity in Marketing Strategy Implementation: Resolving the Exploration-Exploitation Dilemma

    OpenAIRE

    Prange, Christiane; Schlegelmilch, Bodo B.

    2009-01-01

    Formulating consistent marketing strategies is a difficult task, but successfully implementing them is even more challenging. This is even more pertinent as marketing strategies quite often incorporate inherent conflicts between major breakthroughs and consolidation. Consequently, marketers need to balance exploratory and exploitative strategies. However, the literature lacks concrete insights for marketing managers as to how exploratory and exploitative strategies can be best com...

  18. Nuptial gifts of male spiders: sensory exploitation of the female's maternal care instinct or foraging motivation?

    DEFF Research Database (Denmark)

    Bilde, T.; Tuni, Cristina; Elsayed, Rehab

    2007-01-01

    Nuptial feeding can evolve as sensory traps where the male exploits the female's foraging motivation in a sexual context. The nuptial prey gift of the nursery-web spider Pisaura mirabilis is wrapped in white silk, and it has been suggested that males initially exploit the maternal care instinct...

  19. Wyner-Ziv Coding of Depth Maps Exploiting Color Motion Information

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Zamarin, Marco; Forchhammer, Søren

    2013-01-01

    of depth maps exploiting corresponding color information is proposed. Due to the high correlation of the motion in color and corresponding depth videos, motion information from the decoded color signal can effectively be exploited to generate accurate side information for the depth signal, allowing...

  20. Exploitation of Factory Workers: A Study of Union Dicon Salt, Lagos ...

    African Journals Online (AJOL)

    The study examined labour exploitation in Nigeria with particular reference to Union Dicon Salt Plc., Lagos. The review of literature points to the fact that exploitation of the factory workers in the long run leads to strained relationships between management and staff. The situation becomes conflictual to the extent that both ...

  1. 44 Rural Fuelwood Exploitation in Mbo Local Government Area – A ...

    African Journals Online (AJOL)

    `123456789jkl''''#

    depend on the use of fuel wood as a source of energy and fuel, the demand for its exploitation has continued to increase. The rate of fuel wood exploitation in the LGA is so enormous that the LGA is almost reaching scarcity crisis situation. The search for fuel wood which was once a simple chore has turned to a day's labour.

  2. Legal Approaches to Combating the Exploitation of Third-Country National Seasonal Workers

    NARCIS (Netherlands)

    Rijken, Conny

    2015-01-01

    The Directive on Seasonal workers is aimed at combating exploitative practices vis-a-vis seasonal workers from outside the EU. After a thorough analysis of the conditions under which practices can be qualified as exploitative, this article assesses the extent to which the directive is equipped to

  3. Ambidextrous Leadership and Employees' Self-reported Innovative Performance: The Role of Exploration and Exploitation Behaviors

    Science.gov (United States)

    Zacher, Hannes; Robinson, Alecia J.; Rosing, Kathrin

    2016-01-01

    The ambidexterity theory of leadership for innovation proposes that leaders' opening and closing behaviors positively predict employees' exploration and exploitation behaviors, respectively. The interaction of exploration and exploitation behaviors, in turn, is assumed to influence employee innovative performance, such that innovative performance…

  4. Impact socio-environnemental de l'exploitation du sable marin sur le ...

    African Journals Online (AJOL)

    The results show that the exploitation of marine sand sea coast of Grand -Popo is done with the full knowledge of the Mayor who profits by collecting taxes. In addition, the uncontrolled exploitation increased coastal erosion and does little to improve the conditions of economic and social life of the people who indulge ...

  5. Targeting cell adhesion molecules with nanoparticles using in vivo and flow-based in vitro models of atherosclerosis.

    Science.gov (United States)

    Khodabandehlou, Khosrow; Masehi-Lano, Jacqueline J; Poon, Christopher; Wang, Jonathan; Chung, Eun Ji

    2017-04-01

    Atherosclerosis is a leading cause of death worldwide; in addition to lipid dysfunction, chronic arterial wall inflammation is a key component of atherosclerosis. Techniques that target cell adhesion molecules, which are overexpressed during inflammation, are effective methods to detect and treat atherosclerosis. Specifically, research groups have identified vascular cell adhesion molecule-1, intercellular adhesion molecule-1, platelet endothelial cell adhesion molecule, and selectins (E-selectin and P-selectin) as correlated to atherogenesis. In this review, we discuss recent strategies both in vivo and in vitro that target cell adhesion molecules. First, we discuss peptide-based and antibody (Ab)-based nanoparticles utilized in vivo for diagnostic, therapeutic, and theranostic applications. Second, we discuss flow-based in vitro models that serve to reduce the traditional disadvantages of in vivo studies such as variability, time to develop the disease, and ethical burden, but preserve physiological relevance. The knowledge gained from these targeting studies can be translated into clinical solutions for improved detection, prevention, and treatment of atherosclerosis. Impact statement As atherosclerosis remains the leading cause of death, there is an urgent need to develop better tools for treatment of the disease. The ability to improve current treatments relies on enhancing the accuracy of in vitro and in vivo atherosclerotic models. While in vivo models provide all the relevant testing parameters, variability between animals and among models used is a barrier to reproducible results and comparability of NP efficacy. In vitro cultures isolate cells into microenvironments that fail to take into account flow separation and shear stress, which are characteristics of atherosclerotic lesions. Flow-based in vitro models provide more physiologically relevant platforms, bridging the gap between in vivo and 2D in vitro models. This is the first review that

  6. Should blood flow during cardiopulmonary bypass be individualized more than to body surface area?

    DEFF Research Database (Denmark)

    Thomassen, Sisse Anette; Larsson, A; Andreasen, Jan Jesper

    Blood flow during cardiopulmonary bypass (CPB) is calculated on body surface area (BSA). Increasing comorbidity, age and weight of today's cardiac patients question this calculation as it may not reflect individual metabolic requirement. The hypothesis was that a measured cardiac index (CI) prior...... not improve cerebral and systemic oxygenation compared to a blood flow based on BSA....

  7. Exploiting interfacial water properties for desalination and purification applications.

    Energy Technology Data Exchange (ETDEWEB)

    Xu, Hongwu (Los Alamos National Laboratory, Los Alamos, NM); Varma, Sameer; Nyman, May Devan; Alam, Todd Michael; Thuermer, Konrad; Holland, Gregory P.; Leung, Kevin; Liu, Nanguo (University of New Mexico Albuquerque, NM); Xomeritakis, George K. (University of New Mexico Albuquerque, NM); Frankamp, Benjamin L.; Siepmann, J. Ilja (University of Minnesota, Minneapolis, MN); Cygan, Randall Timothy; Hartl, Monika A. (Los Alamos National Laboratory, Los Alamos, NM); Travesset, Alex (Iowa State University, Ames, IA); Anderson, Joshua A. (Iowa State University, Ames, IA); Huber, Dale L.; Kissel, David J. (University of New Mexico Albuquerque, NM); Bunker, Bruce Conrad; Lorenz, Christian Douglas; Major, Ryan C. (University of Minnesota, Minneapolis, MN); McGrath, Matthew J. (University of Minnesota, Minneapolis, MN); Farrow, Darcie; Cecchi, Joseph L. (University of New Mexico Albuquerque, NM); van Swol, Frank B.; Singh, Seema; Rempe, Susan B.; Brinker, C. Jeffrey; Clawson, Jacalyn S.; Feibelman, Peter Julian; Houston, Jack E.; Crozier, Paul Stewart; Criscenti, Louise Jacqueline; Chen, Zhu (University of New Mexico Albuquerque, NM); Zhu, Xiaoyang (University of Minnesota, Minneapolis, MN); Dunphy, Darren Robert (University of New Mexico Albuquerque, NM); Orendorff, Christopher J.; Pless, Jason D.; Daemen, Luke L. (Los Alamos National Laboratory, Los Alamos, NM); Gerung, Henry (University of New Mexico Albuquerque, NM); Ockwig, Nathan W.; Nenoff, Tina Maria; Jiang, Ying-Bing; Stevens, Mark Jackson

    2008-09-01

    A molecular-scale interpretation of interfacial processes is often downplayed in the analysis of traditional water treatment methods. However, such an approach is critical for the development of enhanced performance in traditional desalination and water treatments. Water confined between surfaces, within channels, or in pores is ubiquitous in technology and nature. Its physical and chemical properties in such environments are unpredictably different from bulk water. As a result, advances in water desalination and purification methods may be accomplished through an improved analysis of water behavior in these challenging environments using state-of-the-art microscopy, spectroscopy, experimental, and computational methods.

  8. Operational Decision Aids for Exploiting or Mitigating Electromagnetic Propagation Effects

    Science.gov (United States)

    1989-09-01

    centre de la terre et dont laxe if est dirige dans le sens du dipole electrique vertical modelisant la source. Le changement de variable : H 4 4-A,4) J2...electric dipole ) source and observer locations of interest are at levels above the earth which are small compared to the earth’s radius, it is...system, we consider wave propagation due to a vertical electric dipole located near the earth’s surface in a radially varying troposphere modeled by a

  9. THE INFLUENCE OF DISCONTINUITY FABRIC AND OTHER FACTORS ON OPTIMUM EXPLOITATION OF DIMENSION STONE

    Directory of Open Access Journals (Sweden)

    Ivan Tomašić

    1994-12-01

    Full Text Available Dimension stone as a specific nonmetallic raw material, regarding deposit conditions, exploitation methods and processing, demands an adequate estimate of dimensioning i.e. opti-malizalion of the exploitation in relation to the structural elements. The analyzed and presented examples show that in natural conditions adaptation of the exploitation technology to the discontinuity fabric could result in considerable gains in utilization of rock mass in stone blocks, specialy if these blocks are cases of highly decorative stone with good physical and mechanical properties. The calculated and presented diagrams fit well into world analysis trends concerning exploitation and processing of dimension stone, This is confirmed by the improvement of technology for smaller stone blocks can be exploited and processed profitably.

  10. Local Perspectives on Environmental Insecurity and Its Influence on Illegal Biodiversity Exploitation.

    Science.gov (United States)

    Gore, Meredith L; Lute, Michelle L; Ratsimbazafy, Jonah H; Rajaonson, Andry

    2016-01-01

    Environmental insecurity is a source and outcome of biodiversity declines and social conflict. One challenge to scaling insecurity reduction policies is that empirical evidence about local attitudes is overwhelmingly missing. We set three objectives: determine how local people rank risk associated with different sources of environmental insecurity; assess perceptions of environmental insecurity, biodiversity exploitation, myths of nature and risk management preferences; and explore relationships between perceptions and biodiversity exploitation. We conducted interviews (N = 88) with residents of Madagascar's Torotorofotsy Protected Area, 2014. Risk perceptions had a moderate effect on perceptions of environmental insecurity. We found no effects of environmental insecurity on biodiversity exploitation. Results offer one if not the first exploration of local perceptions of illegal biodiversity exploitation and environmental security. Local people's perception of risk seriousness associated with illegal biodiversity exploitation such as lemur hunting (low overall) may not reflect perceptions of policy-makers (considered to be high). Discord is a key entry point for attention.

  11. [Impacts of hydroelectric cascade exploitation on river ecosystem and landscape: a review].

    Science.gov (United States)

    Yang, Kun; Deng, Xi; Li, Xue-Ling; Wen, Ping

    2011-05-01

    Hydroelectric cascade exploitation, one of the major ways for exploiting water resources and developing hydropower, not only satisfies the needs of various national economic sectors, but also promotes the socio-economic sustainable development of river basin. unavoidable anthropogenic impacts on the entire basin ecosystem. Based on the process of hydroelectric cascade exploitation and the ecological characteristics of river basins, this paper reviewed the major impacts of hydroelectric cascade exploitation on dam-area ecosystems, river reservoirs micro-climate, riparian ecosystems, river aquatic ecosystems, wetlands, and river landscapes. Some prospects for future research were offered, e.g., strengthening the research of chain reactions and cumulative effects of ecological factors affected by hydroelectric cascade exploitation, intensifying the study of positive and negative ecological effects under the dam networks and their joint operations, and improving the research of successional development and stability of basin ecosystems at different temporal and spatial scales.

  12. Local Perspectives on Environmental Insecurity and Its Influence on Illegal Biodiversity Exploitation.

    Directory of Open Access Journals (Sweden)

    Meredith L Gore

    Full Text Available Environmental insecurity is a source and outcome of biodiversity declines and social conflict. One challenge to scaling insecurity reduction policies is that empirical evidence about local attitudes is overwhelmingly missing. We set three objectives: determine how local people rank risk associated with different sources of environmental insecurity; assess perceptions of environmental insecurity, biodiversity exploitation, myths of nature and risk management preferences; and explore relationships between perceptions and biodiversity exploitation. We conducted interviews (N = 88 with residents of Madagascar's Torotorofotsy Protected Area, 2014. Risk perceptions had a moderate effect on perceptions of environmental insecurity. We found no effects of environmental insecurity on biodiversity exploitation. Results offer one if not the first exploration of local perceptions of illegal biodiversity exploitation and environmental security. Local people's perception of risk seriousness associated with illegal biodiversity exploitation such as lemur hunting (low overall may not reflect perceptions of policy-makers (considered to be high. Discord is a key entry point for attention.

  13. Robust fluoroscopic tracking of fiducial markers: exploiting the spatial constraints

    International Nuclear Information System (INIS)

    Li Rui; Sharp, Gregory

    2013-01-01

    Two new fluoroscopic fiducial tracking methods that exploit the spatial relationship among the multiple implanted fiducial to achieve fast, accurate and robust tracking are proposed in this paper. The spatial relationship between multiple implanted markers are modeled as Gaussian distributions of their pairwise distances over time. The means and standard deviations of these distances are learned from training sequences, and pairwise distances that deviate from these learned distributions are assigned a low spatial matching score. The spatial constraints are incorporated in two different algorithms: a stochastic tracking method and a detection based method. In the stochastic method, hypotheses of the ‘true’ fiducial position are sampled from a pre-trained respiration motion model. Each hypothesis is assigned an importance value based on image matching score and spatial matching score. Learning the parameters of the motion model is needed in addition to learning the distribution parameters of the pairwise distances in the proposed stochastic tracking approach. In the detection based method, a set of possible marker locations are identified by using a template matching based fiducial detector. The best location is obtained by optimizing the image matching score and spatial matching score through non-serial dynamic programming. In this detection based approach, there is no need to learn the respiration motion model. The two proposed algorithms are compared with a recent work using a multiple hypothesis tracking (MHT) algorithm which is denoted by MHT, Tang et al (2007 Phys. Med. Biol. 52 4081–98). Phantom experiments were performed using fluoroscopic videos captured with known motion relative to an anthropomorphic phantom. The patient experiments were performed using a retrospective study of 16 fluoroscopic videos of liver cancer patients with implanted fiducials. For the motion phantom data sets, the detection based approach has the smallest tracking error (

  14. Exploiting CMS data popularity to model the evolution of data management for Run-2 and beyond

    International Nuclear Information System (INIS)

    Bonacorsi, D; Neri, M; Boccali, T; Giordano, D; Girone, M; Magini, N; Kuznetsov, V; Wildish, T

    2015-01-01

    During the LHC Run-1 data taking, all experiments collected large data volumes from proton-proton and heavy-ion collisions. The collisions data, together with massive volumes of simulated data, were replicated in multiple copies, transferred among various Tier levels, transformed/slimmed in format/content. These data were then accessed (both locally and remotely) by large groups of distributed analysis communities exploiting the WorldWide LHC Computing Grid infrastructure and services. While efficient data placement strategies - together with optimal data redistribution and deletions on demand - have become the core of static versus dynamic data management projects, little effort has so far been invested in understanding the detailed data-access patterns which surfaced in Run-1. These patterns, if understood, can be used as input to simulation of computing models at the LHC, to optimise existing systems by tuning their behaviour, and to explore next-generation CPU/storage/network co-scheduling solutions. This is of great importance, given that the scale of the computing problem will increase far faster than the resources available to the experiments, for Run-2 and beyond. Studying data-access patterns involves the validation of the quality of the monitoring data collected on the “popularity of each dataset, the analysis of the frequency and pattern of accesses to different datasets by analysis end-users, the exploration of different views of the popularity data (by physics activity, by region, by data type), the study of the evolution of Run-1 data exploitation over time, the evaluation of the impact of different data placement and distribution choices on the available network and storage resources and their impact on the computing operations. This work presents some insights from studies on the popularity data from the CMS experiment. We present the properties of a range of physics analysis activities as seen by the data popularity, and make recommendations for

  15. Evolution of exploitative interactions during diversification in Bacillus subtilis biofilms

    DEFF Research Database (Denmark)

    Dragoš, Anna; Lakshmanan, Nivedha; Martin, Marivic

    2018-01-01

    -similarly to other species-B. subtilis diversifies into distinct colony variants. These variants dramatically differ in biofilm formation abilities and expression of biofilm-related genes. In addition, using a quantitative approach, we reveal striking differences in surface complexity and hydrophobicity......Microbial biofilms are tightly packed, heterogeneous structures that serve as arenas for social interactions. Studies on Gram negative models reveal that during evolution in structured environments like biofilms, isogenic populations commonly diversify into phenotypically and genetically distinct...... variants. These variants can settle in alternative biofilm niches and develop new types of interactions that greatly influence population productivity. Here, we explore the evolutionary diversification of pellicle biofilms of the Gram positive, spore-forming bacterium Bacillus subtilis. We discover that...

  16. Exploitation of cloud top characterization from three-channel IR measurements in a physical PMW rain retrieval algorithm

    Directory of Open Access Journals (Sweden)

    F. Torricella

    2006-01-01

    Full Text Available Rainfall intensity estimates by passive microwave (PMW measurements from space perform generally better over the sea surface with respect to land, due to the problems in separating true rain signatures from those produced by surfaces having similar spectral behaviour (e.g. snow, ice, desert and semiarid grounds. The screening procedure aimed at recognizing the various surface types and delimit precipitation is based on tests that rely on PMW measurements only and global thresholds. The shortcoming is that the approach tries to discard spurious precipitating features (often detected over the land-sea border thus leading to no-rain conservative tests and thresholds. The TRMM mission, with its long record of simultaneous data from the Visible and Infrared Radiometer System (VIRS, the TRMM Microwave Imager (TMI and rain profiles from the Precipitation Radar (PR allows for unambiguous testing of the usefulness of cloud top characterization in rain detection. An intense precipitation event over the North Africa is analysed exploiting a night microphysical RGB scheme applied to VIRS measurements to classify and characterize the components of the observed scenario and to discriminate the various types of clouds. This classification is compared to the rain intensity maps derived from TMI by means of the Goddard profiling algorithm and to the near-surface rain intensities derived from PR. The comparison allows to quantify the difference between the two rain retrievals and to assess the usefulness of RGB analysis in identifying areas of precipitation.

  17. Residual coal exploitation and its impact on sustainable development of the coal industry in China

    International Nuclear Information System (INIS)

    Zhang, Yujiang; Feng, Guorui; Zhang, Min; Ren, Hongrui; Bai, Jinwen; Guo, Yuxia; Jiang, Haina; Kang, Lixun

    2016-01-01

    Although China owns large coal reserves, it now faces the problem of depletion of its coal resources in advance. The coal-based energy mix in China will not change in the short term, and a means of delaying the coal resources depletion is therefore urgently required. The residual coal was exploited first with a lower recovery percentage and was evaluated as commercially valuable damaged coal. This approach is in comparison to past evaluations when the residual coal was allocated as exploitation losses. Coal recovery rates, the calculation method of residual coal reserves and statistics of its mines in China were given. On this basis, a discussion concerning the impacts on the delay of China's coal depletion, development of coal exploitation and sustainable developments, as well as technologies and relevant policies, were presented. It is considered that the exploitation of residual coal can effectively delay China's coal depletion, inhibit the construction of new mines, redress the imbalance between supply and demand of coal in eastern China, improve the mining area environment and guarantee social stability. The Chinese government supports the exploitation technologies of residual coal. Hence, exploiting residual coal is of considerable importance in sustainable development of the coal industry in China. - Highlights: •Pay attention to residual coal under changing energy-mix environment in China. •Estimate residual coal reserves and investigate its exploitation mines. •Discuss impacts of residual coal exploitation on delay of coal depletion in China. •Discuss impacts on coal mining industry and residual coal exploitation technology. •Give corresponding policy prescriptions.

  18. Geothermal energy sources and possibilities of their exploitation

    Directory of Open Access Journals (Sweden)

    Pavol Rybár

    2007-01-01

    Full Text Available The geothermal energy is everywhere beneath the surface of the earth. The earth’s interior is enormous thermal reservoir of energy, which can be utilized if favorable geological conditions exist.The electricity generation in 1942 at Larderello was a commercial success. The installed geothermoelectric capacity had reached 127 650 kWe. Several countries were soon to follow the example set by Italy. In 1919, first geothermal wells were drilled at Beppu in Japan, followed in 1921 by wells drilled at The Geysers, California, USA. In 1958 a small geothermal power plant began operating in New Zealand; in 1959 another one in Mexico, in 1960 in the USA, followed by many other countries in the years to come.The heat source can be either a very high temperature (> 600 °C magmatic intrusion reaching relatively shallow depths (5-10 km or, as in certain low-temperature systems at the Earth's normal temperature, which increases with depth. The reservoir is a volume of hot permeable rocks from which circulating fluids extract the heat. The reservoir is generally overlain by a cover of impermeable rocks and connected to a superficial recharge area through which the meteoric waters can replace or partly replace the fluids that escape from the reservoir through springs or are extracted by boreholes. The geothermal fluid is water, in majority of cases the meteoric water, in the liquid or vapour phase, depending on its temperature and pressure. This water often carries chemicals and gases such as CO2, H2S, etc.Another source of underground heat is so called the hot dry rock. The mater is to extract heat by creating a subsurface fracture system to which water can be added through injection wells. A creation of enhanced, or engineered, geothermal system requires improving the natural permeability of rock. Rocks are permeable due to minute fractures and pore spaces between mineral grains. The injected water is heated by a contact with the rock and returns to the

  19. Groundwater exploitation management under land subsidence constraint: empirical evidence from the Hangzhou-Jiaxing-Huzhou Plain, China.

    Science.gov (United States)

    Cao, Guoliang; Han, Dongmei; Moser, Jessa

    2013-06-01

    Land subsidence caused by extensive groundwater pumping has become a factor which cannot be ignored in the sustainable exploitation of groundwater resources. The Hangzhou-Jiaxing-Huzhou Plain is one of the locations with China's most severe land subsidence problems; the region has experienced dramatic land subsidence since the 1960s. Historical records of groundwater extraction, hydraulic head, and land subsidence show the latter to be the result of continual and excessive extraction of groundwater from deep confined aquifers. This study reconstructs land subsidence using an integrated regional groundwater flow and land subsidence model. The model is calibrated using land subsidence and groundwater level measurements from 1996 to 2007. Simulation results reproduce the cones of depression for groundwater heads and nadirs of land subsidence reasonably well. The calibrated model is used to evaluate the efficacy of land subsidence prevention plans from 2008 to 2010, and to predict future land subsidence over the next decade considering several groundwater exploitation scenarios. The results show the main cause of land subsidence to be inelastic compaction of the aquifer system resulting from continuously declining water levels. The model reveals that while the area of land subsidence will continue to extend, the rate of this extension may be significantly decreased by reduction of groundwater extraction. If the current land subsidence prevention and reclamation plans are continued and surface water diversion projects implemented, though land subsidence cannot be halted, the rate at which it is occurring can be effectively reduced.

  20. Evolution of temperature and humidity in an underground repository over the exploitation period

    International Nuclear Information System (INIS)

    Benet, L.V.; Tulita, C.; Calsyn, L.; Wendling, J.

    2012-01-01

    Document available in extended abstract form only. The ANDRA waste repository will be operated for about a hundred years. During this period, the ventilation scheme will follow the development of the different storage zones. The ventilation system will ensure adequate air condition for the staff in the working zone and prevent high humidity and temperature damageable for the infrastructures. The untreated incoming air is characterized by great temperature and humidity variations in time, between day and night as well as between winter and summer time. The air from the surface enters the repository through the supply shaft and flows in full section along the main galleries of the central zone until the storage zones. In each storage zone, the air is distributed between storage modules via access galleries and collected at the outflow of each module before being extracted from the repository, retreated and finally released into the atmosphere. Throughout its journey within the repository, the ventilation air will undergo a set of temperature and moisture changes by interacting with its host environment. The aim of this study is to foresee how the air condition will evolve in time all over the exploitation period, along the ventilation network. Air condition assessment in the waste repository has been achieved by means of numerical simulation and analyzed in terms of bulk temperature and moisture in the air and on contact with walls. The physical modeling takes into account (i) air/wall heat exchanges due to forced and free advection, (ii) advection flux in the air, (iii) thermal storage and conduction flux into concrete structure and host rock, (iv) condensation flux on the wall, (v) time functions of wall evaporation flux and (vi) climate variations data from 7 years of meteorological measurements at the site of Bure. In bi-flux galleries, air/air heat exchanges between incoming air in full section and outgoing air through ceiling ducts are modeled. Temperature and

  1. When a son steals money from his mother: courtroom perceptions of elder financial exploitation.

    Science.gov (United States)

    Golding, Jonathan M; Hodell, Emily C; Dunlap, Emily E; Wasarhaley, Nesa E; Keller, Peggy S

    2013-01-01

    The perception of elder financial exploitation was investigated using community members (N = 104) and undergraduates (N = 143). Participants read an exploitation trial summary; an 85-year-old victim accused her son of stealing her money. Primary results indicated that alleged victims described as healthy rendered more guilty verdicts than those described as having a cognitive deficit; pro-victim judgments were higher for women than men; and younger and older community members' rendered more guilty verdicts than middle-aged mock jurors. The results are discussed in terms of the factors that impact the perception of exploitation in court.

  2. Assessment of the potential for exploitation of the remaining reserves of coal in Poland

    International Nuclear Information System (INIS)

    Wodarski, K.; Bijanska, J.

    2014-01-01

    In mining areas belonging to the Polish mining companies, there is a significant amount of coal, contained in remaining reserves, that have not been exploited so far. For years, the mines have been evaluating the possibility of its exploitation, since it would expand its resource base and would extend its useful life. In addition, exploitation of the remaining reserves can minimize stress concentration zones in the soil, the rebel y improving conditions for maintenance of excavations and limiting the risk of shock rock. (Author)

  3. Exploiting CD38-mediated endocytosis for immunoliposome internalization.

    Science.gov (United States)

    Orciani, Monia; Cavaletti, Guido; Fino, Vincenzo; Mattioli-Belmonte, Monica; Tredici, Giovanni; Bruni, Paolo; Di Primio, Roberto

    2008-07-01

    CD38 appears to be a promising candidate in antibody therapy; it is upregulated on cell surfaces in many lymphoid tumors and undergoes rapid internalization after interaction with antibodies. The receptor-mediated endocytosis allows conjugating toxins/drugs that promote suicide only of the malignant cells. Here, we describe the preparation of CD38-immunoliposomes and test their functionality by incubating them with CD38+/- cells. Liposomes were prepared by extrusion of a lipid mixture containing a biotinylated polyethylene glycol-phospholipid and loaded with 5(6)-carboxyfluorescein. The anti-CD38 antibody (IB4) was biotinylated and then linked to streptavidin molecules; streptavidin acts like a bridge between the antibody and the biotinylated lipid of the liposomes. CD38+/- cells were incubated either with liposomes or immunoliposomes and analyzed by fluorescence microscopy and cytofluorimetry. The results indicated a specific mechanism of internalization, owing to CD38-mediated endocytosis, where CD38+ cells incubated with immunoliposomes scored top fluorescence levels. This coupling strategy, based on the use of a streptavidin bridge to prepare immunoliposomes, does not interfere with the cellular functionality and its broad potential use represents a great advantage. Here IB4, a murine monoclonal anti-CD38 antibody, was used to simplify the experiments, but the coupling procedure may be suitable also with human antibodies, against CD38 or other human markers.

  4. Exploiting Herpes Simplex Virus Entry for Novel Therapeutics

    Directory of Open Access Journals (Sweden)

    Deepak Shukla

    2013-06-01

    Full Text Available Herpes Simplex virus (HSV is associated with a variety of diseases such as genital herpes and numerous ocular diseases. At the global level, high prevalence of individuals who are seropositive for HSV, combined with its inconspicuous infection, remains a cause for major concern. At the molecular level, HSV entry into a host cell involves multiple steps, primarily the interaction of viral glycoproteins with various cell surface receptors, many of which have alternate substitutes. The molecular complexity of the virus to enter a cell is also enhanced by the existence of different modes of viral entry. The availability of many entry receptors, along with a variety of entry mechanisms, has resulted in a virus that is capable of infecting virtually all cell types. While HSV uses a wide repertoire of viral and host factors in establishing infection, current therapeutics aimed against the virus are not as diversified. In this particular review, we will focus on the initial entry of the virus into the cell, while highlighting potential novel therapeutics that can control this process. Virus entry is a decisive step and effective therapeutics can translate to less virus replication, reduced cell death, and detrimental symptoms.

  5. Exploitation of capacitive micromachined transducers for nonlinear ultrasound imaging.

    Science.gov (United States)

    Novell, Anthony; Legros, Mathieu; Felix, Nicolas; Bouakaz, Ayache

    2009-12-01

    Capacitive micromachined ultrasonic transducers (CMUTs) present advantages such as wide frequency bandwidth, which could be further developed for nonlinear imaging. However, the driving electrostatic force induces a nonlinear behavior of the CMUT, thus generating undesirable harmonic components in the generated acoustic signal. Consequently, the use of CMUT for harmonic imaging (with or without contrast agents) becomes challenging. This paper suggests 2 compensation approaches, linear and nonlinear methods, to cancel unwanted nonlinear components. Furthermore, nonlinear responses from contrast agent were evaluated using CMUT in transmit before and after compensation. The results were compared with those obtained using a PZT transducer in transmit. Results showed that CMUT nonlinear behavior is highly influenced by the excitation to bias voltage ratio. Measurements of output pressure very close to the CMUT surface allow the estimation of optimal parameters for each compensation approach. Both methods showed a harmonic reduction higher than 20 dB when one element or several elements are excited. In addition, the study demonstrates that nonlinear approach seems to be more efficient because it is shown to be less sensitive to interelement variability and further avoids fundamental component deterioration. The results from contrast agent measurements showed that the responses obtained using CMUT elements in transmit with compensation were similar to those from PZT transducer excitation. This experimental study demonstrates the opportunity to use CMUT with traditional harmonic contrast imaging techniques.

  6. Exploiting fluorescence for multiplex immunoassays on protein microarrays

    Science.gov (United States)

    Herbáth, Melinda; Papp, Krisztián; Balogh, Andrea; Matkó, János; Prechl, József

    2014-09-01

    Protein microarray technology is becoming the method of choice for identifying protein interaction partners, detecting specific proteins, carbohydrates and lipids, or for characterizing protein interactions and serum antibodies in a massively parallel manner. Availability of the well-established instrumentation of DNA arrays and development of new fluorescent detection instruments promoted the spread of this technique. Fluorescent detection has the advantage of high sensitivity, specificity, simplicity and wide dynamic range required by most measurements. Fluorescence through specifically designed probes and an increasing variety of detection modes offers an excellent tool for such microarray platforms. Measuring for example the level of antibodies, their isotypes and/or antigen specificity simultaneously can offer more complex and comprehensive information about the investigated biological phenomenon, especially if we take into consideration that hundreds of samples can be measured in a single assay. Not only body fluids, but also cell lysates, extracted cellular components, and intact living cells can be analyzed on protein arrays for monitoring functional responses to printed samples on the surface. As a rapidly evolving area, protein microarray technology offers a great bulk of information and new depth of knowledge. These are the features that endow protein arrays with wide applicability and robust sample analyzing capability. On the whole, protein arrays are emerging new tools not just in proteomics, but glycomics, lipidomics, and are also important for immunological research. In this review we attempt to summarize the technical aspects of planar fluorescent microarray technology along with the description of its main immunological applications.

  7. Exploiting rhizosphere microbial cooperation for developing sustainable agriculture strategies.

    Science.gov (United States)

    Besset-Manzoni, Yoann; Rieusset, Laura; Joly, Pierre; Comte, Gilles; Prigent-Combaret, Claire

    2018-01-08

    The rhizosphere hosts a considerable microbial community. Among that community, bacteria called plant growth-promoting rhizobacteria (PGPR) can promote plant growth and defense against diseases using diverse distinct plant-beneficial functions. Crop inoculation with PGPR could allow to reduce the use of pesticides and fertilizers in agrosystems. However, microbial crop protection and growth stimulation would be more efficient if cooperation between rhizosphere bacterial populations was taken into account when developing biocontrol agents and biostimulants. Rhizospheric bacteria live in multi-species biofilms formed all along the root surface or sometimes inside the plants (i.e., endophyte). PGPR cooperate with their host plants and also with other microbial populations inside biofilms. These interactions are mediated by a large diversity of microbial metabolites and physical signals that trigger cell-cell communication and appropriate responses. A better understanding of bacterial behavior and microbial cooperation in the rhizosphere could allow for a more successful use of bacteria in sustainable agriculture. This review presents an ecological view of microbial cooperation in agrosystems and lays the emphasis on the main microbial metabolites involved in microbial cooperation, plant health protection, and plant growth stimulation. Eco-friendly inoculant consortia that will foster microbe-microbe and microbe-plant cooperation can be developed to promote crop growth and restore biodiversity and functions lost in agrosystems.

  8. PERSPECTIVE OF EXPLOITATION OF ALGINIT IN PLANT NUTRITION

    Directory of Open Access Journals (Sweden)

    J KULICH

    2002-05-01

    Full Text Available Ore and non-ore potential of the Slovak Republic is restricted by the size of its area. Each successful result of geological research uncovering modest raw material supplies is considered to be worthy. Since 1990 the alginite bed situated in Lučenec Valley, locality of Picniná village, has been considered in the above mentioned sense. Alginite represents a rock with relatively high organic matter content which was sedimenting together with the clays in post - volcanic outbursts during geological periods appropriate for algae occurrence. An interest for this material is also stimulated by the experiences obtained during alginite mining from the deposit not far off Slovak - Hungarian boundary in Gercei and Pula in Hungary. Gercei alginite has a wide variety of utilization as an ecological raw material. By underlining pedological and agrochemical alginite value we intend to contribute to the realization of its utilization, especially in agriculture. First of all, the fact that specific and volume weight as well as the consistent constants and particularly specific surface value of alginite exclusively positively influence physical and chemical soil properties should be emphasized here. Content of biogenic and trace elements, portion of colloidal fraction, humus content and sorption capacity have a determinative significance for prospective alginite involving into an assortment of progressive preparations for soil properties improving. Natural character, absence of phytotoxicity, effective economy of mining technology and ecologization of farming systems, those are the arguments for alginite to be included among such materials like zeolites and bentonites which have already achieved a possition for useful agricultural utilization.

  9. EXPLOITING THE VERSATILITY OF CHOLESTEROL IN NANOPARTICLES FORMULATION.

    Science.gov (United States)

    Belletti, D; Grabrucker, A M; Pederzoli, F; Menrath, I; Cappello, V; Vandelli, M A; Forni, F; Tosi, G; Ruozi, B

    2016-09-10

    The biocompatibility of polymers, lipids and surfactants used to formulate is crucial for the safe and sustainable development of nanocarriers (nanoparticles, liposomes, micelles, and other nanocarriers). In this study, Cholesterol (Chol), a typical biocompatible component of liposomal systems, was formulated in Chol-based solid nanoparticles (NPs) stabilized by the action of surfactant and without the help of any other formulative component. Parameters as type (Solutol HS 15, cholic acid sodium salt, poly vinyl alcohol and Pluronic-F68), concentration (0.2; 0.5 and 1% w/v) of surfactant and working temperature (r.t. and 45°C) were optimized and all samples characterized in terms of size, zeta potential, composition, thermal behavior and structure. Results demonstrated that only Pluronic-F68 (0.5% w/v) favors the organization of Chol chains in structured NPs with mean diameter less than 400nm. Moreover, we demonstrated the pivotal role of working temperature on surfactant aggregation state/architecture/stability of Chol-based nanoparticles. At room temperature, Pluronic-F68 exists in solution as individual coils. In this condition, nanoprecipitation of Chol formed the less stable NPs with a 14±3% (w/w) of Pluronic-F68 prevalently on surface (NP-Chol/0.5). On the contrary, working near the critical micelle temperature (CMT) of surfactant (45°C), Chol precipitates with Pluronic-F68 (9±5% w/w) in a compact stable matricial structure (NP-Chol/0.5-45). In vitro studies highlight the low toxicity and the affinity of NP-Chol/0.5-45 for neuronal cells suggesting their potential applicability in pathologies with a demonstrated alteration of neuronal plasticity and synaptic communication (i.e. Huntington's disease). Copyright © 2016 Elsevier B.V. All rights reserved.

  10. Exploiting amino acid composition for predicting protein-protein interactions.

    Directory of Open Access Journals (Sweden)

    Sushmita Roy

    2009-11-01

    Full Text Available Computational prediction of protein interactions typically use protein domains as classifier features because they capture conserved information of interaction surfaces. However, approaches relying on domains as features cannot be applied to proteins without any domain information. In this paper, we explore the contribution of pure amino acid composition (AAC for protein interaction prediction. This simple feature, which is based on normalized counts of single or pairs of amino acids, is applicable to proteins from any sequenced organism and can be used to compensate for the lack of domain information.AAC performed at par with protein interaction prediction based on domains on three yeast protein interaction datasets. Similar behavior was obtained using different classifiers, indicating that our results are a function of features and not of classifiers. In addition to yeast datasets, AAC performed comparably on worm and fly datasets. Prediction of interactions for the entire yeast proteome identified a large number of novel interactions, the majority of which co-localized or participated in the same processes. Our high confidence interaction network included both well-studied and uncharacterized proteins. Proteins with known function were involved in actin assembly and cell budding. Uncharacterized proteins interacted with proteins involved in reproduction and cell budding, thus providing putative biological roles for the uncharacterized proteins.AAC is a simple, yet powerful feature for predicting protein interactions, and can be used alone or in conjunction with protein domains to predict new and validate existing interactions. More importantly, AAC alone performs at par with existing, but more complex, features indicating the presence of sequence-level information that is predictive of interaction, but which is not necessarily restricted to domains.

  11. Radiological impact of the exploitation of the CENTRACO nuclear facility of SOCODEI; Impact radiologique de l'exploitation de l'INB CENTRACO de SOCODEI

    Energy Technology Data Exchange (ETDEWEB)

    Chevalier, Ch. [SOCODEI, Dir. Surete Qualite, 95 - Cergy Pontoise (France)

    2001-07-01

    In spite of a experience feedback still limited, the two first years of operation show that the radiological impact of the exploitation of Centraco is low both at the level of dosimetry for workers and level of radioactive release in environment. (N.C.)

  12. Conception et exploitation d'une structure active pour une aile laminaire adaptative experimentale

    Science.gov (United States)

    Coutu, Daniel

    This doctoral research contributed to the success of the project CRIAQ 7.1, demonstrating the capability of a morphing laminar wing to reduce fuel consumption. Respectively, this thesis shows the design of the experimental wing and its operation in a subsonic wind tunnel (Mach numbers of 0.2 to 0.3 with angles of attack between -1 and 2°). First of all, the morphing wing is formed of a composite laminate linked to an actuation system to build an active structure capable of modifying the wing upper surface geometry. The design was performed using a new developed methodology to solve aero-structural problems. Using ANSYS software, the finite elements method was applied to model the different possible active structure configurations Aerodynamic loads applied over the active structure as well as targeted morphed geometries have been provided by the Ecole Polytechnique team. Next, laminar flow enhancements allowed by each active structure configuration we' re evaluated using the aerodynamic solver XFoil 6.96. A best trade-off between aerodynamic performance and energy needed for wing morphing was found using a multi-objective optimization technique. Among the retained stable configurations, a 4-ply composite laminated shell driven by 2 actuation lines was retained. Thereafter, the research effort focused on the exploitation of the morphing capabilities of the experimental wing over each given set of flow conditions. Therefore, once the prototype was built, the structural model was refined, calibrated and coupled with the aerodynamic solver to accurately predict the aero-structural behavior in the wind tunnel. Optimal morphing wing shapes were numerically calculated using a generalized pattern search algorithm and a local search routine to refine the solution. In the wind tunnel, this open-loop control approach allowed an average 25% laminar flow regime extension over the wing prototype upper surface. Consequently, an average 18.5% profile drag reduction was measured by

  13. Accounting and Taxation Issues Concerning the Activity of Forest Exploitation in Romania

    Directory of Open Access Journals (Sweden)

    Violeta ISAI

    2015-05-01

    Full Text Available The activity of exploitation represents a main sector in the production process of the forest economy. This activity contains works of cropping, collection, transportation and processing of raw wood, by using production means, manuals and mechanized. The Romanian forest fund is managed by the National Department of Forests, by the forestry districts, public and private companies with legal personality, which draw up check balance, balance sheet and their own budget of incomes and expenses. The registering in accounting of the operations in the forest exploitation activity presents numerous features, given by the profile of this activity: specific documents, specific valuation and specific costs of processing. The Fiscal Code stipulates also special taxes for the forest exploitation activity, related to the fact that, there are exploited natural resources, and the activity has a major impact on the environment. In the other hand, the acquisitions and sellings of wood are placed under a special regime of taxation.

  14. Practitioner Perspectives on Child Sexual Exploitation: Rapport Building With Young People.

    Science.gov (United States)

    Ahern, Elizabeth C; Sadler, Leslie A; Lamb, Michael E; Gariglietti, Gianna M

    2017-01-01

    Young people suspected of being sexually exploited are unlikely to have made prior disclosures before being approached by authorities, and this can make them especially uncomfortable when involved in investigations. Semistructured interviews were conducted with frontline social workers and law enforcement practitioners about their experiences interacting with youth during child sexual exploitation investigations. The findings provided some tentative insights into the processes by which practitioners sought to establish rapport with young people who have been exploited and establish themselves as trustworthy abuse disclosure recipients. Practitioners reported that rapport building in child sexual exploitation cases not only occurred over lengthy periods of time (e.g., months or years) but also required repeated contacts between the practitioners and young people, during which practitioners minimized their roles as authorities and maximized their authenticity as caring people. Practitioners mentioned the importance of dependability, lightheartedness, and having a casual demeanor. Findings have implications for managing reluctance and understanding rapport building when working with possible victims.

  15. Children Sexually Exploited for Profit: A Plea for a New Social Work Priority.

    Science.gov (United States)

    Herrmann, Kenneth J., Jr.

    1987-01-01

    Explores child sexual exploitation by outlining the issue and its effects, providing case examples, with the aim of further involving social workers in ameliorating the conditions experienced by this victimized population. (Author/KS)

  16. Rapid C4I High Performance Computing for Hyperspectral Imaging Exploitation

    National Research Council Canada - National Science Library

    Ramseyer, George O; Spetka, Scott E; Linderman, Richard E; Romano, Brian C

    2001-01-01

    A multidisciplinary effort has been initiated which spans the C4I and signal/image processing computational technology areas to integrate diverse capabilities of existing hyperspectral image exploitation systems...

  17. The Role of External Knowledge Sources and Organizational Design in the Process of Opportunity Exploitation

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Lyngsie, Jacob; A. Zahra, Shaker

    opportunities often involves significant interactions with external knowledge sources. Organizational design can facilitate a firm’s interactions with these sources, while achieving coordination among organizational members engaged in opportunity exploitation. Our analysis of a double-respondent survey...

  18. Quantifying Admissible Undersampling for Sparsity-Exploiting Iterative Image Reconstruction in X-Ray CT

    DEFF Research Database (Denmark)

    Jørgensen, Jakob Heide; Sidky, Emil Y.; Pan, Xiaochuan

    2013-01-01

    Iterative image reconstruction with sparsity-exploiting methods, such as total variation (TV) minimization, investigated in compressive sensing claim potentially large reductions in sampling requirements. Quantifying this claim for computed tomography (CT) is nontrivial, because both full sampling...

  19. Potential impact on climate of the exploitation of methane hydrate deposits offshore

    Digital Repository Service at National Institute of Oceanography (India)

    Glasby, G.P.

    Considerable attention has focussed on methane hydrates as a potential energy resource but much less on the potential environmental problems of exploiting these deposits. In fact, methane hydrate deposits represent a dynamic system formed as a...

  20. Influence of distribution characteristics and associated seabed features on exploitation of cobalt-rich manganese deposits

    Digital Repository Service at National Institute of Oceanography (India)

    Yamazaki, T.; Sharma, R.; Tsurusaki, K.

    Method of exploitation, selection of mine site and desing of mining system of cobalt-rich manganese deposits on seamounts would be greatly influenced by the distribution characteristics as well as the associated seabed features, wuch as the seabed...

  1. Monitoring the recovery of a previously exploited surf-zone fish ...

    African Journals Online (AJOL)

    Monitoring the recovery of a previously exploited surf-zone fish community in the St Lucia Marine Reserve, South Africa, using a no-take sanctuary area as a benchmark. BQ Mann, H Winker, JQ Maggs, SN Porter ...

  2. A Case Study of How Organisational Members do Affect the Balancing of Exploitation and Exploration

    DEFF Research Database (Denmark)

    Andreassen, Mads R.

    2008-01-01

    study using semi-structured interviews and observation techniques this paper explores exploitation and exploration in a Danish industrial manufacture. Findings suggest that conditions affecting the balance between exploitation and exploration activities would depend on how an organisational member......Combing operations between the main parties in integration of new products, efficiently, are in practice for most organisations a challenging task demanding strong organisational capabilities, and in accordance to literature, achieving a successfully combination would be possible through...... an organisation's ability to establish dual capabilities in terms of exploitation and exploration (March, 1991). Few studies, however, suggest a classification of which organisational conditions would support a balance allowing exploitation and exploration operating side by side. Based on a single indept case...

  3. Four Kilograms to Tip the Scale: China's Exploitation of the North Korean Nuclear Crisis

    National Research Council Canada - National Science Library

    Ives, John M

    2007-01-01

    .... Furthermore, Beijing enjoys a certain coercive influence over Pyongyang as the old 'lips and teeth' relationship eroded to one of mild indifference or embarrassment allowing China to exploit its little brother...

  4. Exploiting Heparan Sulfate Proteoglycans in Human Neurogenesis—Controlling Lineage Specification and Fate

    Directory of Open Access Journals (Sweden)

    Chieh Yu

    2017-10-01

    Full Text Available Unspecialized, self-renewing stem cells have extraordinary application to regenerative medicine due to their multilineage differentiation potential. Stem cell therapies through replenishing damaged or lost cells in the injured area is an attractive treatment of brain trauma and neurodegenerative neurological disorders. Several stem cell types have neurogenic potential including neural stem cells (NSCs, embryonic stem cells (ESCs, induced pluripotent stem cells (iPSCs, and mesenchymal stem cells (MSCs. Currently, effective use of these cells is limited by our lack of understanding and ability to direct lineage commitment and differentiation of neural lineages. Heparan sulfate proteoglycans (HSPGs are ubiquitous proteins within the stem cell microenvironment or niche and are found localized on the cell surface and in the extracellular matrix (ECM, where they interact with numerous signaling molecules. The glycosaminoglycan (GAG chains carried by HSPGs are heterogeneous carbohydrates comprised of repeating disaccharides with specific sulfation patterns that govern ligand interactions to numerous factors including the fibroblast growth factors (FGFs and wingless-type MMTV integration site family (Wnts. As such, HSPGs are plausible targets for guiding and controlling neural stem cell lineage fate. In this review, we provide an overview of HSPG family members syndecans and glypicans, and perlecan and their role in neurogenesis. We summarize the structural changes and subsequent functional implications of heparan sulfate as cells undergo neural lineage differentiation as well as outline the role of HSPG core protein expression throughout mammalian neural development and their function as cell receptors and co-receptors. Finally, we highlight suitable biomimetic approaches for exploiting the role of HSPGs in mammalian neurogenesis to control and tailor cell differentiation into specific lineages. An improved ability to control stem cell specific neural

  5. HIV-1 exploits CCR5 conformational heterogeneity to escape inhibition by chemokines.

    Science.gov (United States)

    Colin, Philippe; Bénureau, Yann; Staropoli, Isabelle; Wang, Yongjin; Gonzalez, Nuria; Alcami, Jose; Hartley, Oliver; Brelot, Anne; Arenzana-Seisdedos, Fernando; Lagane, Bernard

    2013-06-04

    CC chemokine receptor 5 (CCR5) is a receptor for chemokines and the coreceptor for R5 HIV-1 entry into CD4(+) T lymphocytes. Chemokines exert anti-HIV-1 activity in vitro, both by displacing the viral envelope glycoprotein gp120 from binding to CCR5 and by promoting CCR5 endocytosis, suggesting that they play a protective role in HIV infection. However, we showed here that different CCR5 conformations at the cell surface are differentially engaged by chemokines and gp120, making chemokines weaker inhibitors of HIV infection than would be expected from their binding affinity constants for CCR5. These distinct CCR5 conformations rely on CCR5 coupling to nucleotide-free G proteins ((NF)G proteins). Whereas native CCR5 chemokines bind with subnanomolar affinity to (NF)G protein-coupled CCR5, gp120/HIV-1 does not discriminate between (NF)G protein-coupled and uncoupled CCR5. Interestingly, the antiviral activity of chemokines is G protein independent, suggesting that "low-chemokine affinity" (NF)G protein-uncoupled conformations of CCR5 represent a portal for viral entry. Furthermore, chemokines are weak inducers of CCR5 endocytosis, as is revealed by EC50 values for chemokine-mediated endocytosis reflecting their low-affinity constant value for (NF)G protein-uncoupled CCR5. Abolishing CCR5 interaction with (NF)G proteins eliminates high-affinity binding of CCR5 chemokines but preserves receptor endocytosis, indicating that chemokines preferentially endocytose low-affinity receptors. Finally, we evidenced that chemokine analogs achieve highly potent HIV-1 inhibition due to high-affinity interactions with internalizing and/or gp120-binding receptors. These data are consistent with HIV-1 evading chemokine inhibition by exploiting CCR5 conformational heterogeneity, shed light into the inhibitory mechanisms of anti-HIV-1 chemokine analogs, and provide insights for the development of unique anti-HIV molecules.

  6. Optimal design of ethanol supply chains considering carbon trading effects and multiple technologies for side-product exploitation.

    Science.gov (United States)

    Ortiz-Gutiérrez, R A; Giarola, S; Bezzo, F

    2013-01-01

    This work proposes a spatially explicit mixed integer linear programming modelling framework representing the dynamic evolution of a bioethanol supply chain (SC) under increasing biofuel demand and greenhouse gas (GHG) emission savings over time. Key features of the proposed framework comprise: (i) the incorporation of available set-aside rural surfaces for energy crop cultivation; (ii) the acknowledgement ofan economic value to the overall GHG emissions through the introduction of an Emission Trading System. Multiple technological options are assessed to exploit the co-product Distiller's Dried Grains with Solubles either as animal fodder (standard usage) or as fuel for heat and power generation or as raw material for biogas production (and hence heat and power). Bioethanol production in Northern Italy is chosen as a demonstrative case study.

  7. Study on the License Mode of Value-Added Exploitation of Public Sector Information

    OpenAIRE

    Hua, Haiying; Zhu, Shuren

    2013-01-01

    How to license PSI (public sector information) to those commercial reusers has become so urgent and important issue. The paper discussed the different license mode of value-added exploitation of Public Sector Information in UK and United States. Based on the investigation and comparison, the paper proposed some valuable suggestions on the construction of license mode of value-added exploitation of PSI in China: A clear attribution of property of public sector information and a clear range ...

  8. The cost of being valuable: predictors of extinction risk in marine invertebrates exploited as luxury seafood

    OpenAIRE

    Purcell, Steven W.; Polidoro, Beth A.; Hamel, Jean-François; Gamboa, Ruth U.; Mercier, Annie

    2014-01-01

    Extinction risk has been linked to biological and anthropogenic variables. Prediction of extinction risk in valuable fauna may not follow mainstream drivers when species are exploited for international markets. We use results from an International Union for Conservation of Nature Red List assessment of extinction risk in all 377 known species of sea cucumber within the order Aspidochirotida, many of which are exploited worldwide as luxury seafood for Asian markets. Extinction risk was primari...

  9. A Heated Debate: Theoretical Perspectives of Sexual Exploitation and Sex Work.

    Science.gov (United States)

    Gerassi, Lara

    2015-12-01

    The theoretical and often political framework of sexual exploitation and sex work among women is widely and enthusiastically debated among academic and legal scholars alike. The majority of theoretical literature in this area focuses on the macro perspective, while the micro-level perspective as to theory and causation remains sparse. This article provides a comprehensive overview of the philosophical, legal, and political perspectives pertaining to sexual exploitation of women and girls while addressing the subsequent controversies in the field.

  10. A Heated Debate: Theoretical Perspectives of Sexual Exploitation and Sex Work

    OpenAIRE

    Gerassi, Lara

    2015-01-01

    The theoretical and often political framework of sexual exploitation and sex work among women is widely and enthusiastically debated among academic and legal scholars alike. The majority of theoretical literature in this area focuses on the macro perspective, while the micro-level perspective as to theory and causation remains sparse. This article provides a comprehensive overview of the philosophical, legal, and political perspectives pertaining to sexual exploitation of women and girls whil...

  11. Boys are not exempt: Sexual exploitation of adolescents in sub-Saharan Africa.

    Science.gov (United States)

    Adjei, Jones K; Saewyc, Elizabeth M

    2017-03-01

    Research on youth sexual exploitation in Africa has largely neglected the experiences of exploited boys. To date, much of the research in sub-Saharan Africa continues to consider boys mainly as exploiters but not as exploited. Using the only publicly available population-based surveys from the National Survey of Adolescents, conducted in four sub-Saharan African countries - Burkina Faso, Ghana, Malawi, and Uganda-we assessed factors associated with transactional sexual behaviour among never-married adolescent boys and girls. We also examined whether boys' reported sexual exploitation was linked to similar risky sexual behaviours as has been noted among girls in sub-Saharan Africa. Results from our analyses indicated that even though adolescent girls have a somewhat higher likelihood of reporting sexual abuse and exploitation, the odds of trading sex were significantly elevated for previously traumatized boys (that is those with a history of sexual and physical abuse) but not for their female counterparts. Just like adolescent girls, transactional sexual behaviour was associated with the risk of having concurrent multiple sexual partners for boys. These findings support the reality of boys' sexual exploitation within the African context, and further highlight the importance of including males in general and boys in particular in population-based studies on sexual health, risk, and protective factors in the sub-Saharan African region. Understanding the factors linked to sexual exploitation for both boys and girls will help in developing policies and programs that could improve the overall sexual and reproductive health outcomes among adolescents and youth in sub-Saharan Africa. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Renforcement de la capacité des petits exploitants agricoles de s ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Les petits exploitants agricoles du Nigeria, particulièrement les femmes, sont très vulnérables aux répercussions des changements climatiques. Même si certains exploitants ont élaboré des stratégies de leur propre initiative, il est nécessaire de produire et de diffuser des renseignements qui les aideront à adapter leurs ...

  13. Entropy Viscosity and L1-based Approximations of PDEs: Exploiting Sparsity

    Science.gov (United States)

    2015-10-23

    AFRL-AFOSR-VA-TR-2015-0337 Entropy Viscosity and L1-based Approximations of PDEs: Exploiting Sparsity Jean-Luc Guermond TEXAS A & M UNIVERSITY 750... Viscosity and L1-based Approximations of PDEs: Exploiting Sparsity 5a. CONTRACT NUMBER FA9550-12-1-0358 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...conservation equations can be stabilized by using the so-called entropy viscosity method and we proposed to to investigate this new technique. We

  14. Teenage Childbearing and Its Life Cycle Consequences: Exploiting a Natural Experiment

    OpenAIRE

    V. Joseph Hotz; Seth G. Sanders; Susan Williams McElroy

    1999-01-01

    In this paper, we exploit a 'natural experiment' associated with human reproduction to identify the effect of teen childbearing on subsequent educational attainment, family structure, labor market outcomes and financial self-sufficiency. In particular, we exploit the fact that a substantial fraction of women who become pregnant experience a miscarriage (spontaneous abortion) and thus do not have a birth. If miscarriages were purely random and if miscarriages were the only way, other than by l...

  15. Un premier service mobile en Égypte qui relie les petits exploitants ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Un premier service mobile en Égypte qui relie les petits exploitants aux acheteurs. Un homme qui parle sur un téléphone mobile. Les petits exploitants agricoles dominent l'agriculture égyptienne, mais leur manque de connaissances en matière de commercialisation et de compétences techniques, ainsi qu'une mauvaise ...

  16. The law and economics of international sex slavery: prostitution laws and trafficking for sexual exploitation

    OpenAIRE

    Jakobsson, Niklas; Kotsadam, Andreas

    2013-01-01

    International trafficking in humans for sexual exploitation is an eco- nomic activity driven by profit motives. Laws regarding commercial sex influence the profitability of trafficking and may thus affect the inflow of trafficking to a country. Using two recent sources of European cross country data we show that trafficking of persons for commercial sexual exploitation (as proxied by the data sets we are using) is least prevalent in coun...

  17. Flow-Based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Pras, Aiko

    The spread of 1-10 Gbps technology has in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services.At the same time, we have also observed increasingly frequent and widely diversified attacks. To this threat, the research community has answered with a growing

  18. Flow-based Compromise Detection

    NARCIS (Netherlands)

    Hofstede, R.J.

    2016-01-01

    Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accounts by issuing large numbers of authentication attempts on applications and daemons. Widespread targets of such attacks are Secure SHell (SSH) and Web applications, for example. The impact of

  19. Flow-based intrusion detection

    NARCIS (Netherlands)

    Sperotto, Anna

    2010-01-01

    The spread of 1-10Gbps technology has in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services. As users, we depend on the Internet in our daily life for simple tasks such as checking e-mails, but also for managing private and financial information. However,

  20. Comparing recent and abandoned shell middens to detect the impact of human exploitation on the intertidal ecosystem

    NARCIS (Netherlands)

    Boer, de W.F.; Pereira, T.; Guissamulo, A.

    2000-01-01

    Abandoned and recent shell middens were compared from Inhaca island, Mozambique, to investigate the impact of human exploitation. The growing human population was expected to increase the exploitation pressure, decrease the mean shell size, and increase the species diversity. Moreover,